Search This Blog
Popular Posts
-
Hello there! My blog post 'Spikes' was published on Sept. 22nd; however, the post before it called 'Flow' was published on...
-
WordPress has evolved to be much more than just a blogging platform, from online stores to full-on business platforms, there is ve...
-
Written By ESR News Blog Editor Thomas Ahearn Information security is a top priority for background screening firms in today's dig...
-
The United States government earlier this year officially accused Russia of interfering with the US elections. Earlier this year on Octo...
-
Greetings, readers. Welcome to the HubSpot Marketing Blog. We're very happy to have you here. You might not realize it, but ge...
-
One of my early favorite pictures of Richard Armitage as Guy of Gisborne. [warning: rant] A few years ago, many more fans blogged ...
-
I will publish an article only when I have something important to say. That's what I reminded myself every time the egocentric ...
-
Blogging can be a fun, interesting, entertaining, helpful, and fabulous experience for both bloggers and their readers.But, what blogging ...
-
This entry was posted in Research, WordPress Security on March 1, 2017 by Mark Maunder 43 Replies Today we are posting an in-dep...
-
LIST MAG WP is a beautifully designed WordPress Theme that is built to be engaging, fast and most importantly boost viral traffic with...
Blog Archive
- December (18)
- November (29)
- October (27)
- September (29)
- August (31)
- July (30)
- June (29)
- May (29)
- April (30)
- March (31)
- February (28)
- January (31)
- December (31)
- November (30)
- October (31)
- September (30)
- August (43)
- July (42)
- June (33)
- May (43)
- April (36)
- March (37)
- February (31)
- January (4)
- December (1)
- November (1)
- October (24)
- September (24)
- August (25)
- July (28)
- June (18)
- September (1)
Total Pageviews
Blogroll
The 10 Most Critical Application Security Risks
OWASP, or Open Web Application Security Project is a non-profit dedicated to spreading information on application security. Their goal is to make software security visible so the public can make informed decisions when it comes to security. Every now and then OWASP constructs a list of the top ten most critical application security risks. But, this list isn't just constructed by them. The whole web community is encouraged to contribute. Their most recent list was published in 2013, with a newer version expected to be published later this year.
In a recent webinar, WP Engine's Security Engineer Justin Dailey, and Security Architect Will West talked through this list. Read below for a recap of OWASP's top 10 security risks and what you can do to further harden the security of your WordPress site.

"There's a lot of different kinds of injections, targeted at different kinds of subsystems. The essential thing they let you do is they let you bypass protections and do unintended things and access data you weren't intended to access," said West.
The way you can protect yourself from this is to enforce input type and length, ensure special characters are escaped, validate all input fields and use and input validation whitelist, and avoid dynamic queries or commands.
2. Weak Authentication and Session ManagementThis is when attacks take advantage of improper authentication or session management practices and can lead to revealing sensitive information like passwords.
This is why user management and authentication is important. You should perform user and role validation on all actions and use secure session cookie flags as well as CSRF tokens with forms.
3. Cross Site Scripting (XSS)"Cross-site scripting is one of the most entertaining issues to find on a web page. One of the easiest ways for it to pop up is to have a JavaScript alert. It makes it so that someone who isn't supposed to put scripts on a page can't put scripts on a page," said West.
An unwanted script can lead to compromised credentials and sessions, site defacement, or redirection to malicious sites. To mitigate this you should sanitize input, output encodes all user data during upon rendering, and have positive output validation using a correct character set.
4. Insecure Direct Object ReferencesIt's scary when your files are exposed. Insecure direct object references lead to unauthorized data access. The most common that most people have heard of is called Local File Inclusion. This is where a secure file shows up on the front end of a web page.
You can ensure access control checks when using direct object references and use reference maps instead of direct references.
5. Security MisconfigurationIf your security configuration is outdated, or not set up properly this can lead to unintended access to data or application functions.
The easiest way to fight against a bad security configuration is a repeatable and testable hardening process and regular updating and patching processes. If you're diligent about security, you are way less likely to be hacked.
6. Sensitive Data ExposureThis is caused by improper encryption of sensitive data like payment credentials or personal information. This can lead to fraud or a company being victim to a PR scandal.
To fix this you should encrypt data and avoid storing sensitive data.
7. Missing Function Level Access Control"Missing Function Level Access Control is one of my favorites to find because you are using the application and the JavaScript says 'no, you can't do this,' and then you can just go do it if you bypass the JavaScript on the application," said West.
Bypassing this protection allows access to unauthorized functions and data, using explicit grants and deny by default. Also, performing validations on client side and server side will protect you more thoroughly.
8. Cross Site Request ForgeryWhen this happens, the attack forces a logged in victim's browser to send a forged HTTP request that can include local session information. These requests target sites that do not have proper request validation.
If you want to avoid this, include an unpredictable CSFR token in each HTTP request.
9. Using Components with Known VulnerabilitiesThis is pretty self-explanatory and probably the easiest thing to avoid. Hackers can bypass old security measures easily. Simply, keep track of the software versions your application is using and monitor the security of the components through public notifications like mailing lists. Lastly, remember to follow the policies which software components are acceptable. Two common software applications that have been exposed when it comes to WordPress are Tin Thumb and Rev Slider.
10. Unvalidated Redirects and ForwardsIf your site gets hacked, the hackers can redirect users visiting your site to malicious sites. Also, it can trick you to think the malicious site is your site. If you can, you should avoid redirects and forwards altogether. If you have to use them, do not include dynamic parameters for the destination.
Final ThoughtsIn regards to WP Engine, we supply a variety of platform protections. We conduct periodic security audits and real-time threat detection. WP Engine does automatic backups as well to make it near impossible to lose data. See here for what other WordPress security features we offer.
Source: The 10 Most Critical Application Security Risks
0 comments:
Post a Comment