SlideShare a Scribd company logo
2
Most read
5
Most read
6
Most read
Internal to Wipro
OWASP TOP 10
VULNERABILITES
BY: ARYA ANINDYARATNA BAL
Internal to Wipro
# ABOUT ME
> 6 yr. in Application Security
OSCP, CRTP, ECSA
MTech In CSIR, GFSU (NFSU)
Like to Travel
Internal to Wipro
AGENDA
OWASP Top 10 Vulnerabilities
Injection
Cross Site Scripting
Cross Site Request Forgery
Internal to Wipro
OWASP TOP 10 : 2021 RELEASE
A1 Broken Access
Control
A2 Cryptographic
Failures
A3 Injection
A4 Insecure
Design
A5 Security
Misconfiguration
A6 Vulnerable
and Outdated
Components
A7 Identification
and
Authentication
Failures
A8 Software and
Data Integrity
Failures
A9 Security
Logging and
Monitoring
Failures
A10 Server-Side
Request Forgery
Internal to Wipro
# WHO IS OWASP
Worldwide not-for-profit organisation
• Founded in 2001
OWASP – Open Web Application Security
Project
Mission to make the software security visible.
Internal to Wipro
OWASP TOP HISTORY
2003 2004 2007 2010 2013 2017 2021
A1 Unvalidated Input Unvalidated Input
Cross Site Scripting
(XSS)
Injection Injection Injection
Broken Access
Control
A2
Broken Access
Control
Broken Access
Control
Injection Flaws Cross-Site Scripting
Broken Authentication
and Session
Management
Broken Authentication
Cryptographic
Failures
A3
Broken Authentication
and Session
Management
Broken Authentication
and Session
Management
Malicious File
Execution
Broken Authentication
and Session
Management
Cross-Site Scripting
Sensitive Data
Exposure
Injection
A4
Cross Site Scripting Cross Site Scripting
Insecure Direct Object
Reference
Insecure Direct Object
References
Insecure Direct Object
References
XML External Entities
(XXE)
Insecure Design
A5
Buffer Overflow Buffer Overflow
Cross Site Request
Forgery (CSRF)
Cross-Site Request
Forgery
Security
Misconfiguration
Broken Access
Control
Security
Misconfiguration
A6
Injection Flaws Injection Flaws
Information Leakage
and Improper Error
Handling
Security
Misconfiguration
Sensitive Data
Exposure
Security
Misconfiguration
Vulnerable and
Outdated Components
A7
Improper Error
Handling
Improper Error
Handling
Broken Authentication
and Session
Management
Insecure
Cryptographic Storage
Missing Function
Level Access Control
Cross-Site Scripting
Identification and
Authentication Failures
A8 Insecure Storage Insecure Storage
Insecure
Cryptographic Storage
Failure to Restrict URL
Access
Cross-Site Request
Forgery
Insecure
Deserialization
Software and Data
Integrity Failures
A9
Application Denial of
Service
Application Denial of
Service
Insecure
Communications
Insufficient Transport
Layer Protection
Using Components
with Known
Vulnerabilities
Using Components
with Known
Vulnerabilities
Security Logging and
Monitoring Failures
A10
Insecure Configuration
Management
Insecure Configuration
Management
Failure to Restrict URL
Access
Unvalidated Redirects
and Forwards
Unvalidated Redirects
and Forwards
Insufficient Logging &
Monitoring
Server-Side Request
Forgery
Internal to Wipro
# INJECTION
Injection is most persistence vulnerability in the
OWASP Top 10 list over the decade, particularly SQL
Injection are the common in web applications as
well as Mobile.
Some of the more common injections are SQL,
NoSQL, OS command, Server Sire Template Injection,
LDAP injection etc...
Injection occurs when user-supplied data is sent to
an interpreter as part of a command or query. The
hostile data tricks the interpreter into executing
unintended commands or changing data.
Internal to Wipro
# HOW TO
PREVENT
• Do not pass user input directly to executable
statements.
• Use of Prepared Statements (with Parameterized
Queries)
• Use of Properly Constructed Stored Procedures
• Allow-list Input Validation
• Escaping All User Supplied Input
• Enforcing Least Privilege
• Performing Allow-list Input Validation as a
Secondary Defense
Internal to Wipro
# CROSS SITE
SCRIPTING
Cross-Site Scripting (XSS) is a client-side code
injection attack.
The attacker aims to execute malicious JavaScript's in
a web browser of the victim by including malicious
code in a legitimate web page or web application.
The actual attack occurs when the victim visits the
web page or web application that executes the
malicious code.
The web page or web application becomes a vehicle
to deliver the malicious script to the use’s browser.
Internal to Wipro
# TYPES OF XSS
• Reflected XSS
• Reflected attacks are those where the injected script
is reflected off the web server, such as in an error
message, search result, or any other response that
includes some or all of the input sent to the server as
part of the request.
• Stored XSS
• Stored attacks are those where the injected script is
permanently stored on the target servers, such as in a
database, in a message forum, visitor log, comment
field, etc.
• DOM XSS
• DOM-based XSS vulnerabilities usually arise when
JavaScript takes data from an attacker-controllable
source, such as the URL, and passes it to a sink that
supports dynamic code execution, such as eval() or
innerHTML.
Internal to Wipro
# HOW TO
PREVENT
Encode data on output
Validate input on arrival
Safe Sinks
Internal to Wipro
# CROSS SITE
REQUEST
FORGERY
Cross-site request forgery (also
known as CSRF) is a web security
vulnerability that allows an attacker
to induce users to perform actions
that they do not intend to perform.
In a successful CSRF attack, the
attacker causes the victim user to
carry out an action unintentionally
like state change activity.
Internal to Wipro
# WHY CSRF
Internal to Wipro
# HOW TO
PREVENT
Synchronizer Token Pattern
SameSite Cookie Attribute
User Interaction Based CSRF Defense
• One-time Token
• CAPTCHA
• 2MFA (2nd Multi Factor Authentication)
Double Submit Cookie
Verifying Origin
• CHECKING THE ORIGIN HEADER
• CHECKING THE REFERER HEADER
Internal to Wipro
• CHECKING THE ORIGIN HEADER CHECKING THE REFERER HEADER
# EXAMPLE
Internal to Wipro
Internal to Wipro

More Related Content

PPTX
Owasp top 10 vulnerabilities
PDF
Owasp top 10
PDF
CEHv13 Module 2: Footprinting and Reconnaissance.pdf
PDF
Web Security
PPTX
Web Application
PPSX
Key Challenges In CLOUD COMPUTING
PPTX
Xss attack
PPTX
Vulnerability assessment & Penetration testing Basics
Owasp top 10 vulnerabilities
Owasp top 10
CEHv13 Module 2: Footprinting and Reconnaissance.pdf
Web Security
Web Application
Key Challenges In CLOUD COMPUTING
Xss attack
Vulnerability assessment & Penetration testing Basics

What's hot (20)

PDF
OWASP Top 10 Web Application Vulnerabilities
PPTX
OWASP Top 10 2021 What's New
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
PPT
Secure code practices
PPTX
Vulnerabilities in modern web applications
PDF
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
PPTX
API Security Fundamentals
PPTX
Deep understanding on Cross-Site Scripting and SQL Injection
PPTX
Cross Site Scripting ( XSS)
PDF
Web Application Penetration Testing
PPTX
Sql injection
PPT
Introduction to Web Application Penetration Testing
PDF
Web Application Security and Awareness
PPT
Introduction To OWASP
PPTX
Broken Authentication and Authorization(1).pptx
PPTX
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PPTX
Command injection
PDF
Cross site scripting attacks and defenses
PPTX
Secure coding practices
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 2021 What's New
OWASP Top 10 2021 Presentation (Jul 2022)
Secure code practices
Vulnerabilities in modern web applications
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
API Security Fundamentals
Deep understanding on Cross-Site Scripting and SQL Injection
Cross Site Scripting ( XSS)
Web Application Penetration Testing
Sql injection
Introduction to Web Application Penetration Testing
Web Application Security and Awareness
Introduction To OWASP
Broken Authentication and Authorization(1).pptx
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Command injection
Cross site scripting attacks and defenses
Secure coding practices
Ad

Similar to OWASP TOP 10 VULNERABILITIS (20)

PPTX
Owasp top 10 Vulnerabilities by cyberops infosec
PDF
2022 APIsecure_Secure your APIs with WAF in AWS
PPTX
Cyber ppt
PPT
Owasp top 10
PPTX
Application Security Vulnerabilities: OWASP Top 10 -2007
PPTX
Codeinjection
PPT
WebApps_Lecture_15.ppt
PPTX
owasp features in secure coding techniques
DOCX
supraja technologies material for secure coding
PPT
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
PPTX
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
PPTX
Security testing zap it
PPTX
Security Testing - Zap It
PPT
OWASP App Sec US - 2010
PPTX
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
PPTX
Owasp top 10 web application security risks 2017
PPTX
OWASP -Top 5 Jagjit
PDF
OWASP Top 10 Project
PDF
Secure coding guidelines
Owasp top 10 Vulnerabilities by cyberops infosec
2022 APIsecure_Secure your APIs with WAF in AWS
Cyber ppt
Owasp top 10
Application Security Vulnerabilities: OWASP Top 10 -2007
Codeinjection
WebApps_Lecture_15.ppt
owasp features in secure coding techniques
supraja technologies material for secure coding
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
Security testing zap it
Security Testing - Zap It
OWASP App Sec US - 2010
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
Owasp top 10 web application security risks 2017
OWASP -Top 5 Jagjit
OWASP Top 10 Project
Secure coding guidelines
Ad

More from Null Bhubaneswar (16)

PDF
PPTX
Online_financial_fraud3
PPTX
Web App Pen Test
PDF
BurpSuiteOverview
PPTX
PPTX
Linux Basic Commands
PPTX
Intro to Reverse Engineering
PPTX
Lightweight static code analysis with semgrep
PPTX
Saying Hello to Bug Bounty
PPTX
Information Security 201
PPTX
Online_financial_fraud Episode 2
PPTX
Information Security 101
PPTX
PPTX
Online Financial Fraud
PPTX
Introduction_to_Cloud
PPTX
how_to_get_into_infosec
Online_financial_fraud3
Web App Pen Test
BurpSuiteOverview
Linux Basic Commands
Intro to Reverse Engineering
Lightweight static code analysis with semgrep
Saying Hello to Bug Bounty
Information Security 201
Online_financial_fraud Episode 2
Information Security 101
Online Financial Fraud
Introduction_to_Cloud
how_to_get_into_infosec

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.

OWASP TOP 10 VULNERABILITIS

  • 1. Internal to Wipro OWASP TOP 10 VULNERABILITES BY: ARYA ANINDYARATNA BAL
  • 2. Internal to Wipro # ABOUT ME > 6 yr. in Application Security OSCP, CRTP, ECSA MTech In CSIR, GFSU (NFSU) Like to Travel
  • 3. Internal to Wipro AGENDA OWASP Top 10 Vulnerabilities Injection Cross Site Scripting Cross Site Request Forgery
  • 4. Internal to Wipro OWASP TOP 10 : 2021 RELEASE A1 Broken Access Control A2 Cryptographic Failures A3 Injection A4 Insecure Design A5 Security Misconfiguration A6 Vulnerable and Outdated Components A7 Identification and Authentication Failures A8 Software and Data Integrity Failures A9 Security Logging and Monitoring Failures A10 Server-Side Request Forgery
  • 5. Internal to Wipro # WHO IS OWASP Worldwide not-for-profit organisation • Founded in 2001 OWASP – Open Web Application Security Project Mission to make the software security visible.
  • 6. Internal to Wipro OWASP TOP HISTORY 2003 2004 2007 2010 2013 2017 2021 A1 Unvalidated Input Unvalidated Input Cross Site Scripting (XSS) Injection Injection Injection Broken Access Control A2 Broken Access Control Broken Access Control Injection Flaws Cross-Site Scripting Broken Authentication and Session Management Broken Authentication Cryptographic Failures A3 Broken Authentication and Session Management Broken Authentication and Session Management Malicious File Execution Broken Authentication and Session Management Cross-Site Scripting Sensitive Data Exposure Injection A4 Cross Site Scripting Cross Site Scripting Insecure Direct Object Reference Insecure Direct Object References Insecure Direct Object References XML External Entities (XXE) Insecure Design A5 Buffer Overflow Buffer Overflow Cross Site Request Forgery (CSRF) Cross-Site Request Forgery Security Misconfiguration Broken Access Control Security Misconfiguration A6 Injection Flaws Injection Flaws Information Leakage and Improper Error Handling Security Misconfiguration Sensitive Data Exposure Security Misconfiguration Vulnerable and Outdated Components A7 Improper Error Handling Improper Error Handling Broken Authentication and Session Management Insecure Cryptographic Storage Missing Function Level Access Control Cross-Site Scripting Identification and Authentication Failures A8 Insecure Storage Insecure Storage Insecure Cryptographic Storage Failure to Restrict URL Access Cross-Site Request Forgery Insecure Deserialization Software and Data Integrity Failures A9 Application Denial of Service Application Denial of Service Insecure Communications Insufficient Transport Layer Protection Using Components with Known Vulnerabilities Using Components with Known Vulnerabilities Security Logging and Monitoring Failures A10 Insecure Configuration Management Insecure Configuration Management Failure to Restrict URL Access Unvalidated Redirects and Forwards Unvalidated Redirects and Forwards Insufficient Logging & Monitoring Server-Side Request Forgery
  • 7. Internal to Wipro # INJECTION Injection is most persistence vulnerability in the OWASP Top 10 list over the decade, particularly SQL Injection are the common in web applications as well as Mobile. Some of the more common injections are SQL, NoSQL, OS command, Server Sire Template Injection, LDAP injection etc... Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The hostile data tricks the interpreter into executing unintended commands or changing data.
  • 8. Internal to Wipro # HOW TO PREVENT • Do not pass user input directly to executable statements. • Use of Prepared Statements (with Parameterized Queries) • Use of Properly Constructed Stored Procedures • Allow-list Input Validation • Escaping All User Supplied Input • Enforcing Least Privilege • Performing Allow-list Input Validation as a Secondary Defense
  • 9. Internal to Wipro # CROSS SITE SCRIPTING Cross-Site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious JavaScript's in a web browser of the victim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious code. The web page or web application becomes a vehicle to deliver the malicious script to the use’s browser.
  • 10. Internal to Wipro # TYPES OF XSS • Reflected XSS • Reflected attacks are those where the injected script is reflected off the web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request. • Stored XSS • Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. • DOM XSS • DOM-based XSS vulnerabilities usually arise when JavaScript takes data from an attacker-controllable source, such as the URL, and passes it to a sink that supports dynamic code execution, such as eval() or innerHTML.
  • 11. Internal to Wipro # HOW TO PREVENT Encode data on output Validate input on arrival Safe Sinks
  • 12. Internal to Wipro # CROSS SITE REQUEST FORGERY Cross-site request forgery (also known as CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. In a successful CSRF attack, the attacker causes the victim user to carry out an action unintentionally like state change activity.
  • 14. Internal to Wipro # HOW TO PREVENT Synchronizer Token Pattern SameSite Cookie Attribute User Interaction Based CSRF Defense • One-time Token • CAPTCHA • 2MFA (2nd Multi Factor Authentication) Double Submit Cookie Verifying Origin • CHECKING THE ORIGIN HEADER • CHECKING THE REFERER HEADER
  • 15. Internal to Wipro • CHECKING THE ORIGIN HEADER CHECKING THE REFERER HEADER # EXAMPLE

Editor's Notes

  • #15: As double submit cookie verifies only the token in the cookie and body are same, then there a possibility that if application have session fix-session(if session token used as part of double submit cookie) or XSS (with HttpOnly flag not set) attacker can set the cookie value manually and same cookie value set in the CSRF POC.