Hands-On Web Penetration Testing with Metasploit
上QQ阅读APP看书,第一时间看更新

SANS TOP 25

The SANS Top 25 list is a collaboration between the SANS Institute, MITRE, and many top software security experts in the US and Europe. It consists of the following vulnerabilities:

  • Improper neutralization of special elements used in a SQL command ('SQL injection')
  • Improper neutralization of special elements used in an OS command ('OS command injection')
  • Buffer copy without checking the size of the input ('classic buffer overflow')
  • Improper neutralization of the input during web page generation ('cross-site scripting')
  • Missing authentication for a critical function
  • Missing authorization
  • Use of hardcoded credentials
  • Missing encryption of sensitive data
  • Unrestricted upload of a file of a dangerous type
  • Reliance on untrusted inputs in a security decision
  • Execution with unnecessary privileges
  • Cross-site request forgery (CSRF)
  • Improper limitation of a pathname to a restricted directory ('path traversal')
  • The downloading of code without an integrity check
  • Incorrect authorization
  • Inclusion of a functionality from an untrusted control sphere
  • Incorrect permission assignment for a critical resource
  • Use of a potentially dangerous function
  • Use of a broken or risky cryptographic algorithm
  • Incorrect calculation of buffer size
  • Improper restriction of excessive authentication attempts
  • URL redirection to an untrusted site ('open redirect')
  • Uncontrolled format string
  • Integer overflow or wraparound
  • Use of a one-way hash without a salt

We will cover some of these vulnerabilities in detail in later chapters of this book.