Tag: owasp-top10
Privilege escalation happens when a malicious user gains elevated access to resources that should be unavailable to them.
Unauthenticated LDAP requests can allow untrusted access to LDAP servers.
Constructing path names with unsanitized user input can lead to path traversal attacks (for example, ../../..
) that allow an attacker access to file system resources.
Weak file permissions can lead to privilege escalation.
Writing unsanitized user data to a file is unsafe.
Objects that parse or handle XML can lead to XML External Entity (XXE) attacks when misconfigured.
Improper input validation can enable attacks and lead to unwanted behavior.
Your code doesn't sufficiently authenticate identities provided by its users.
Insecure cookies can lead to unencrypted transmission of sensitive data.
Potentially unsanitized user input in XPath queries can allow an attacker to control the query in unwanted or insecure ways.
Missing authorization checks can lead to unauthorized access to a resource or performance of an action.
Use of untrusted inputs in a SQL database query can enable attackers to read, modify, or delete sensitive data in the database
Lack of validation of a security certificate can lead to host impersonation and sensitive data leaks.
User-controlled input that specifies a link to an external site could lead to phishing attacks and allow user credentials to be stolen.
Stack traces can be hard to use for debugging.
Constructing operating system or shell commands with unsanitized user input can lead to inadvertently running malicious code.
Logging unencrypted AWS credentials can expose them to an attacker.
Encryption that is dependent on conditional logic, such as an if...then
clause, might cause unencrypted sensitive data to be stored.
Insufficiently restrictive file uploads can lead to inadvertently running malicious code.
Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.
Binding the socket with an empty IP address can introduce security risks.
Cross-Origin Resource Sharing policies that are too permissive may lead to security vulnerabilities.
Insecure configuration can lead to a cross-site request forgery (CRSF) vulnerability.
Weak algorithm used for Password Hashing. Consider using stronger algorithms, such as Argon2, PBKDF2, or scrypt.
Exposure of sensitive information can lead to an unauthorized actor having access to the information.
Passing an unsanitized user argument to a function call makes your code insecure.
Public method parameters should be validated for nullness, unexpected values, and malicious values.
Weak, broken, or misconfigured cryptography can lead to security vulnerabilities.
Relying on potentially untrusted user inputs when constructing web application outputs can lead to cross-site scripting vulnerabilities.
Insecure ways of creating temporary files and directories can lead to race conditions, privilege escalation, and other security vulnerabilities.
Deserialization of untrusted objects can lead to security vulnerabilities such as inadvertently running remote code.
Obsolete, broken, or weak hashing algorithms can lead to security vulnerabilities.
Using AutoAddPolicy
or WarningPolicy
can allow a malicious server to impersonate a trusted server.
Using untrusted inputs in a log statement can enable attackers to break the log's format, forge log entries, and bypass log monitors.
Weak obfuscation while configuring a web request.
Scripts generated from unsanitized inputs can lead to malicious behavior and inadvertently running code remotely.
Credentials, such as passwords and access keys, should not be hardcoded in source code.
Insufficient sanitization of potentially untrusted URLs on the server side can allow server requests to unwanted destinations.
Untrusted user imports in the importlib.import_module()
function allow attacks.
Pickling issues on Cloudpickle Load.
LDAP queries that rely on potentially untrusted inputs can allow attackers to read or modify sensitive data, run code, and perform other unwanted actions.
Credentials that are stored in clear text can be intercepted by a malicious actor.