OWASP Top 10 Vulnerabilities 2021 Revealed


Infosectrain

Uploaded on Nov 17, 2021

Category Education

Open Web Application Security Project acronym OWASP is an online community that creates web application security articles, approaches, documentation, tools, and technologies. It is a non-profit organization designed to boost web application security.

Category Education

Comments

                     

OWASP Top 10 Vulnerabilities 2021 Revealed

OWASP Top 10 Vulnerabilities 2021 Revealed www.infosectrain.com | [email protected] Open Web Application Security Project acronym OWASP is an online community that creates web application security articles, approaches, documentation, tools, and technologies. It is a non-profit organization designed to boost web application security. www.infosectrain.com | [email protected] What is the OWASP Top 10? The OWASP Top 10 is a list of the top ten most prevalent web application vulnerabilities. It also depicts the threats, consequences, and countermeasures. The main goal is to increase awareness and provide a framework for prioritizing application security initiatives. The OWASP Top 10 can be used to address the most prevalent threats and vulnerabilities that put your company at risk. The most recent OWASP vulnerabilities list was produced in 2021, and it is updated every three to four years. www.infosectrain.com | [email protected] What is a vulnerability in cyber security? Let us first understand what a vulnerability is in general to comprehend OWASP’s Top 10 vulnerabilities. Any flaw in an organization’s information systems, internal controls, or system processes that cybercriminals can exploit is referred to as a cybersecurity vulnerability. Cybersecurity vulnerabilities are critical to monitor in terms of your organization’s overall security posture, as network weaknesses can lead to a full-scale system breach. Cyber adversaries might get access to your system and collect data by exploiting points of weakness. www.infosectrain.com | [email protected] www.infosectrain.com | [email protected] What are the OWASP Top 10 vulnerabilities for 2021? www.infosectrain.com | [email protected] 1. Broken Access Control: In the OWASP Top 10 list for 2021, broken access control is one of the most hazardous web application vulnerabilities. It was previously thought to be a small risk. Access control is a security approach that regulates who or what can view or utilize IT resources. It is an essential security concept that reduces the risk to the company or organization. When users can access a resource or perform an action that they are not meant to do, they have a broken access control vulnerability. Broken access controls are a common and often severe security flaw. It had more occurrences in applications than any other category, as mapped by 34 CWEs. www.infosectrain.com | [email protected] 2. Cryptographic Failures: Cryptographic Failure was formerly known as Sensitive Data Exposure, and it jumped from third to second place on the 2021 list. It focuses on cryptographic failures, which frequently result in the exposing of sensitive data or system compromise. Cybersecurity specialists use cryptography to create algorithms, ciphertext, and other security measures that codify and secure company and consumer information. Cryptography, in simple terms, is the study of secure communications techniques that allow only the sender and intended recipient of a message to read its contents. It is used to keep private passwords and other sensitive information safe online. www.infosectrain.com | [email protected] 3. Injection: Injection flaws occur when untrusted user data is sent to the web application as part of a command or query. Injection happens when a cyber attacker injects malicious data into a web application, handled in an unsafe way. The attacker’s malicious data can cause the web application to run unintended commands or access unauthorized information. Injection drops to third place on the OWASP Top 10 list. In this edition, cross-site scripting has been added to this category. SQL injections, Cross-Site Scripting (XSS), NoSQL injection, code injection, OS command injection, host header injection, and other types of injection attacks are among the most prevalent ones. These injection attacks target the following functionality: • Structured Query Language (SQL) query • Operating System (OS) commands • XML path language (XPATH) query • Lightweight Directory Access Protocol (LDAP) query www.infosectrain.com | [email protected] 4. Insecure Design: Insecure Design is a brand-new category for OWASP Top 10 2021, focusing on the risks of design faults. Insecure design occurs when a vendor adds documented “features” to a product that allow an attacker to undermine the application’s availability or integrity. Because appropriate security safeguards were never built to fight against specific threats, and a perfect implementation cannot repair unsafe design. OWASP recommends, “We need more threat modeling, safe design patterns and principles, and reference architectures if we genuinely want to “move left” as an industry.” www.infosectrain.com | [email protected] 5. Security Misconfiguration: Simply put, Security Misconfiguration is the failure to implement all of a web application’s security controls or the implementation of security controls with mistakes. The former category for XML External Entities (XXE) is now a part of this risk category, which rises from the sixth position in the previous edition. 6. Vulnerable and Outdated Components: Any software or code that is vulnerable, unsupported, or out of date falls into the Vulnerable and Outdated Components category. It has climbed up from the ninth place and was formerly named ‘Using Components with Known Vulnerabilities.’ www.infosectrain.com | [email protected] 7. Identification and Authentication Failures: The ability to uniquely identify a system user or application operating on the system is known as identification. Authentication refers to the capacity to establish that a user or application is who they claim to be. The Identification and Authentication Failure leads to the exploitation of user credentials and data breaches. When a user’s identification and authentication are not handled properly, attackers can leverage passwords, keys, session tokens, or implement vulnerabilities to temporarily or permanently assume users’ identities. It replaced Broken Authentication as the second most common CWE and now covers CWEs more closely tied to identification failures. www.infosectrain.com | [email protected] 8. Software and Data Integrity Failures: In 2021, a new category called Software and Data Integrity Failures will focus on making assumptions about software updates, essential data, and CI/CD pipelines without validating integrity. This category now includes Insecure Deserialization. 9. Security Logging and Monitoring Failures: Security Logging and Monitoring Failures were formerly Insufficient Logging and Monitoring. It has been included in the OWASP Top 10 survey, going up from the tenth position. Errors in detecting, escalating, and responding to active breaches fall within this category. It is impossible to detect breaches without logging and monitoring. A website compromise might be significantly worse if you don’t have a good logging and monitoring system in place. www.infosectrain.com | [email protected] 10. Server-Side Request Forgery: Server-Side Request Forgery or SSRF is a web security flaw that allows an attacker to force a server-side application to send HTTP requests to any domain the attacker chooses. This category depicts a scenario in which security community members tell us something is essential even though it isn’t depicted in the data. What is the importance of the OWASP Top 10? The OWASP Top 10 helps organizations understand, identify, mitigate, and correct vulnerabilities in their applications by giving them a priority over which risks to focus on. Each vulnerability is assigned a priority based on its prevalence, detectability, impact, and exploitability. www.infosectrain.com | [email protected] www.infosectrain.com | [email protected] Final Words: Over the last four years, the threats to application security have evolved. Three new categories: Insecure Design, Software, and Data Integrity Failures, and Server-Side Request Forgery, were added to the OWASP Top 10 list in 2021 and numerous categories combined with others. We at InfosecTrain are dedicated to helping you detect and combat these vulnerabilities in your IT systems and application software, thus helping protect your organizations. Enroll in our  CEHv11 online training and certification course or various other security training courses to learn more about cybersecurity vulnerabilities and multiple countermeasures. Learn with our qualified instructors. www.infosectrain.com | [email protected] About InfosecTrain • Established in 2016, we are one of the finest Security and Technology Training and Consulting company • Wide range of professional training programs, certifications & consulting services in the IT and Cyber Security domain • High-quality technical services, certifications or customized training programs curated with professionals of over 15 years of combined experience in the domain www.infosectrain.com | [email protected] Our Endorsements www.infosectrain.com | [email protected] Why InfosecTrain Global Learning Partners Certified and Flexible modes Access to the Experienced Instructors of Training recorded sessions Post training Tailor Made completion Training www.infosectrain.com | [email protected] Our Trusted Clients www.infosectrain.com | [email protected] Contact us Get your workforce reskilled by our certified and experienced instructors! IND: 1800-843-7890 (Toll Free) / US: +1 657-221- 1127 / UK : +44 7451 208413 [email protected] www.infosectrain.com