awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.” https://owasp.org/www-project-top-ten/ Other reports https://owasp.org/www-pdf-archive/ 4
ALL SELECT concat_ws(0x3a, version(), user(), database())-- [email protected]' UNION ALL SELECT TABLE_NAME FROM information_schema.TABLES WHERE table_schema=database()-- 11
WHERE email= '" + email + "'" mysqlDriver.execRaw(query) mysqlDriver.execRaw("SELECT email FROM user WHERE email='[email protected]' UNION ALL SELECT concat_ws(0x3a, version(), user(), database())") 12
to the sensitive endpoints ▪ Limit or increasingly delay the failed logins ▪ I don’t even mention to use a server side and securely generated session id etc 23
loss of availability on critical businesses but there are usually stable update channels for OSs, libraries or apps. Stable channels always contain critical patches. 34
* and configuring a radical one will solve most of the critical effects of XSS. ▪ Escape ▪ Escape * https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP 44
very well prepared guide shows how to avoid the XSS https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_ Scripting_Prevention_Cheat_Sheet.html 45
tools like snyk.io (my favourite), OWASP has some open source tools ▪ Scan containers - Gitlab uses an open source project Klar □ Google Cloud has it as a free service ▪ React to vulnerability reports ▪ Recommended to add to Ci/Cd pipelines before going live 53