|
What are the most common vulnerabilities attackers can exploit?
Unplanned information disclosure
.
- Primary cause: improper error settings .
- Could also be the result of insufficient authorization
- White Hat: 55% of websites are vulnerable
Predictable resource location
.
- Examples:
- Obvious folder names: e.g. Administrator
- Obvious database column names: e.g. Password .
- Not modifying defaults .
- White Hat: 8% of websites are vulnerable
Insufficient authorization
.
- The PHP user and filesystem rights
- Too many rights in the database .
- Allowing access to secure data from insecure pages
- White Hat: 11% of websites are vulnerable
Improper access controls
.
- Improper password handling
- Improper password storage .
PHP misconfiguration
.
- Not setting php.ini directives properly
- Paths and directories .
- Remote code inclusion .
- Disabling classes or functions .
- Misconfiguring php.ini for file uploads .
- Running PHP as a CGI binary .
Mishandling file uploads
.
- Failure to treat suspect fields:
- $_FILES["field"]["name"]:
- $_FILES["field"]["type"]
- Failure to verify file uploaded correctly
- Failure to move to a secure location
|
|