AppSec Blog: Category - Top25

Top 25 Series - Rank 16 - Information Exposure Through an Error Message

Error messages can leak everything from full path names to password. A user should never be exposed to them, unless you expect them to fix the problem for you. Continue reading Top 25 Series - Rank 16 - Information Exposure Through an Error Message


Top 25 Series - Rank 15 - Improper Check for Unusual or Exceptional Conditions

CWE-754 happens when "software does not check or improperly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the software." [1] Take the following snippet of Java code as an example: private static final int ROLE_ADMIN = 0; private static final int ROLE_USER = 1; … Continue reading Top 25 Series - Rank 15 - Improper Check for Unusual or Exceptional Conditions


Top 25 Series - Rank 14 - Improper Validation of Array Index

Improper Validation of Array Index (CWE-129) is a flaw related to improper use of user input. Most programming languages has support for array structure. Objects within the array can be indexed by numeric value such as [0] which points to the first object in the array or [5] which points to the 6th object in … Continue reading Top 25 Series - Rank 14 - Improper Validation of Array Index


Top 25 Series - Rank 13 - PHP File Inclusion

Last year, when we got going with our web honeypot, we quickly found that file PHP file inclusion vulnerabilities are by far the #1 exploit the honeypot was exposed to [1]. In part, this may have been due to us heavily emulating PHP applications. But many of the exploits didn't match any of the installed … Continue reading Top 25 Series - Rank 13 - PHP File Inclusion


Top 25 Series - Rank 12 - Buffer Access with Incorrect Length Value

Buffer Access with Incorrect Length Value (CWE-805) is in close relationship with Classic buffer overflow (CWE-120). Class buffer overflow is caused by copying buffer without checking for length. Buffer Access with Incorrect Length when length is in consideration but the actual length defined is not sufficient. The end result of this vulnerability is buffer overflow. … Continue reading Top 25 Series - Rank 12 - Buffer Access with Incorrect Length Value