AppSec Blog

Password Tracking in Malicious iOS Apps

In this article, John Bielich and Khash Kiani introduce OAuth, and demonstrate one type of approach in which a malicious native client application can compromise sensitive end-user data. Earlier this year, Khash posted a paper entitled: "Four Attacks on OAuth - How to Secure Your OAuth Implementation" that introduced a common protocol flow, with specific … Continue reading Password Tracking in Malicious iOS Apps


The C14N challenge

Failing to properly validate input data is behind at least half of all application security problems.In order to properly validate input data, you have to start by first ensuring that all data is in the same standard, simple, consistent format - a canonical form. This is because of all the wonderful flexibility in internationalization and … Continue reading The C14N challenge


Spot the Vuln - Boundaries - SQL Injection

Details Affected Software: My Calendar WordPress Plugin Fixed in Version: >1.7.2 Issue Type: SQL Injection Original Code: Found Here Details This week's bug was a subtle mistake in the usage of an escaping routine. It seems the developer understood the dangers of SQL injection and therefore used an escaping routine to sanitize user controlled input … Continue reading Spot the Vuln - Boundaries - SQL Injection


Spot the Vuln - Boundaries

I like pushing boundaries. Lady Gaga Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code snippet is posted. Take a look at the vulnerable code and try to identify where the security vulnerability is. Every Friday, a solution is posted … Continue reading Spot the Vuln - Boundaries


Spot the Vuln - Floods - SQL Injection

Details Affected Software: Corpse C&C Fixed in Version: ? Issue Type: SQL Injection Original Code: Found Here Details This week's bug is in Corpse C&C. SpotTheVuln reader Christina hits it right on the head, line 32 contains a ridiculous amount of SQL injection. Most of the parameters passed to the INSERT statement results in SQL … Continue reading Spot the Vuln - Floods - SQL Injection