AppSec Blog

Spot the Vuln - Percentage - Cross Site Scripting

Details Affected Software: Sermon Browser WordPress Plugin Fixed in Version: .44 Issue Type: Cross Site Scripting Original Code: Found Here Details There is a lot going on here in this code snippet. First, let's talk about the patch. The patch adds a check to ensure the user requesting has the rights to edit a post. … Continue reading Spot the Vuln - Percentage - Cross Site Scripting


Spot the Vuln - Percentage

100 per cent of us die, and the percentage cannot be increased. C.S. Lewis Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code snippet is posted. Take a look at the vulnerable code and try to identify where the security … Continue reading Spot the Vuln - Percentage


Checklists, software and software security

There are practical applications of checklists in many different fields. Aviation, project engineering, now even surgery. But what about software? Sure, checklists are sometimes used in code reviews, to good effect. But can we do more, can we get the same thing out of checklists that pilots do, or that surgeons do? Continue reading Checklists, software and software security


Spot the Vuln - Bases - Cross Site Scripting

Details Affected Software: Ask Apache Password Protect Fixed in Version: 4.6 Issue Type: Cross Site Scripting Original Code: Found Here Details Pretty straightforward XSS here. On line 150we see that the author calls print_r on $_SERVER. $_SERVER is full of tainted variables and print_r will print all of tainted values resulting in XSS. The developers … Continue reading Spot the Vuln - Bases - Cross Site Scripting


Agile Security for Product Owners - Requirements

Much of cumulative application security knowledge and tools are aimed at detection, rather than prevention, of vulnerabilities. This is a natural consequence of the fact that the primary job of many information security analysts is to look for security vulnerabilities and provide high level remediation suggestions rather than be involved in detailed remediation efforts. Another … Continue reading Agile Security for Product Owners - Requirements