Categories: Application Security

OWASP 2017 Top 10 Web App Security Vulnerabilities

The following is a list of web application security vulnerabilities which made into the list of OWASP 2017 top 10 security vulnerabilities.

  • Injection: Injection attack can lead to commands such as SQL, NoSQL, OS, LDAP executed by the related command interpretor resulting into execution of unintended commands thereby modifying the datasets or providing unauthorized access to the data.
  • Broken authentication: Broken authentication attacks can lead to compromising passwords, keys or session tokens etc.
  • Sensitive data exposure: Sensitive data exposure vulnerability would allow attackers to get an access to sensitive data such as identity related data (email address, mobile numbers), credit card related details etc. These data can be obtained from data at rest (database, file systems etc) or data in transit (data exchanged between browser and server).
  • XML External Entities (XXE):
  • Broken access control: Proper access control would make sure that unauthorized users are not able to access or change the data which they are not allowed to do so. With broken access control, authenticated users would be able to access or change the data whether or not he / she is authorized to do so.
  • Security misconfiguration: One of the most common instance of security misconfiguration is verbose error message or stack trace of error message. Another instance is display of server version at times when server is not accessible. These, primarily, occurs due to incomplete or adhoc configuration or usage of default configurations.
  • Cross-site scripting (XSS): Cross-site scripting attack can lead to attacker inject the script or HTML into the DOM tree which can, in turn, alter / modify the DOM tree leading to display of unwanted data on the web page. Imagine a user inserting a img tag as a comment. In case, the data is not properly escaped, the img tag when displayed as comment would result in loading the image on the webpage resulting into distortion of page or display of abusive images.
  • Insecure deserialization: Insecure deserialization can often lead to remote code execution. This attack can be used to perform attacks such as replay attacks or injection attacks.
  • Components with known vulnerabilities: Many a times, our applications end up using various open-source packages/libraries without us focusing on the security vulnerabilities found in those packages. These security vulnerabilities in external packages / libraries can be exploited by the hackers/ attackers to attack the web app. Take an example of a MEAN web app using one or more NPM packages. If these packages consist of one or more security vulnerability, these can as well be used by hackers / attackers to compromise the web application making use of these packages.
  • Insufficient logging and monitoring: This is self-explanatory.

The details can be found on this page / pdf document, OWASP 2017 Top 10.


Ajitesh Kumar

I have been recently working in the area of Data analytics including Data Science and Machine Learning / Deep Learning. I am also passionate about different technologies including programming languages such as Java/JEE, Javascript, Python, R, Julia, etc, and technologies such as Blockchain, mobile computing, cloud-native technologies, application security, cloud computing platforms, big data, etc. I would love to connect with you on Linkedin. Check out my latest book titled as First Principles Thinking: Building winning products using first principles thinking.

Share
Published by
Ajitesh Kumar

Recent Posts

How Indexing Works in LLM-Based RAG Applications

When building a Retrieval-Augmented Generation (RAG) application powered by Large Language Models (LLMs), which combine…

21 hours ago

Retrieval Augmented Generation (RAG) & LLM: Examples

Last updated: 25th Jan, 2025 Have you ever wondered how to seamlessly integrate the vast…

1 day ago

What are AI Agents? How do they work?

Artificial Intelligence (AI) agents have started becoming an integral part of our lives. Imagine asking…

3 weeks ago

Agentic AI Design Patterns Examples

In the ever-evolving landscape of agentic AI workflows and applications, understanding and leveraging design patterns…

3 weeks ago

List of Agentic AI Resources, Papers, Courses

In this blog, I aim to provide a comprehensive list of valuable resources for learning…

3 weeks ago

Understanding FAR, FRR, and EER in Auth Systems

Have you ever wondered how systems determine whether to grant or deny access, and how…

3 weeks ago