Never-ending Vulnerabilities
The digital age has opened the door for a seemingly endless number of cybersecurity vulnerabilities. In order to keep track, Open Web Application Security Project® (OWASP), provides a top 10 list of known and newly discovered vulnerabilities. Focused on software security, OWASP is an online community that provides documentation and other reference tools to help IT Professionals stay up-to-date on web security trends, It is well known for its OWASP Top 10 list, which features what are broadly agreed to be the most critical web application security risks.
The sheer volume of vulnerabilities makes an adaptable, layered cybersecurity solution more important than ever. While some vulnerabilities are latent and low on the scale of exploitation, we do keep a list of active and highly exploitable vulnerabilities.
Broken Access Control
Access control is a security setting that grants permissions for users of a certain security level. Broken access control lets attackers impersonate or bypass user permissions and access high-level, sensitive information and data that’s above their permission setting. This leads to data corruption, loss, and modifications.
Cryptographic Failures and Sensitive Data Exposure
A sensitive data exposure happens when a company exposes its sensitive data unknowingly. This data exposure can lead to sensitive data being destroyed, tampered with, or illegally leaked. This type of exposure occurs when there is faulty database protection, access misconfigurations, and incorrectly used data systems.
Sensitive data exposure can be:
- Confidentiality breach, which is unauthorized disclosure of sensitive data.
- Integrity breach, where sensitive data undergoes alteration.
- Availability breach, when sensitive data is temporarily or permanently destroyed, unavailable, or inaccessible.
Injection Vulnerabilities and Cross Site Scripting
An injection vulnerability is a weakness in an application where an attacker can inject coding or partial code and compromises backend systems and clients connected to that application.
This attack can allow a cybercriminal to target and execute system calls on connected machines, compromise backend data storage, hijack user sessions, and/or imitate or force actions as other users. These attacks are not difficult to use against an application. Application scanning during development and after launch helps detect known and unknown flaws that can be corrupted.
Cross Site Scripting
Cross-Site scripting, also known as XSS, is a type of code injection attack, malicious scripting is injected into a trusted website. A web application sends this malicious code, typically as a browser side scripting, to an end user. The weaknesses this code creates a site-wide attack range, whenever this specific web application is being used as an input point for users on the website.
The end user doesn’t see the malicious XSS script, and their browser believes it’s coming from a trusted source, executes the script, and then that attack script can access cookies, session tokens, and other sensitive data that is being stored in that browser.
Insecure Design
Insecure Design represents a large variety of weaknesses. Factors that make a design insecure are the lack of business risk profiling within the software and system being developed, which leads to weaknesses depending on the level of security required in the design. Insecure Design is listed as “missing or ineffective control over design”. Insecure design is different from Insecure Implementation because design flaws aren’t in the same category as implementation defects. The base causes for each weakness requires a different remediation solution. Secure design can still have implementation defects and insecure design isn’t fixed with perfect implementation.
Security Misconfiguration and XML External Entities
Security misconfigurations are when there are no security settings implemented or the ones that have been put in place have errors within the settings. Many security errors happen when a system admin doesn’t update, change, or enable a device or application security system.
Leaving security settings in the default position, not engaging them, or not reverting temporary configurations can leave easy vulnerability access. Other errors that can leave security settings wide-open are unpatched flaws, unused pages, unnecessary features, inadequate control access, disabled antivirus, vulnerable XML files, and poor hardware management.
XML External Entities
An XML External Entity attack occurs when an application uses an XML input that has a weak configured parser. An XML entity is a type of data storage system that can access remote and local data through a system identifier. This type of attack is part of the application processing the XML file, an attacker uses the application’s trust to maliciously redirect to other unprotected internal systems. A successful breach can expose confidential data, create a denial-of-service error, expose server-side forgery requests, and parser machine port scanning.
Vulnerable Outdated Components
Open-source applications can contain known vulnerabilities and organizations that utilize these components can have weaknesses they’re unaware of. Cyberattackers search for these applications and APIs and create an easy target without creating a new, specific attack. Staying up to date on the latest updates and patches along with the right cybersecurity can help eliminate these unknown threats.
Identification and Authentication Failures and Broken Authentication
Broken authentication attacks try to use an existing account to give the attacker high-level privileges to enter higher secure data areas. Authentication is broken when passwords, session token keys, account information, or user identities are compromised.
Poorly implemented session and authentication management are the top reasons this vulnerability is widely exploited. If the access controls have predictable login credentials, unprotected authentication credentials, exposed session IDs, no logout time outs, or login information that’s transmitted over unencrypted connections, then there’s a chance an attacker and use any of these credentials to bypass security and access sensitive data.
Software and Data Integrity Failures and Insecure Deserialization
Considered one of the biggest critical security vulnerabilities, insecure deserialization bugs are one of the most dangerous and difficult to defend against. Insecure deserialization is created by an attacker that manipulates a serialized object to cause unpredictable consequences within programming. This code can be remotely executed and can grant cybercriminals a wide range of capabilities with that application.
There are multiple factors to prevent this type of attack, unique to the organizational security implemented. There is no “one size fits all” in security, but, creating a layered offensive security bundle is the best way to ensure strong security against this attack.
Security Monitoring and Logging Failures and Insufficient Logging and Monitoring
Security admins use logging and monitoring to help detect potential threats through analyzing patterns and finding abnormal ones. This is the basis for all cybersecurity. However, with insufficient logging and monitoring, an organization is left wide open to an attack. Attacks that can circumvent insufficient logging and monitoring rank incredibly high when it comes to the considerable damage that can be caused. Almost every major security incident that occurs from an exploitation like this is major. Without sufficient logging and monitoring, the attack surface area is wide-open leaving multiple targets vulnerable to maximum damage that’s nearly undetectable.
Server-Side Request Forgery (SSRF) NEW 2021
Server-Side Request Forgery (SSRF) happens when a web application fetches a remote resources and doesn’t validate the given URL. Attackers can use this URL application to send a customized request that sends the request to an unexpected destination. Firewall, VPN, and other types of network access cannot protect against this type of cyberattack.
Modern web applications have convenient features that direct end-users, which makes an SSRF attack much more commonplace. The severity of an SSRF attack is incredibly high because of the complexity of cloud features and services.
Vulnerability Solutions
There’s no single quick fix for security vulnerabilities. It may be necessary to have a suite of scanning and assessment solutions, depending on the application development cycle.
BeSECURE is a powerful yet flexible vulnerability management solution. Designed with simplicity in mind, it balances speed and accuracy so your IT department can maximize their time prioritizing the biggest security threats.
BeSTORM is a dynamic application security tool (DAST) that includes a Black Box Fuzzer, enabling it to attack your network and applications the same way a criminal would. Black Box Fuzzing creates real-world scenarios before a product is launched, so weaknesses can be found in the developmental phase, and remediate before deployment.
BeSOURCE is a static application security tool (SAST) that can be integrated into the DevOps and SecOps. SAST security tests differently than DAST, instead of real-world attacking capabilities, it’s a guided, planned route attack strategy. Adding a guided security solution into the continuous integration/continuous delivery development function helps discover known scanned application vulnerabilities before a product is released.
Frontline Web Application Security (WAS) scans web application data and transactions, keeping them secure. Frontline WAS delivers unrivaled accuracy and has minimal resource usage. Frontline WAS is easy to deploy and maintain, making it a favorite of security professionals. The accurate scanning results and simplicity makes it one of the best web application scanning tools.
Frontline Web Application Penetration Test (WAPT) tests web applications that have been internally developed and third-party applications to identify and discover potential weaknesses. Not just a software scan, Frontline WAPT uses a variety of automated tools to detect SQL insertion, improper character filtering, cross-site scripting, buffer overflows, and more.
Most Common High Risk Vulnerabilities:
- Microsoft Windows HTTP.sys Code Execution Vulnerability
- OpenSSH Trusted X11 Cookie Connection Policy Bypass Vulnerability
- OpenSSH Privilege Separation Monitor Weakness
- OpenSSL Running Version Prior to 0.9.8zc POODLE
- Mountable NFS Shares
- Apache APR apr_palloc Heap Overflow
- .NET Framework and Microsoft Silverlight Allows Code Execution (MS11-039)
- Combined Security Update(MS12-034)
- Internet Explorer 8 Allows Code Execution(KB2847140)
- Cisco SSH Malformed Packet DoS
- Insecure Library Loading Allows Code Execution (KB2269637)
- Vulnerabilities in Windows Kernel-Mode Drivers Allow Elevation of Privilege (MS12-047)
- Vulnerabilities in Elevation of Privilege Using Windows Service Isolation Bypass (982316)
- PHP Running Version Prior to 5.2.15
- Unauthorized Digital Certificates Allow Spoofing (KB2728973)
- VMware ESX Running Version Prior to 4.1
- OpenSSL Running Version Prior to 1.0.1i
- Oracle Java SE Multiple Vulnerabilities (October 2010 CPU)
- Oracle Java SE Multiple Vulnerabilities (June 2011 CPU)
- Multiple Vendor IPMI ‘cipher zero’ Authentication Bypass Vulnerability
- Vulnerabilities in MySQL Unsupported Version Detection
- Vulnerabilities in Server Service Allows Code Execution (MS08-067, Network)
- Vulnerabilities in Group Policy Allows Code Execution (MS15-011)
- Vulnerabilities in Apache Running Version Prior to 2.2.28
- Vulnerabilities in PHP CGI Query String Code Execution
- Vulnerabilities in SQL Injection
- Vulnerabilities in Cross Site Scripting
- Vulnerabilities in Custom Web Code
- Vulnerabilities in VMware ESXi 3.5
- Vulnerabilities in PHP Running Version Prior to 5.3.11
- Vulnerabilities in NSClient Default Password
- Vulnerabilities in PHP Unsupported Version Detection
- .NET Framework Allows Code Execution (MS11-044)
- .NET Framework Allows Code Execution (MS11-028)
- Vulnerabilities in Microsoft XML Core Services Allows Code Execution (KB2719615)
- Vulnerabilities in Microsoft SQL Server Allows Code Execution (MS09-004,KB959420)
- Vulnerabilities in PHP Running Version Prior to 5.3.26
- Vulnerabilities in PHP Running Version Prior to 5.3.22
- Vulnerabilities in .NET Framework and Microsoft Silverlight Allow Code Execution (MS12-016)
- Vulnerabilities in Flash Player Running Version Prior to 10.3.183.75 / 11.7.700.169 (APSB13-14)
- Vulnerabilities in Remote Portmapper Forwards NFS Requests
- Flash Player Running Version Prior to 11.7.700.232 / 11.8.800.94 (APSB13-17)
- Windows 2000 Unsupported Installation Detection
- Flash Player Running Version Prior to 10.3.183.68 / 11.6.602.180 (APSB13-09)
- Flash Player Running Version Prior to 10.3.183.75 / 11.7.700.169 (APSB13-11)
- Flash Player Running Version Prior to 10.3.183.15 / 11.7.102.62 (APSB12-05)
- Flash Player Running Versions Prior to 10.3.183.15 / 11.1.102.62 (APSB12-03)
- Flash Player Running Versions Prior to 10.3.183.10 / 11.0.1.152 (APSB11-28)
- Flash Player Running Version Prior to 10.3.183.67 / 11.6.602.171 (APSB13-08)
- Flash Player Running Version Prior to 10.3.183.51 / 11.5.502.149 (APSB13-05)
- Flash Player Running Version Prior to 10.3.183.50 / 11.5.502.146 (APSB13-04)
- Sun Java JRE Unsupported Version
- Flash Player Running Version Prior to 10.3.183.7 (APSB11-26)
- PHP Running Version Prior to 5.3.13
- Flash Player Running Version Prior to 10.3.183.43 / 11.5.502.110 (APSB12-27)
- Flash Player Running Version Prior to 10.3.183.48 / 11.5.502.135 (APSB13-01)
- Flash Player Running Version Prior to 10.3.183.43 / 11.5.502.110 (APSB12-24)
- Flash Player Running Version Prior to 10.3.183.24 / 11.4.402.279 (APSB12-22)
- Flash Player Running Version Prior to 10.3.183.23 / 11.4.402.265 (APSB12-19)
- PHP Running Version Prior to 5.3.14
- Flash Player Object Confusion Vulnerability (APSB12-09)
- Flash Player Running Version Prior to 10.3.183.19 / 11.3.300.256 (APSB12-14)
- Flash Player Running Version Prior to 10.3.183.5 (APSB11-21)
- Flash Player Running Version Prior to 10.3.181.26 (APSB11-18)
- Flash Player Unspecified Memory Corruption (APSA11-01)
- Flash Player Running Version Prior to 10.3.181.14 (APSB11-12)
- Flash Player Running Version Prior to 10.2.152.26 (APSB11-02)
- PHP Running Version Prior to 5.4.17
- Flash Player Unspecified Code Execution (APSB10-22)
- Adobe Flash Player Multiple Vulnerabilities (APSB10-26)
- Adobe Flash Player Multiple Vulnerabilities (ASPB10-14)
- Vulnerability in .NET Framework and Microsoft Silverlight Allow Code Execution (MS11-078)
- Vulnerability in HTTP.sys Allows Remote Code Execution (MS15-034, Network Check)
- OpenSSH Running Version Prior to 7.0
- Obsolete Web Server Software Detection
- Lighttpd ‘hostname’ Directory Traversal and SQLi Vulnerabilities
- .NET Framework Allow Code Execution (MS12-035)
- Samba CAP_DAC_OVERRIDE File Permission Security Bypass (Network)
- PHP Running Version Prior to 5.3.15
- Vulnerability in Microsoft Malware Protection Engine Allows Code Execution (KB2846338)
- Microsoft Malware Protection Engine (MMPE) Privilege Escalation (2491888)
- Dropbear SSH Server Channel Concurrency Use-after-free Code Execution
- Proxy Allows Gopher:// Requests
- Cisco IOS Software Processing of SAA Packets Flaw
- SNMP Disclosure of HP JetDirect EWS Password
- Dabber Worm Detection (MS04-011)
- PHP Running Version Prior to 5.3.2_5.2.13
- Flash Player Multiple Memory Corruption Vulnerabilities (APSB12-07)
- Microsoft Windows SMB2 ‘_Smb2ValidateProviderCallback()’ Vulnerability (MS09-050, Network Check)
- Microsoft SQL Server Blank Password
- statd RPC Format String
- HP StorageWorks MSA P2000 Hidden ‘admin’ User Default Credentials
- Vulnerabilities in .NET Framework Allows Code Execution (MS12-038)
- radmin Detection
- Vulnerabilities in .NET Framework Allow Code Execution (MS12-074)
- Flash Player ActionScript Predefined Class Prototype Addition Code Execution (APSB11-07)
- NFS Shares World Readable
- Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program (KB3097617)
- NVIDIA Display Driver Service Stack Buffer Overflow (Registry)
- Flash Player Memory Corruption (APSB13-16)
Most Common Medium Risk Vulnerabilities:
- SMB Listens on Port
- Windows Terminal Service Detection
- Microsoft Windows Remote Desktop Protocol Server Private Key Disclosure
- SMB Signing Disabled
- Deprecated SSL Protocol Usage
- Source Disclosure
- Shared Directory Access (Login)
- SSL Medium Strength Cipher Suites Supported
- Default Community Names (SNMP Agent)
- Microsoft’s SQL TCP/IP Listener
- SNMPwalk Port Scanner
- VNC Security Types Detection
- AutoComplete Not Disabled
- Unencrypted Telnet Server
- Obtain Network Interfaces List via SNMP
- SSL Suites Weak Ciphers
- SNMP Agent Default Community Name (public)
- SSL Certificate Expiry
- Database Reachable from the Internet
- Non-SSL Login
- Vulnerabilities in SQL Server Allows Elevation of Privilege (MS12-070, Network)
- Microsoft IIS Tilde Character Information Disclosure Vulnerability
- LDAP Null Directory Bases
- Appweb Insecure SSL Renegotiation
- Web Server Cross Site Scripting
- DNS Server Allows Recursive Queries
- WebDAV Detection
- Linux Kernel UDP Implementation IP Identification Field OS Disclosure
- SSH Protocol Version 1 Detection
- MS SQL Server Resolution Service Amplification Reflected DRDoS Vulnerability
- SMB Shares Enumeration
- Apache HTTP Server Range Header Denial of Service Vulnerability (DoS)
- PHP expose_php Information Disclosure
- Apache HTTP Server Byte Range DoS
- SMTP Service Cleartext Login Permitted
- Apache UserDir Sensitive Information Disclosure
- Obtain Processes List via SNMP
- Remotely Accessible Registry
- OpenSSL Heartbeat Vulnerability (Heartbleed)
- Apache mod_negotiation Multi-Line Filename Upload Vulnerabilities
- Microsoft ASP.NET Information Disclosure Vulnerability (Network, MS10-070)
- Apache Running Version Prior to 2.2.25
- Apache Running Version Prior to 2.2.24
- Apache Running Version Prior to 2.2.23
- Shell Detection
- Shared Directory Access (Share Access)
- Guest Account Accessible (SMB)
- Oracle tnslsnr Version Detection
- Apache mod_suexec Multiple Privilege Escalation Vulnerabilities
- Credit Card Information
- Apache Running Version Prior to 2.2.22
- OpenSSH S/KEY Authentication Account Enumeration
- ntpd Mode 7 Error Response Packet Loop DoS
- Enumerate LANMAN Services via SNMP
- Apache Running Version Prior to 2.2.27
- Enumerate LANMAN Users via SNMP
- OpenSSL Running Version Prior to 0.9.8za
- SMB Host SID User Enumeration
- OpenSSH Multiple Vulnerabilities
- SMB Users Listing
- Enumerate LANMAN Shares via SNMP
- Passwordless Lexmark Printer
- Apache Tomcat Transfer-Encoding Header Vulnerability
- Apache mod_proxy_ajp DoS
- Users in the ‘Admin’ Group
- NFS Server Superfluous
- OpenSSH X11 Session Hijacking Vulnerability
- Unsupported Microsoft XML Parser (MSXML) and XML Core Services
- Apache APR apr_fnmatch DoS
- Fraudulent Digital Certificates Allow Spoofing (KB2524375)
- OpenSSH ‘ForceCommand’ Directive Bypass
- Remotely Accessible Registry (Full Access)
- Vulnerability in Microsoft XML Core Services Allow sCode Execution (MS07-042)
- IIS Sensitive Authentication Information Disclosure
- rsh Detection
- Citrix Server Detection
- SMTP Server Listening on a Non-Default Port
- Source Disclosure
- Missing X-Frame-Options Response
- HSTS Missing From HTTPS Server
- Malformed Bind Request (LDAP Anonymous)
- LDAP NT Search Request Information Retrieval
- SSL RC4 Cipher Suites Supported
- SSLv3 Padding Oracle On Downgraded Legacy Encryption (POODLE)
- Web Application Cookies Lack Secure Flag
- pcAnywhere Detection
- Web Application Cookies Lack HttpOnly Flag
- SSL Certificate is a Self Signed
- Microsoft Windows SMB LsaQueryInformationPolicy Function SID Enumeration Without Credentials
- Microsoft Windows SMB Shares Unprivileged Access
- HP System Management Homepage Cross-site Request Forgery
- DNS Amplification
- OpenSSL Running Version Prior to 0.9.8zb
- Microsoft Windows Kernel Win32k.sys PATHRECORD chain Multiple Vulnerabilities
- VNC Server Authentication-less
- SMB Use Host SID to Enumerate Local Users Without Credentials
- Vulnerability in MHTML Allows Information Disclosure (MS11-037)
- OpenSSL Running Version Prior to 0.9.8zf
- Directory Disclosure
- phpCMS parser.php XSS
- Chargen Detection
- My Little Forum Cross Site Scripting
- Keene Digital Media Server XSS
- WebCam Watchdog sresult.exe XSS
- Faq-O-Matic fom.cgi XSS
- Goollery viewpic.php XSS
- DCP-Portal Cross Site Scripting Bugs
- Apache Jakarta Cross-Site Scripting Vulnerability
- PHP-CSL Cross Site Scripting
Most Common Low Risk Vulnerabilities:
- HTTP Packet Inspection
- ICMP Timestamp Request
- NetBIOS Information Retrieval
- Windows Host NetBIOS to Information Retrieval
- rpcinfo -p Information Disclosure
- Supported SSL Ciphers Suites
- SSL Verification Test
- Remote Host Replies to SYN+FIN
- Directory Scanner
- TCP Timestamps Retrieval
- VMWare Host Detection
- SSH Server Backported Security Patches
- NULL Session Available (SMB)
- Identify Unknown Services via GET Requests
- VNCviewer in Listen Mode Detection
- robot(s).txt Detection
- DNS Bypass Firewall Rules (UDP 53)
- RPC Portmapper
- SNMP Protocol Version Detection
- Telnet Detection
- IIS Allows BASIC and/or NTLM Authentication
- FTP Clear Text Authentication
- SNMP Route Enumeration
- Device Type
- HTTP TRACE Method XSS Vulnerability
- Microsoft IIS Default Page
- Microsoft’s SQL UDP Info Query
- HTTP Server Backported Security Patches
- LANMAN Browse Listing
- IPSEC IKE Detection
- Apache HTTP Server httpOnly Cookie Information Leak
- Microsoft .NET Handlers Enumeration
- Flash Cross-Domain Policy File
- Veritas NetBackup Agent Detection
- SLP Detection
- VMware ESX/GSX Server Detection
- TTL Anomaly Detection
- Apache HTTP Server httpOnly Cookie Information Disclosure
- SMTP Service STARTTLS Command Support
- SLP Server Detection (udp)
- IIS Content-Location HTTP Header
- Appweb HTTP Server Version
- SMTP Authentication Methods
- TFTPd Detection
- Apache Tomcat Default Error Page Version Detection