OWASP Enterprise Application Security Project
The OWASP Enterprise Application Security Project (OWASP-EAS) exists to provide guidance to people involved in the procurement, design, implementation or sign-off of large scale (ie 'Enterprise') applications.
Enterprise applications security is one of the major topics in overall security area because those applications controls money and resources and every security violation can result a significant money loss. Purpose of this project is to aware people about enterprise application security problems and create a guidelines and tools for enterprise application security assessment.
Here are our primary goals:
1 Aware people about enterprise applicatio security vulnerabilities by making an Annual statistics of enterprise business application security vulnerabilities.
2 Help companies to begin assessment of enterprise applicatios by creating a
3 Help software companies to improve security of their solutions by creating a
4 Develop a free tools for Enterprise business applicatioons assessment
Have a look at the OWASP Enterprise Application Security Project/Roadmp
This document is the first statistics report which will be repeated annually with showing tendencies and changes in Enterprise Business Application Security area.
This document we will show a result of statistical research in the Business Application security area made by DSECRG and OWASP-EAS project. The purpose of this document is to raise awareness about Enterprise Business Application security by showing the current number of vulnerabilities found in those applications, how critical are those and what tendences we see.
Business applications like ERP, CRM, SRM and others are one of the major topics within the field of computer security as these applications store business data and any vulnerability in these applications will cause a significant monetary loss. Nonetheless people still don’t pay much attention to Enterprise Business Application area as we see during our and our collegues research and audit data. Business applications are very large and complex systems that consists of different components such as Database server, Front-end, Web server, Application server and other parts. Also those systems lay on different Hardware and software that can have their own vulnerabilities. Overall security of Enterprise Business Application consists of different layers such as: • Network architecture security • Os security • Database security • Application security • Front-end security
Every described layer may have their own vulnerabilities that can give attacker full access to business data even if other layers are fully secured. In this document all the popular applications from described levels and their vulnerabilities vill be shown. The purpose of this document to Increase awareness of Business Application security.
Business applications vulnerability statistics 2009 and future trends - Presentation by Dmitry Evdokimov and Dmityy Chastuhin
Alexander Polyakov, Alexey Tuyrin, Dmitriy Chastuhin, Dmitriy Evdokimov (DSecRG)
This document we will describe different areas of programm vulnerabilities that can be found in Enterprise Business applications and ERP systems.
The purpose of this document to Increase awareness for Developers of Enterprise business application software. Here we will collect top software vulnerabilities in server site and frontend side that can exist in Business applications.
There are many different languages and technologies that can be used for developing business applications and writing a costom code. Here we will try to categorize it firstly by dividing into Server and Client site. Top 10 list of vulnerabilities for both areas will be shown.
Crosslinks to CWE SANS OWASP and risks with descriptions will be added soon.
Top 10 Server vulnerabilities (EASAD)
2 Improper Access Control
3 Information disclosure
4 Command/code injection in proprietary language
5 SQL Injection
6 Missing Encryption of Sensitive Data
7 Buffer overflows
8 Path traversal
10 Use of a Broken or Risky Cryptographic Algorithm
Top 10 Frontend vulnerabilities (EASFD)
1 Buffer overflows (ActiveX )
2 Exposed Dangerous Method or Function (ActiveX)
3 Insecure scripting server access
4 File handling Frontend vulnerabilities
5 Use of a Broken or Risky Cryptographic Algorithm
6 Cleartext Storage of Sensitive Information
7 Use of Hard-coded Password
8 Lack of integrity checking for front-end application
9 Cleartext Transmission of Sensitive Information
10 Vulnerable remote services
Alexander Polyakov (DSecRG) Mikhail Markevich Dmitriy Evdokimov (DSecRG) Alexey Sintsov (DSecRG)
This document we will describe different areas of Secure implementation of g Enterprise Business Applications and ERP systems. Here we will mainly focus on security architecture and configuration threads because pragramm errors are well described in "Software vulnerabilities" topic
The purpose of this document to Increase awareness for Administrators of Business Application security and help them to start a beginning self-assessment of their systems and find a most critical violations.
Enterprise Business Applications (Like ERP - is any software system that has been designed to support and automate the business process of medium and large business) are very large systems that consists of different components such as database server, Front-end, Web server, Application server and other parts. Also those systems lay on different Hardware and software that can have their own vulnerabilities. Every described layer may have their own vulnerabilities and misconfigurations that can give attacker full access to business data even if other layers are fully secured.
All information was collected and catecorized during our big practice of security assessing Popular business applications Like in SAP ERP, Oracle E-Business Suite, Oracle Peoplesoft, JD-Edwards and other less known or custom applications.
Overall security of Enterprise Business Application consists of different layers such as: • Network architecture security • Os security • Database security • Application security • Front-end security In this document we will Describe top 10 violations on every layer of Enterprise Business Application that can be easily assessed and mitigated.
Top 10 Network/Architecture issues
1 Lack of proper network filtration between EA and Corporate network
2 Lack or vulnerable encryption between corp net and EA Network
3 Lack of separation between Test Dev and Prod system
4 Lack of encryption inside EA Network
5 Insecure trusted realations between components
6 Insecure configured Internet facing applicatins
7 Vulnerable / default configured Routers
8 lack of frontend access filtration
9 Lack or misconfigured monitoring IDS/IPS
10 Insecure/unappropriate wireless comunications
Top 10 OS issues
1 Unnecessary Enabled services
2 Missing 3rd party software patches
3 Insecure trust relations
4 Universal OS passwords
5 Missing OS patches
6 Lack or misconfigured network acess control
7 Lack or misconfigured monitoring
8 Insecure internal acces control
9 Unencrypted remote access
10 Lack of password lockout/complexiry checks
Top 10 Database issues
1 Default passwords for DB access
2 Lack of DB patch management
3 unnecessary Enabled DB features
4 lack of password lockout/complexiry checks
5 Unencrypted sensitive data transport / data
6 Lack or misconfigured network acess control
7 Extensive user and group privileges
8 lack or misconfigured audit
9 Insecure trust relations
10 Open additional interfaces
Top 10 Application issues
1 Lack of patch management
2 Default Passwords for application access
3 SOD conficts
4 Unnecessary Enabled Application features
5 Open Remote mngmt interfaces
6 lack of password lockout/complexity checks
7 Insecure options
8 Unecrypted cominications
9 Insecure trust relations
10 Guest access
Top 10 Frontend issues
1 Vulnerable Frontend applications
2 Lack of server trust check
3 Lack of encryption
4 Aotocomplete browser
5 Insecure Browser scripting options
6 Insecure configuration
7 Insecure sortware distribution service
8 Lack of AV software
9 Password storing in configuration file
10 Sensitive information storage
ERP Security:Myths Problems Solutions - by Alexander Polyakov and Ilya Medvedovskiy
Alexander Polyakov (DSecRG)
| PROJECT INFO
What does this OWASP project offer you?
| RELEASE(S) INFO|
What releases are available for this project?