Difference between revisions of "OWASP OVAL Content Project"

Jump to: navigation, search
Line 67: Line 67:
! scope="col" | OVAL Definition
! scope="col" | OVAL Definition
| [[1]]
| 1  
| register_globals  
| register_globals  
| <span class="Apple-tab-span" style="white-space:pre"> </span>Off  
| <span class="Apple-tab-span" style="white-space:pre"> </span>Off  
Line 73: Line 73:
| [[2]]
| 2  
| magic_quotes_gpc  
| magic_quotes_gpc  
| <span class="Apple-tab-span" style="white-space:pre"> </span>On  
| <span class="Apple-tab-span" style="white-space:pre"> </span>On  
Line 79: Line 79:
| [[3]]
| 3  
| expose_php  
| expose_php  
| <span class="Apple-tab-span" style="white-space:pre"> </span>Off  
| <span class="Apple-tab-span" style="white-space:pre"> </span>Off  

Revision as of 14:36, 8 December 2011


This project’s goal is to create standardized assesment documents (in OVAL XML format) for various application platforms such as .NET, Java, PHP etc. For example, there are several settings like Web.Config file which impacts security of ASP.NET web application. Likewise, PHP.INI has several security related settings. By creating OVAL definitions for these checks, it will enable any OVAL compatible tool (including the free OVAL Interpreter) to perform these checks.

PHP Related Security Definitions.

Below is a sample OVAL definition file which detects if Apache web server is running

<?xml version ="1.0" encoding="utf-8"?> <oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#solaris solaris-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd">

<oval:product_name>OWASP OVAL Content Project</oval:product_name>
<definition id ="oval:org.owasp.oval:def:1" class ="compliance" version="1">
<title>Apache2 is running</title>
<description>Apache2 has been found to be running</description>
<criterion comment="test" test_ref="oval:org.owasp.oval:tst:1"/>
<process58_test xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.owasp.oval:tst:1" version="1" comment="Apache2 running" check_existence="at_least_one_exists" check="at least one">
<object object_ref="oval:org.owasp.oval:obj:1"/>
<process58_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.owasp.oval:obj:1" version="1">
<command_line operation="pattern match">.*apache2 .*</command_line>
<pid datatype="int" operation="greater than">0</pid>


PHP Security Settings

No Setting Recommended Value Description OVAL Definition
1 register_globals Off http://www.php.net/manual/en/security.globals.php TBD
2 magic_quotes_gpc On http://us3.php.net/manual/en/security.magicquotes.whynot.php TBD
3 expose_php Off Reduce the amount of information available which includes the PHP version within the HTTP header (e.g., X-Powered-By: PHP/5.3.7). TBD

Project About

What does this OWASP project offer you?
What releases are available for this project?
what is this project?
Name: OWASP OVAL Content Project (home page)
  • The purpose of this project is to create OVAL content to enable any OVAL compatible tool find security issues which can be represented in a standard format.
  • More about OVAL from MITRE website:
  • Open Vulnerability and Assessment Language (OVAL®) is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services.
    • This project will strive to create OVAL content (which are simply XML files) for common security mis-configurations. For example, refer to http://www.codeproject.com/KB/web-security/web-based-applications.aspx for list of top 10 Application Security Vulnerabilities in Web.config Files which may impact any ASP.NET web application. Each of these security settings can be tested easily by writing corresponding OVAL checks. In this particular case, xmlfilecontent_item can be used.
    • There are already free tools (OVAL Interpreters) available which can be readily used to check content conforming to OVAL standard.
    • OVAL community is quite active and there is fast amount of content available in OVAL repository maintained at MITRE website.
    • By providing standard OWASP reviewed OVAL content to general public, this project goal is to make it easier for anyone involved in finding configuration related vulnerabilities in any web application platform
License: Creative Commons Attribution ShareAlike 3.0 license
who is working on this project?
Project Leader(s):
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Main links:
Key Contacts
  • Contact the GPC to report a problem or concern about this project or to update information.
current release
Not Yet Published
last reviewed release
Not Yet Reviewed

other releases