Top 10 2013-A5-Security Misconfiguration

From OWASP
Revision as of 11:16, 17 February 2013 by Neil Smithline (Talk | contribs)

Jump to: navigation, search

TEMPORARY PLACEHOLDER for 2013 T10

[[Top 10 {{{year}}}-Insecure Direct Object References|← Insecure Direct Object References]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-Sensitive Data Exposure|Sensitive Data Exposure →]]

PLEASE DELETE ME

    <td style="font-size: 100%; font-weight: bold; background-color: #D9D9D9; color: #000000; border: 3px solid #444444"> Application / Business Specific </td>

</tr> <tr valign="top">

    <td style="text-align: left; border: 3px solid #444444;">blank.</td>
    <td style="text-align: left; border: 3px solid #444444;">blank</td>
    <td colspan=2  style="text-align: left; border: 3px solid #444444;">blank</td>
    <td style="text-align: left; border: 3px solid #444444;">blank</td>
    <td style="text-align: left; border: 3px solid #444444;">blank</td>

</tr></table></center>

Am I Vulnerable To 'Security Misconfiguration'?

blank

How Do I Prevent 'Security Misconfiguration'?

blank

  1. blankBullet1
  2. blankBullet2
Example Attack Scenarios

blank

blank code

blank

http://example.com/app/accountView?id=' or '1'='1

blank

References

OWASP

External

[[Top 10 {{{year}}}-Insecure Direct Object References|← Insecure Direct Object References]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-Sensitive Data Exposure|Sensitive Data Exposure →]]

© 2002-2013 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png
[[Category:OWASP Top Ten {{{year}}} Project]]