Secure Web 2.0 (& Drupal) Part 7

Tue, 05/26/2015 - 14:15 -- pottol
Drupal Approved Modules

A9 Using Component with Known Vulnerabilities

Components, such as libraries, frameworks, and other software modules, almost always run with full privileges. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications using components with known vulnerabilities may undermine application defenses and enable a range of possible attacks and impacts.


Secure Web 2.0 (& Drupal) Part 6

Tue, 05/26/2015 - 14:11 -- pottol
Drupal CSRF

 A7 Missing Functional Level Access Control

Most web applications verify function level access rights before making that functionality visible in the UI. However, applications need to perform the same access control checks on the server when each function is accessed. If requests are not verified, attackers will be able to forge requests in order to access functionality without proper authorization.

Drupal approach:

·         Menu system uses access callback and access arguments

·         Continually review permissions



Subscribe to 8Linux RSS