Skip to content

Commit

Permalink
Merge pull request #4867 from zapbot/crowdin-update
Browse files Browse the repository at this point in the history
Update localized resources
  • Loading branch information
thc202 authored Sep 7, 2023
2 parents 1b16c64 + d47e695 commit d820463
Show file tree
Hide file tree
Showing 77 changed files with 695 additions and 664 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -342,7 +342,7 @@ Ensure that all failures in resource allocation place the system into a safe pos

The most common type of a brute force attack in web applications is an attack against log-in credentials. Since users need to remember passwords, they often select easy to memorize words or phrases as passwords, making a brute force attack using a dictionary useful. Such an attack attempting to log-in to a system using a large list of words and phrases as potential passwords is often called a "word list attack" or a "dictionary attack". Attempted passwords may also include variations of words common to passwords such as those generated by replacing "o" with "0" and "i" with "1" as well as personal information including family member names, birth dates and phone numbers.
</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Brute-Force</reference>
</vuln_item_wasc_11a>

Expand All @@ -353,7 +353,7 @@ The most common type of a brute force attack in web applications is an attack ag

Since HTTP is a stateless protocol, in order to maintain state web applications need to ensure that a session identifier is sent by the browser with each request. The session identifier is most commonly stored in an HTTP cookie or URL. Using a brute force attack, an attacker can guess the session identifier of another user. This can lead to the attacker impersonating the user, retrieving personal information and performing actions on behalf of the user.
</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Brute-Force</reference>
</vuln_item_wasc_11b>

Expand All @@ -366,7 +366,7 @@ When files reside in directories that are served by the web server but are not l

A brute force attack tries to locate the unlinked file by trying to access a large number of files. The list of attempted file names might be taken from a list of known potential files or based on variants of the visible files on the web site. More information on brute forcing directories and files can be found in the associated vulnerability, predictable resource location.
</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Brute-Force</reference>
</vuln_item_wasc_11c>

Expand All @@ -381,7 +381,7 @@ In order to fill in the missing information the hacker can guess the missing inf
* Guessing CVV/CSC requires only 1000 or 10000 attempts as the number is only 3 or 4 digits, depending on the card type.
* Guessing an expiration date requires only several dozen attempts.
</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Brute-Force</reference>
</vuln_item_wasc_11d>

Expand All @@ -400,7 +400,7 @@ Specially crafted links can be sent to a user via e-mail, instant messages, left

This attack exploits the trust relationship established between the user and the web site. The technique has been used to create fake web pages including login forms, defacements, false press releases, etc.
</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Content-Spoofing</reference>
</vuln_item_wasc_12>

Expand All @@ -427,7 +427,7 @@ Pages that provide different responses based on the validity of the data can als
Servers may include well-known default accounts and passwords. Failure to fully lock down or harden the server may leave improperly set file and directory permissions. Misconfigured SSL certificates and encryption settings, the use of default certificates, and improper authentication implementation with external systems may compromise the confidentiality of information.

Verbose and informative error messages may result in data leakage, and the information revealed could be used to formulate the next level of attack. Incorrect configurations in the server software may permit directory indexing and path traversal attacks.</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Server-Misconfiguration</reference>
</vuln_item_wasc_14>

Expand All @@ -437,7 +437,7 @@ Verbose and informative error messages may result in data leakage, and the infor
<desc>Application Misconfiguration attacks exploit configuration weaknesses found in web applications. Many applications come with unnecessary and unsafe features, such as debug and QA features, enabled by default. These features may provide a means for a hacker to bypass authentication methods and gain access to sensitive information, perhaps with elevated privileges.

Likewise, default installations may include well-known usernames and passwords, hard-coded backdoor accounts, special access mechanisms, and incorrect permissions set for files accessible through web servers. Default samples may be accessible in production environments. Application-based configuration files that are not properly locked down may reveal clear text connection strings to the database, and default settings in configuration files may not have been set with security in mind. All of these misconfigurations may lead to unauthorized access to sensitive information.</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Application-Misconfiguration</reference>
</vuln_item_wasc_15>

Expand Down Expand Up @@ -465,7 +465,7 @@ Likewise, default installations may include well-known usernames and passwords,
<desc>Credential/Session Prediction is a method of hijacking or impersonating a web site user. Deducing or guessing the unique value that identifies a particular session or user accomplishes the attack. Also known as Session Hijacking, the consequences could allow attackers the ability to issue web site requests with the compromised user's privileges.

Many web sites are designed to authenticate and track a user when communication is first established. To do this, users must prove their identity to the web site, typically by supplying a username/password (credentials) combination. Rather than passing these confidential credentials back and forth with each transaction, web sites will generate a unique "session ID" to identify the user session as authenticated. Subsequent communication between the user and the web site is tagged with the session ID as "proof" of the authenticated session. If an attacker is able predict or guess the session ID of another user, fraudulent activity is possible.</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Credential-and-Session-Prediction</reference>
</vuln_item_wasc_18>

Expand Down Expand Up @@ -564,7 +564,7 @@ Web application functionality that is often a target for automation attacks may
* Online polls - polls and other types of online voting systems can be automatically subverted in favor of a certain choice.
* Web-based SMS message sending - attackers may exploit SMS message sending systems in order to spam mobile phone users
</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Insufficient+Anti-automation</reference>
<reference>http://cwe.mitre.org/data/definitions/116.html</reference>
</vuln_item_wasc_21>
Expand Down Expand Up @@ -607,7 +607,7 @@ When exchanging data between components, ensure that both components are using t
<vuln_item_wasc_23>
<alert>XML Injection</alert>
<desc>XML Injection is an attack technique used to manipulate or compromise the logic of an XML application or service. The injection of unintended XML content and/or structures into an XML message can alter the intend logic of the application. Further, XML injection can cause the insertion of malicious content into the resulting message/document.</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/XML-Injection</reference>
</vuln_item_wasc_23>

Expand Down Expand Up @@ -662,7 +662,7 @@ One use for this technique is to enhance the basic HTTP response splitting techn

HTTP response smuggling makes use of HTTP request smuggling -like techniques to exploit the discrepancies between what an anti- HTTP Response Splitting mechanism (or a proxy server) would consider to be the HTTP response stream, and the response stream as parsed by a proxy server (or a browser). So, while an anti- HTTP response splitting mechanism may consider a particular response stream harmless (single HTTP response), a proxy/browser may still parse it as two HTTP responses, and hence be susceptible to all the outcomes of the original HTTP response splitting technique (in the first use case) or be susceptible to page spoofing (in the second case). For example, some anti- HTTP response splitting mechanisms in use by some application engines forbid the application from inserting a header containing CR+LF to the response. Yet an attacker can force the application to insert a header containing CRs, thereby circumventing the defense mechanism. Some proxy servers may still treat CR (only) as a header (and response) separator, and as such the combination of web server and proxy server will still be vulnerable to an attack that may poison the proxy's cache.
</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/HTTP-Response-Smuggling</reference>
</vuln_item_wasc_27>

Expand Down Expand Up @@ -918,7 +918,7 @@ There are two main types of processes that require validation: flow control and
"Flow control" refers to multi-step processes that require each step to be performed in a specific order by the user. When an attacker performs the step incorrectly or out of order, the access controls may be bypassed and an application integrity error may occur. Examples of multi-step processes include wire transfer, password recovery, purchase checkout, and account sign-up.

"Business logic" refers to the context in which a process will execute as governed by the business requirements. Exploiting a business logic weakness requires knowledge of the business; if no knowledge is needed to exploit it, then most likely it isn't a business logic flaw. Due to this, typical security measures such as scans and code review will not find this class of weakness. One approach to testing is offered by OWASP in their Testing Guide.</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Insufficient-Process-Validation</reference>
</vuln_item_wasc_40>

Expand Down Expand Up @@ -957,7 +957,7 @@ Ensure that all failures in resource allocation place the system into a safe pos
<alert>XML External Entities</alert>
<desc>This technique takes advantage of a feature of XML to build documents dynamically at the time of processing. An XML message can either provide data explicitly or by pointing to an URI where the data exists. In the attack technique, external entities may replace the entity value with malicious data, alternate referrals or may compromise the security of the data the server/XML application has access to.
Attackers may also use External Entities to have the web services server download malicious code or content to the server for use in secondary or follow on attacks.</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/XML-External-Entities</reference>
</vuln_item_wasc_43>

Expand All @@ -980,7 +980,7 @@ Before parsing XML files with associated DTDs, scan for recursive entity declara
<desc>The most common methodology for attackers is to first footprint the target's web presence and enumerate as much information as possible. With this information, the attacker may develop an accurate attack scenario, which will effectively exploit a vulnerability in the software type/version being utilized by the target host.

Multi-tier fingerprinting is similar to its predecessor, TCP/IP Fingerprinting (with a scanner such as Nmap) except that it is focused on the Application Layer of the OSI model instead of the Transport Layer. The theory behind this fingerprinting is to create an accurate profile of the target's platform, web application software technology, backend database version, configurations and possibly even their network architecture/topology.</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Fingerprinting</reference>
</vuln_item_wasc_45>

Expand Down Expand Up @@ -1014,7 +1014,7 @@ A Web application should invalidate a session after a predefined idle time has p
<vuln_item_wasc_48>
<alert>Insecure Indexing</alert>
<desc>Insecure Indexing is a threat to the data confidentiality of the web-site. Indexing web-site contents via a process that has access to files which are not supposed to be publicly accessible has the potential of leaking information about the existence of such files, and about their content. In the process of indexing, such information is collected and stored by the indexing process, which can later be retrieved (albeit not trivially) by a determined attacker, typically through a series of queries to the search engine. The attacker does not thwart the security model of the search engine. As such, this attack is subtle and very hard to detect and to foil - it’s not easy to distinguish the attacker’s queries from a legitimate user’s queries.</desc>
<solution></solution>
<solution/>
<reference>http://projects.webappsec.org/Insecure-Indexing</reference>
</vuln_item_wasc_48>

Expand Down
Loading

0 comments on commit d820463

Please sign in to comment.