-
Updated
Aug 14, 2021 - Python
owasp
Here are 437 public repositories matching this topic...
-
Updated
Nov 11, 2020
-
Updated
Aug 13, 2021 - Python
-
Updated
Aug 15, 2021 - Go
⭐ Challenge idea
Description
Several users originally missing security question answers - most notably bjoern.k
-
Updated
Jul 30, 2021 - PHP
Merge /Testing_for_Vertical_Bypassing_Authorization_Schema_WSTG-AUTHZ-00X.md
into 4-Web_Application_Security_Testing/05-Authorization_Testing/03-Testing_for_Privilege_Escalation.md
-
Updated
Jun 30, 2021 - Ruby
-
Updated
Jul 17, 2021 - Go
-
Updated
Dec 30, 2020 - Python
Slack us first!
Hello. I write about problem here:
https://owasp.slack.com/archives/C2P5BA8MN/p1624892081234100
Be informative
As additional into slack I find the same behaviour with Risk Accepted findings. Into Metrics I see 0 Risk Accepted findings, but I have 1 Risk Accepted finding
Bug description
No error. Metrics into product, or metrics dushboard has incorrect info
Description
BeanUtils is a library that is doing automatic mapping to Java object.
It can cause arm when the attack controls part of the list of properties being sets. BeanUtils does not blacklist properties like class, classloader or other objects that are likely to load arbitrary classes and possibly run code.
Code
import org.apache.commons.beanutils.BeanUtils;
public
-
Updated
Aug 11, 2021 - JavaScript
-
Updated
Aug 6, 2021 - HTML
-
Updated
Aug 14, 2021 - JavaScript
-
Updated
Jul 26, 2021 - C
-
Updated
Aug 15, 2021 - Python
-
Updated
Oct 1, 2020
The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number
-
Updated
Aug 9, 2021 - Raku
-
Updated
Feb 24, 2021 - Python
-
Updated
Aug 15, 2021 - Java
-
Updated
Jul 18, 2021
https://github.com/OWASP/www-community/blob/master/pages/CRV2_AppThreatModeling.md
Contains a bunch of HTML based tables that need attention. They did not auto-migrate well and at a certain point break the rendering of the majority of the page.
Improve this page
Add a description, image, and links to the owasp topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the owasp topic, visit your repo's landing page and select "manage topics."
Hi,
I am getting some XSS Reflected and persistent alerts generated when a .xls or .pdf file contains unsantised XSS injection strings. I do not want to add an alert filter because it is an .asp page that generates these files and so there could be another XSS vulnerability on the page.
I was wondering if the XSS rule could check the Content-Type header and the file identifying line (first