-
Updated
Aug 16, 2021 - Python
owasp
Here are 438 public repositories matching this topic...
-
Updated
Nov 11, 2020
-
Updated
Aug 16, 2021 - Python
-
Updated
Aug 18, 2021 - Go
⭐ Challenge idea
Description
Several users originally missing security question answers - most notably bjoern.k
-
Updated
Jul 30, 2021 - PHP
Merge /Testing_for_Vertical_Bypassing_Authorization_Schema_WSTG-AUTHZ-00X.md
into 4-Web_Application_Security_Testing/05-Authorization_Testing/03-Testing_for_Privilege_Escalation.md
-
Updated
Jun 30, 2021 - Ruby
-
Updated
Jul 17, 2021 - Go
-
Updated
Dec 30, 2020 - Python
Slack us first!
Hello. I write about problem here:
https://owasp.slack.com/archives/C2P5BA8MN/p1624892081234100
Be informative
As additional into slack I find the same behaviour with Risk Accepted findings. Into Metrics I see 0 Risk Accepted findings, but I have 1 Risk Accepted finding
Bug description
No error. Metrics into product, or metrics dushboard has incorrect info
-
Updated
Aug 11, 2021 - JavaScript
Description
BeanUtils is a library that is doing automatic mapping to Java object.
It can cause arm when the attack controls part of the list of properties being sets. BeanUtils does not blacklist properties like class, classloader or other objects that are likely to load arbitrary classes and possibly run code.
Code
import org.apache.commons.beanutils.BeanUtils;
public
-
Updated
Aug 6, 2021 - HTML
-
Updated
Aug 18, 2021 - JavaScript
-
Updated
Jul 26, 2021 - C
-
Updated
Aug 19, 2021 - Python
-
Updated
Oct 1, 2020
The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number
-
Updated
Aug 9, 2021 - Raku
-
Updated
Feb 24, 2021 - Python
-
Updated
Aug 19, 2021 - Java
-
Updated
Jul 18, 2021
I just finished dealing with auto-migrated
issues for this article, it could definitely use some content updates:
https://github.com/OWASP/www-community/blob/master/pages/HttpOnly.md it still talks about old versions of IE and Opera.
This article includes an extensive table that needs re-working after the auto-migration as well (which I did not tackle).
Is Opera even relevant in 2020? Do
Improve this page
Add a description, image, and links to the owasp topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the owasp topic, visit your repo's landing page and select "manage topics."
Hi,
I am getting some XSS Reflected and persistent alerts generated when a .xls or .pdf file contains unsantised XSS injection strings. I do not want to add an alert filter because it is an .asp page that generates these files and so there could be another XSS vulnerability on the page.
I was wondering if the XSS rule could check the Content-Type header and the file identifying line (first