This section includes everything that is outside of the source code but is still critical to the security of the product that is being created. Because the issues covered by this kingdom are not directly related to source code, we separated it from the rest of the kingdoms.
<get>
task, which retrieves the dependency specified by the corresponding URL. This approach is functionally equivalent to scenario where a developer documents each external dependency as an artifact included with the software project, but is more desirable because it automates the retrieval and incorporation of the dependencies when a build is performed.
<get src="http://people.apache.org/repo/m2-snapshot-repository/org/apache/openejb/openejb-jee/3.0.0-SNAPSHOT/openejb-jee-3.0.0-SNAPSHOT.jar"
dest="${maven.repo.local}/org/apache/openejb/openejb-jee/3.0.0-SNAPSHOT/openejb-jee-3.0.0-SNAPSHOT.jar"
usetimestamp="true" ignoreerrors="true"/>
<dependencies>
<dependency org="javax.servlet"
name="servletapi"
rev="2.3" conf="build->*"/>
<dependency org="javax.jms"
name="jms"
rev="1.1" conf="build->*"/> ...
</dependencies>
<dependencies>
<dependency>
<groupId>commons-logging</groupId>
<artifactId>commons-logging</artifactId>
<version>1.1</version>
</dependency>
<dependency>
<groupId>javax.jms</groupId>
<artifactId>jms</artifactId>
<version>1.1</version>
</dependency>
...
</dependencies>
Vary
header indicates that server-driven negotiation was done to determine which content should be delivered. This might indicate that different content is available based on the headers in the HTTP request. An attacker could gain access to content not intended for public consumption by submitting different values through the request headers.Cache-Control: public
would instruct the browser to persistently cache the content on the hard drive. Caching can be prevented by specifying one of the following three directives in the response headersCache-control: private
Cache-Control: no-cache
Cache-Control: no-store
Vary
header indicates that server-driven negotiation was done to determine which content should be delivered. It can be used to set "accept-language"
as the criteria for negotiation. This might indicate that different content is available based on the Accept-Language
header in the HTTP request. An attacker could access information not intended for public consumption by submitting different values in the Accept-Language header.Vary
header indicates that server-driven negotiation was done to determine which content should be delivered. A "*"
can be used as the field value, which means that it cannot be determined from the HTTP headers what criteria was used to select content. An attacker can use this behavior to gain valuable insight into the application's business logic and use it to orchestrate targeted attacks.Vary
header indicates that server-driven negotiation was done to determine which content should be delivered. It can be used to set "user-agent"
as the criteria for negotiation. This might indicate that different content is available based on the User-Agent
header in the HTTP request. An attacker could discover hidden application functionality or resources by submitting different values in the user-agent header.
Configure::write('debug', 3);
Configure::write()
method indicates the debug level. The higher the number, the more verbose the log messages.low
session security.
Configure::write('Security.level', 'low');
Session.timeout
setting, the Security.level
settings define how long a session is valid. The actual session timeout time is a equal to the Session.timeout
times one of the following multiples:ActionForms
are vulnerable to ClassLoader manipulation.
const dns = require('dns');
// User-controlled input for DNS servers
const customDnsServers = from_user_controlled_input;
// Set custom DNS servers
dns.setServers(customDnsServers);
customDnsServers
variable is assigned a value derived from user-controlled input. This input is then used to set the DNS servers using dns.setServers(customDnsServers)
. If an attacker provides malicious DNS server addresses, they can direct the application to resolve domain names using their servers, which can return false IP addresses.Dockerfile
does not specify a USER
, Docker containers run with super user privileges by default. These super user privileges are propagated to the code running inside the container, which is usually more permission than necessary. Running the Docker container with super user privileges broadens the attack surface which might enable attackers to perform more serious forms of exploitation.latest
tag automatically indicates the version level of an image that doesn't use a digest or unique tag to provide a version for it. Docker automatically assigns the latest
tag as mechanism to point to the most recent image manifest file. Because tags are mutable, an attacker can replace an image or layer using a latest
(or weak tags such as imagename-lst, imagename-last, myimage
).ubuntu
.
FROM ubuntu:Latest
...
zypper
to retrive the latest version of the given package.
...
zypper install package
...
Example 2
, if the repository is compromised, an attacker could simply upload a version that meets the dynamic criteria and cause zypper
to download a malicious version of the dependency.