This section includes everything that is outside of the source code but is still critical to the security of the product that is being created. Because the issues covered by this kingdom are not directly related to source code, we separated it from the rest of the kingdoms.
X-XSS-Protection
to 1; mode=block
for all versions of Internet Explorer opens up a cross-site scripting weakness in old versions of the browser.X-XSS-Protection
is an HTTP header introduced by Microsoft, since adopted by other browsers. This is intended to help stop Cross-Site Scripting
attacks from being successful, but inadvertently led to a weakness making safe websites vulnerable[1]. Due to this, this shouldn't be used in older versions of Internet Explorer and should be disabled by setting the header to 0
.Helmet
middleware in an Express
application to enable this for all versions of Internet Explorer:
var express = require('express');
var app = express();
var helmet = require('helmet');
...
app.use(helmet.xssFilter({ setOnOldIE: true}));
...
Application_BeginRequest
is either empty or does not include a function call to set the X-Content-Type-Options
to nosniff
or attempts to remove that header.X-Content-Type-Options: nosniff
.X-Content-Type-Options
to nosniff
.X-Content-Type-Options: nosniff
for each page that could contain user-controllable content.net.http.DetectContentType()
to determine the response Content-Type:
...
resp, err := http.Get("http://example.com/")
if err != nil {
// handle error
}
defer resp.Body.Close()
body, err := ioutil.ReadAll(resp.Body)
content_type := DetectContentType(body)
...
X-Content-Type-Options
to nosniff
or explicitly disables this security header.X-Content-Type-Options: nosniff
.
<http auto-config="true">
...
<headers>
...
<content-type-options disabled="true"/>
</headers>
</http>
X-Content-Type-Options
to nosniff
or explicitly disables this security header.X-Content-Type-Options: nosniff
.X-Content-Type-Options
to nosniff
or explicitly disables this security header.X-Content-Type-Options: nosniff
.memset()
.
void GetData(char *MFAddr) {
char pwd[64];
if (GetPasswordFromUser(pwd, sizeof(pwd))) {
if (ConnectToMainframe(MFAddr, pwd)) {
// Interaction with mainframe
}
}
memset(pwd, 0, sizeof(pwd));
}
memset()
will be removed as a dead store because the buffer pwd
is not used after its value is overwritten [2]. Because the buffer pwd
contains a sensitive value, the application may be vulnerable to attack if the data is left memory resident. If attackers are able to access the correct region of memory, they may use the recovered password to gain control of the system.memset()
as dead code because the memory being written to is not subsequently used, despite the fact that there is clearly a security motivation for the operation to occur. The problem here is that many compilers, and in fact many programming languages, do not take this and other security concerns into consideration in their efforts to improve efficiency.
char *buf;
int len;
...
len = 1<<30;
if (buf+len < buf) //wrap check
[handle overflow]
buf + len
is larger than 2^32
, so the resulting value is smaller than buf
. But since an arithmetic overflow on a pointer is undefined behavior, some compilers will assume buf + len >= buf
and optimize away the wrap check. As a result of this optimization, code following this block could be vulnerable to buffer overflow.Range
header to a vulnerable server, an attacker can execute arbitrary code within the context of the System
(administrator) user. The attacker might also use malformed requests to crash the server (rendering its services unavailable) or to expose the contents of the server's memory.serve
view of the static files
application which is not designed to be deployed in a production environment. According to Django documentation:static files
tools are mostly designed to help with getting static files successfully deployed into production. This usually means a separate, dedicated static file server, which is a lot of overhead to mess with when developing locally. Thus, the staticfiles app ships with a quick and dirty helper view that you can use to serve files locally in development.DEBUG
is True
.proxy_pass
directive, NGINX can forward all requests for /publicfolder
to the Tomcat server. The developer expects that only this folder is accessible to users. However, an attacker can send the next request http://targetserver/publicfolder/..;/manager/html
..;
to be a folder name so the path matches the rule and this request is forwarded to the Tomcat server. ..;
to indicate parent directory and will map the request to /publicfolder/../manager/html
, giving the attacker access to the manager app of Tomcat server.