Secure Coding Workshop

  Рет қаралды 5,065

OWASP Ottawa

OWASP Ottawa

Күн бұрын

Пікірлер: 6
@yashpharande2386
@yashpharande2386 8 ай бұрын
One of the best resources online for an quick introduction to secure coding and reviews!
@nnme-pf9bj
@nnme-pf9bj 5 жыл бұрын
at 59:17 actually the top is incorrect syntax. String commandArgs = {};. "Type mismatch: can not convert String[] to String".
@paulionescu757
@paulionescu757 5 жыл бұрын
You're right thanks :) Will correct in the presentation.
@nnme-pf9bj
@nnme-pf9bj 5 жыл бұрын
Hi, at 58:05 what is payload used to exploit bottom.java ? I think bottom.java is not vulnerable even you can control a malicious input because Runtime.getRuntime().exec(string array) is safety.
@paulionescu757
@paulionescu757 5 жыл бұрын
Oh but you missed the fact that the input is passed to cmd or bin/sh :) So the injection actually happens in the command line. '`command`' , '; command', '| command' or for windows '& command' all work. In fact you can see the same code right here: github.com/trendmicro/SecureCodingDojo/blob/aa7ab0bc4d8944bb7d4df2ce04853749e6c46ec6/insecureinc/WebContent/cwe78admin.jsp#L27
@nnme-pf9bj
@nnme-pf9bj 5 жыл бұрын
Hi @@paulionescu757, I do not agree with you. In github.com/trendmicro/SecureCodingDojo/blob/aa7ab0bc4d8944bb7d4df2ce04853749e6c46ec6/insecureinc/WebContent/cwe78admin.jsp#L27, It is the bug I completely agree because it pass user input to %s so the final command will be "String [] commandArgs = {"/bin/sh", "-c", "ping -c 4 xxx.xxx.xxx.xxx | "};. Notice the arguments it has 3 arguments and having a correct command injection format. But at 58:05 bottom.java the final command will be: "String [] commandArgs = {"/bin/sh", "-c", "ping", ""};" it is not a bug. commandArgs will have 4 arguments then if it is passed to exec function, will be the argument of "ping" command.
Secure Coding Back to Basics - Erlend Oftedal - NDC Security 2022
59:16
When u fight over the armrest
00:41
Adam W
Рет қаралды 27 МЛН
Haunted House 😰😨 LeoNata family #shorts
00:37
LeoNata Family
Рет қаралды 14 МЛН
ASP.NET Core Meets Owasp Top 10 - Anders Abel - NDC Security 2022
54:25
NDC Conferences
Рет қаралды 3,8 М.
OWASP Spotlight - Project 14 - OWASP Secure Coding Dojo
20:49
Vandana Verma
Рет қаралды 2,3 М.
C++ for Embedded Development
52:28
The Linux Foundation
Рет қаралды 106 М.
Finding Security Vulnerabilities through Code Review - The OWASP way
1:16:38
OWASP Ottawa May 17th: Office Under Siege
1:59:04
OWASP Ottawa
Рет қаралды 116
Software Security Education with the OWASP Secure Coding Dojo
1:00:33
OWASP DevSlop
Рет қаралды 3,1 М.
Software Security and Secure Coding Practices - Part 2:  Software Security Threats
1:46:31
Information Security Awareness
Рет қаралды 2,9 М.
Log4J Vulnerability (Log4Shell)  Explained - for Java developers
20:50
Cross-Site Scripting: A 25-Year Threat That Is Still Going Strong
9:33
When u fight over the armrest
00:41
Adam W
Рет қаралды 27 МЛН