OWASP Top10:2021
OWASP Top 10 Security Concerns In 2021
This page details the OWASP Top 10 security risks for 2021 as they pertain to the ZK framework. For risks that continue from the 2017 list, links are provided to the original explanations, with updates and new risks detailed directly on this page.
A01:2021 - Broken Access Control
See OWASP Top 10 Security Concerns In 2017#A05 - Broken Access Control
A02:2021 - Cryptographic Failures
See OWASP Top 10 Security Concerns In 2017#A03 - Sensitive Data Exposure
A03:2021 - Injection
See both:
- OWASP Top 10 Security Concerns In 2017#A01 - Injection
- OWASP Top 10 Security Concerns In 2017#A07 - Cross-Site Scripting (XSS)
A04:2021 - Insecure Design
ZK 10.0.0 addresses insecure design through several security enhancements, reinforcing the framework's defense against potential threats:
- Stricter GET/POST Handling: ZK 10.0.0 has refined how GET and POST requests are processed to prevent HTTP verb tampering attacks.
- Enhanced Security Framework: Includes Synk Scanning, CodeQL PR Scanning, and SonarCube to analyze and protect the codebase.
- Enable InaccessibleWidgetBlockService by Default: Blocks requests from inaccessible widgets enhancing security by preventing interactions with UI components that should not be accessible.
A05:2021 - Security Misconfiguration
ZK Framework has enhanced its security measures to further protect against XML External Entities (XXE) attacks. As of ZK 10.0.0, the XML parsing configuration has been updated to disallow Doctype declarations, which are a common vector for XXE attacks. This change prevents the XML parser from processing XML documents that include external entities, thereby mitigating potential security risks.
For further details, see ZK-5622 Disallow Doctype on parsed XML files in ZK to increase security.
See both:
- OWASP Top 10 Security Concerns In 2017#A06 - Security Misconfiguration
- OWASP Top 10 Security Concerns In 2017#A04 - XML External Entities (XXE)
A06:2021 - Vulnerable and Outdated Components
ZK has taken proactive steps to address the risks associated with using vulnerable and outdated components. As of ZK 9.5.0, the framework has integrated the OWASP Dependency Check into its build process. This tool helps identify and mitigate security vulnerabilities in third-party libraries and dependencies by scanning them against known vulnerability databases. This measure significantly enhances security by ensuring that potential vulnerabilities are identified and addressed promptly before production deployment.
See also:
A07:2021 - Identification and Authentication Failures
See OWASP Top 10 Security Concerns In 2017#A02 - Broken Authentication
A08:2021 - Software and Data Integrity Failures
See OWASP Top 10 Security Concerns In 2017#A08 - Insecure Deserialization
A09:2021 - Security Logging and Monitoring Failures
See OWASP Top 10 Security Concerns In 2017#A10 - Insufficient Logging & Monitoring
A10:2021 - Server-Side Request Forgery (SSRF)
While ZK Framework itself does not provide specific mechanisms for making server-side requests, app developers need to ensure the safe handling of URLs and external resources, employing strict input validation and allowing accessible internal systems.