OWASP A05 - Security Misconfiguration

Showing 6 articles

Showing 6 articles

#1

Directory Indexing



Directory indexing vulnerabilities occur when a web application server is configured to return a listing of files in a web accessible directory in response to an HTTP request for that directory. Direc...

#2

Insecure Indexing



Insecure indexing vulnerabilities occur when the application discloses the location of sensitive or otherwise valuable files. Insecure indexing typically occurs when a web search engine finds sensitiv...

#3

Application Misconfiguration



Application misconfiguration vulnerabilities occur when an application is not configured properly by the user. Examples include weak passwords, weak access control permissions, exposed configuration s...

#4

Server Misconfiguration



Server misconfiguration vulnerabilities occur when the server that hosts the web application is not configured properly. Some types of server misconfiguration might not provide any dangerous capabil...

#5

Fingerprinting



Fingerprinting is a broad term that describes searching for telltale signs that a specific application or system component is running on a given system. These telltale signs are called fingerprints. T...

#6

Improper Filesystem Permissions



Improper filesystem permissions vulnerabilities occur when the filesystem permissions are not sufficiently restricted, either as a result of the application not setting strict enough permissions or th...