@@ -17,4 +17,47 @@ tags: ["websites", "security"]
17
17
18
18
## Auditing
19
19
20
- - [ Lynis] ( https://cisofy.com/lynis/ ) - A security auditing tool
20
+ - [ Lynis] ( https://cisofy.com/lynis/ ) - A security auditing tool
21
+
22
+ ## AJAX
23
+
24
+ ### Don't
25
+
26
+ - Rely on client logic for security
27
+ - Build JSON dynamically
28
+ - Transmit secrets to the client
29
+ - Perform encryption on the client-side code
30
+ - Write your own serialization code (use ` JSON ` library)
31
+
32
+ ### Do
33
+
34
+ - Keep business logic on the server
35
+ - Server - use CSRF tokens
36
+ - ALWAYS return JSON with an Object on the outside ` {"object": "good code"} `
37
+
38
+ ## Abuse Cases
39
+
40
+ Full [ details here] ( https://cheatsheetseries.owasp.org/cheatsheets/Abuse_Case_Cheat_Sheet.html ) .
41
+
42
+ Create a speadsheet with the following tabs:
43
+
44
+ ### Features
45
+
46
+ | Feature unique ID | Feature name | Feature short description |
47
+ | ----------------- | --------------------- | --------------------------------------------- |
48
+ | FEATURE_001 | DocumentUploadFeature | Allow user to upload document along a message |
49
+
50
+ ### Counter Measures
51
+
52
+ | Countermeasure unique ID | Countermeasure short description | Countermeasure help/hint |
53
+ | ------------------------ | ------------------------------------------------------ | ------------------------------------------------------- |
54
+ | DEFENSE_001 | Validate the uploaded file by loading it into a parser | Use advice from the OWASP Cheat Sheet about file upload |
55
+
56
+ ### Abuse Cases
57
+
58
+ | Abuse case unique ID | Feature ID impacted | Abuse case's attack description | Attack referential ID (if applicable) | CVSS V3 risk rating (score) | CVSS V3 string | Kind of abuse case | Countermeasure ID applicable | Handling decision (To Address or Risk Accepted) |
59
+ | -------------------- | ------------------- | ----------------------------------------------------------------------- | ------------------------------------- | --------------------------- | -------------------------------------------- | ------------------ | ---------------------------- | ----------------------------------------------- |
60
+ | ABUSE_CASE_001 | FEATURE_001 | Upload Office file with malicious macro in charge of dropping a malware | CAPEC-17 | HIGH (7.7) | CVSS:3.0/AV: N /AC: H /PR: L /UI: R /S: C /C: N /I: H /A: H | Technical | DEFENSE_001 | To Address |
61
+
62
+ ## Access Control
63
+
0 commit comments