Categories: OWASP - Top 10

A-9 Using Components with known Vulnerabilities – Every Developers Should aware

Exploitability of the risk is average, Attacker needs to identify the weak part through scanning or manual analysis.

But the risk is widely spread, Many application has these issues on the grounds that most development teams don’t concentrate on guaranteeing their parts/libraries are breakthrough.

Most of the time, the developers don’t know every one of the parts they are utilizing, it doesn’t mind their formats.

A full range of weaknesses is possible, including injection, broken access control, XSS, etc. The impact could range from minimal to complete.

SCENARIO 1:

A-9 Using Components with known VulnerabilitiesA-9 Using Components with known Vulnerabilities

Now the attacker and the webserver, the attacker tries to exploit a vulnerable component on the server, a Vulnerable component is nothing but a product or Library which could be at risk.

SCENARIO 2:

A-9 Using Components with known VulnerabilitiesA-9 Using Components with known Vulnerabilities
  1. In this scenario, the attacker tries to make a request to the website, and let’s assume this request loads a page which has the vulnerability.
  2. The website responds to the request which also discloses the vulnerable components.
  3. Once the attacker finds the vulnerable components and version, then he will go to Internet and searches for known vulnerabilities.
  4. Regardless it is easy to find risks associated with vulnerable components on the web, so the attackers get information on how this risk might be exploited.
  5. Then attacker so goes and launches the attack with the website.

Common Defences

  • Identify Components and versions.
  • Components that are used unplanned.
  • Monitor CVEs impacting those components.
  • Keep Components updated.
  • Regularly Monitor new releases.
Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Open Source Linux Firewall IPFire 2.29 – Core Update 194 Released: What’s New!

IPFire, the powerful open-source firewall, has unveiled its latest release, IPFire 2.29 – Core Update…

2 hours ago

Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft

Distributed Denial of Service (DDoS) attacks, once seen as crude tools for disruption wielded by…

2 hours ago

20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week

A 20-year-old criminal proxy network has been disrupted through a joint operation involving Lumen’s Black…

2 hours ago

“PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram

A new information-stealing malware dubbed “PupkinStealer” has emerged as a significant threat to individuals and…

2 hours ago

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs (Uniform…

3 hours ago

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability in…

4 hours ago