Web Application Vulnerability Analysis Using the OWASP Method (Case Study: OJS CSFD UIN Sunan Kalijaga Yogyakarta)

Bad'ul Hilmi Arromdoni, Mandahadi Kusuma, Bambang Sugiantoro
{"title":"Web Application Vulnerability Analysis Using the OWASP Method (Case Study: OJS CSFD UIN Sunan Kalijaga Yogyakarta)","authors":"Bad'ul Hilmi Arromdoni, Mandahadi Kusuma, Bambang Sugiantoro","doi":"10.4028/p-fosz2d","DOIUrl":null,"url":null,"abstract":"The Cyber Security and Digital Forensics (CSFD) Open Journal System (OJS) website owned by the information technology center and database (PTIPD) Islamic University Negri Sunan Kalijaga Yogyakarta is a software content management system (CMS) application that is intended as a media and means of research publications from academic research. Web-based applications that are not properly monitored will have the impact of being attacked by attackers. Vulnerability gaps that have been found by irresponsible attackers will have a very bad impact on the performance of the website application. From the summary of the results of the vulnerability scan, the researcher did not find high status vulnerability gaps using Aucentix tools, the researcher only found 18 vulnerability gaps at the medium risk level, 8 vulnerability gaps at low level and 10 informational vulnerability loopholes. As a comparison, the researchers conducted another scan using the OWAS-ZAP (Zed Attack Proxy) tool and found 17 vulnerabilities with details: 1 with high status, 4 with medium status, 8 with low status and 4 with informational status. The research is based on the OWASP Top-10 method as a measure and parameter in testing using penetration testing. researchers got 1 test result with successful status, namely Using Components with Known Vulnerabilities. Then the researcher found 1 type of vulnerability with posibility status, namely Sensitive Data Exposure with finding data that was not sensitive and 8 vulnerabilities that were not discovered, including: 1. Broken Authentication, 2. Cross-Site Scripting, 3. Security Misconfiguration, 4. Insufficient Logging and Monitoring, 5. Broken Access Control, 6. SQL Injection, 7. XML External Entities , 8. Insecure Deserialization.","PeriodicalId":512976,"journal":{"name":"Engineering Headway","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Engineering Headway","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4028/p-fosz2d","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Cyber Security and Digital Forensics (CSFD) Open Journal System (OJS) website owned by the information technology center and database (PTIPD) Islamic University Negri Sunan Kalijaga Yogyakarta is a software content management system (CMS) application that is intended as a media and means of research publications from academic research. Web-based applications that are not properly monitored will have the impact of being attacked by attackers. Vulnerability gaps that have been found by irresponsible attackers will have a very bad impact on the performance of the website application. From the summary of the results of the vulnerability scan, the researcher did not find high status vulnerability gaps using Aucentix tools, the researcher only found 18 vulnerability gaps at the medium risk level, 8 vulnerability gaps at low level and 10 informational vulnerability loopholes. As a comparison, the researchers conducted another scan using the OWAS-ZAP (Zed Attack Proxy) tool and found 17 vulnerabilities with details: 1 with high status, 4 with medium status, 8 with low status and 4 with informational status. The research is based on the OWASP Top-10 method as a measure and parameter in testing using penetration testing. researchers got 1 test result with successful status, namely Using Components with Known Vulnerabilities. Then the researcher found 1 type of vulnerability with posibility status, namely Sensitive Data Exposure with finding data that was not sensitive and 8 vulnerabilities that were not discovered, including: 1. Broken Authentication, 2. Cross-Site Scripting, 3. Security Misconfiguration, 4. Insufficient Logging and Monitoring, 5. Broken Access Control, 6. SQL Injection, 7. XML External Entities , 8. Insecure Deserialization.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用 OWASP 方法分析网络应用程序漏洞(案例研究:OJS CSFD UIN Sunan Kalijaga Yogyakarta)
日惹内格里苏南卡利雅加伊斯兰大学信息技术中心和数据库(PTIPD)拥有的网络安全和数字取证(CSFD)开放期刊系统(OJS)网站是一个软件内容管理系统(CMS)应用程序,旨在作为学术研究出版物的媒体和手段。基于网络的应用程序如果没有得到适当的监控,就会受到攻击者的攻击。不负责任的攻击者发现的漏洞缺口将对网站应用程序的性能产生非常恶劣的影响。从漏洞扫描的结果总结来看,研究人员使用 Aucentix 工具没有发现高危漏洞,只发现了 18 个中危漏洞、8 个低危漏洞和 10 个信息漏洞。作为对比,研究人员使用 OWAS-ZAP(Zed 攻击代理)工具进行了另一次扫描,发现了 17 个漏洞的详细信息:其中 1 个为高级状态,4 个为中级状态,8 个为低级状态,4 个为信息状态。研究以 OWASP Top-10 方法为基础,将其作为使用渗透测试进行测试的衡量标准和参数。研究人员获得了 1 个成功状态的测试结果,即使用已知漏洞的组件。然后,研究人员发现了 1 个具有可能性状态的漏洞类型,即敏感数据暴露,发现的数据并不敏感,还有 8 个未发现的漏洞,包括1.安全配置错误,4.日志记录和监控不足,5.访问控制漏洞,6.SQL 注入,7.XML 外部实体,8.不安全的反序列化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Recent Advancements in Materials, Design and Manufacturing (ICRAMDM-2023) Formation Conditions and Distribution Law of Tight Oil in Fuyu Oil Layer, Sanzhao Area, Songliao Basin Genetic Bat Algorithm-Based Multi-Objective Selective Disassembly Sequence Planning Characterization of the Hydrodynamics of Fine Channel Erosion on Slopes Based on Transparent Soil Test to Carry out Research on the Soil Stability Discrimination under the Suffusion
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1