-
Notifications
You must be signed in to change notification settings - Fork 49
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Adding Network Security Misconfiguration
- Loading branch information
Showing
3 changed files
with
29 additions
and
0 deletions.
There are no files selected for viewing
3 changes: 3 additions & 0 deletions
3
submissions/description/network_security_misconfiguration/guidance.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
# Guidance | ||
|
||
Provide a step-by-step walkthrough with a screenshot on how you exploited the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature. |
6 changes: 6 additions & 0 deletions
6
submissions/description/network_security_misconfiguration/recommendations.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
# Recommendation(s) | ||
|
||
Disable the user of telnet for the application’s connection to the server. Instead, SSH can be used. | ||
|
||
For more information, please see the Open Web Application Security Project (OWASP) guide located at: | ||
<https://owasp.org/www-community/vulnerabilities/Insecure_Transport> |
20 changes: 20 additions & 0 deletions
20
submissions/description/network_security_misconfiguration/template.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
# Network Security Misconfiguration | ||
|
||
## Overview of the Vulnerability | ||
|
||
Network security misconfigurations can occur in network devices, services, or infrastructure and expose the organization to security risks. This vulnerability was identified due to default settings, inadequate access controls, or improper firewall rules. Due to this, an attacker can perform further attacks on the application, the business, or its users. | ||
|
||
## Business Impact | ||
|
||
This vulnerability can lead to reputational damage and indirect financial loss to the company through the impact to customers’ trust. | ||
|
||
## Steps to Reproduce | ||
|
||
1. Issue the following command line in the terminal window: {{command}} | ||
1. Observe that the network security is bypassed and a connection is successfully established between the client computer and the application | ||
|
||
## Proof of Concept (PoC) | ||
|
||
The screenshot(s) below demonstrate(s) the vulnerability: | ||
|
||
{{screenshot}} |