OWASP A06:2021 - Vulnerable and Outdated Components
Overview
Risk Rating
Common Vulnerable Components
1. Web Application Frameworks
2. JavaScript Libraries
3. Server Components
4. Database Components
5. Third-party Libraries
Penetration Testing Methodology
1. Component Discovery and Enumeration
2. Version Identification Techniques
3. Vulnerability Research and Mapping
Technology-Specific Testing
1. Apache Struts Testing
2. Log4j (Log4Shell) Testing
3. WordPress Plugin/Theme Vulnerabilities
4. Node.js/npm Package Vulnerabilities
Automated Discovery Tools
1. Component Analysis Tools
2. Web Application Scanners
3. Infrastructure Scanning
Exploitation Techniques
1. Remote Code Execution via Deserialization
2. File Upload Bypass via ImageMagick
3. SQL Injection via Hibernate
Advanced Detection Techniques
1. GitHub Reconnaissance
2. Source Code Analysis
3. API Endpoint Discovery
Remediation and Recommendations
1. Vulnerability Management Process
2. Automated Dependency Scanning
3. Secure Development Practices
Common Bypasses and Evasion
1. Version Obfuscation Bypass
2. WAF/Filter Bypass for Component Exploitation
Reporting Template
Finding Description
Tools and Resources
Component Scanners
Exploitation Frameworks
Research Resources
Prevention Best Practices
References and Further Reading
PreviousOWASP A05:2021 - Security MisconfigurationNextOWASP A07:2021 - Identification and Authentication Failures
Last updated