And how big-IP ASM mitigates the vulnerabilities.
|
Vulnerability |
Big-IP ASM Controls |
A1 |
Injection Flaws |
attack signatures meta character restrictions parameter value Length restrictions |
A2 |
Broken authentication and Session Management |
brute Force protection credentials stuffing protection session tracking http Cookie tampering protection P style= "Box-sizing:border-box;" >session Hijacking protection |
a3 |
Sensitive Data Exposure |
data Guard |
A4 |
XML External entities (XXE) |
attack signatures ("Other application Attacks"-XXE) |
a5 |
Broken Access Control |
file types login enforcement session tracking attack signatures ("Directory traversal") |
a6 |
Security misconfiguration |
attack Signatures dast integration allowed Methods |
a7 |
Cross-site Scripting (XSS) |
attack signatures ("Cross Site Scripting (XSS)") httponly cookie attribute Enforcement |
A8 |
Insecure deserialization |
Attack Signatures ("Server Side Code Injection") |
A9 |
Using components with known vulnerabilities |
Attack Signatures DAST Integration |
A10 |
Insufficient Logging and monitoring |
Request/response Logging Attack Alarm/block Logging On-device logging and external logging to SIEM system Event Correlation |
Specifically, we have attack signatures for "A4:2017-xml External entities (XXE)":
Also, XXE attack could be mitigated by XML profiles, by disabling DTDs (and of course enabling the "Malformed XML data" vio Lation):
OWASP TOP 10