In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
And how BIG-IP ASM mitigates the vulnerabilities.
Vulnerability
BIG-IP ASM Controls
A1
Injection Flaws
Attack signatures
Meta character restrictions
Parameter value length restrictions
A2
Broken Authentication and Session Management
Brute Force protection
Credentials Stuffing protection
Login Enforcement
Session tracking
HTTP cookie tampering protection
Session hijacking protection
A3
Sensitive Data Exposure
Data Guard
Attack signatures ("Predictable Resource Location" and "Information Leakage")
A4
XML External Entities (XXE)
Attack signatures ("Other Application Attacks"-XXE)
XML content profile (Disallow DTD)
(Subset of API protection)
A5
Broken Access Control
File types
Allowed/disallowed URLs
Login Enforcement
Session tracking
Attack signatures ("Directory traversal")
A6
Security Misconfiguration
Attack Signatures
DAST integration
Allowed Methods
HTML5 Cross-Domain Request Enforcement
A7
Cross-site Scripting (XSS)
Attack signatures ("Cross Site Scripting (XSS)")
Parameter meta characters
HttpOnly cookie attribute enforcement
Parameter type definitions (such as integer)
A8
Insecure Deserialization
Attack Signatures ("Server Side Code Injection")
A9
Using components with known vulnerabilities
Attack Signatures
DAST integration
A10
Insufficient Logging and Monitoring
Request/response logging
Attack alarm/block logging
On-device logging and external logging to SIEM system
Event Correlation
Specifically, we have attack signatures for "A4:2017-XML External Entities (XXE)":
200018018 External entity injection attempt
200018030 XML External Entity XXE injection attempt (Content)
Also, XXE attack could be mitigated by XML profile, by disabling DTDs (and of course enabling the "Malformed XML data" violation):
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.