The OWASP Top 10 represents the most critical web application security risks. Updated every few years by the Open Web Application Security Project, it's the definitive checklist for web security testing. Think of it as the "greatest hits" of web vulnerabilities!
A01: Broken Access Control
Access control enforces that users cannot act outside their intended permissions. When broken, attackers access unauthorized functionality or data.
IDOR Testing
A02: Cryptographic Failures
Formerly "Sensitive Data Exposure," this covers failures in cryptography that lead to sensitive data exposure.
A03: Injection
User-supplied data is sent to an interpreter as part of a command or query. SQL injection, Command injection, LDAP injection all fall here.
A04: Insecure Design
New in 2021! Focuses on flaws in design and architecture rather than implementation bugs. No amount of fixing code helps a fundamentally flawed design.
A05: Security Misconfiguration
A06: Vulnerable Components
Using components with known vulnerabilities. Libraries, frameworks, and other software modules with documented CVEs.
A07: Authentication Failures
A08: Software and Data Integrity Failures
New category combining Insecure Deserialization with new risks around CI/CD pipelines and software updates without integrity verification.
A09: Security Logging and Monitoring Failures
A10: Server-Side Request Forgery (SSRF)
Blind SSRF
Knowledge Check
Key Takeaways
- Broken Access Control is now the #1 risk (moved from #5)
- Injection remains critical - always validate and sanitize input
- Insecure Design is a new category requiring architecture review
- SSRF (new to top 10) can access internal services and cloud metadata
- Use OWASP Top 10 as a checklist for web application testing
- Component vulnerabilities require continuous monitoring