Magento Application Security [EN]

Anna Völkl
Anna VölklMagento Lead Developer at E-CONOMIX GmbH um E-CONOMIX GmbH
Magento
Application
Security
Anna Völkl / @rescueAnn
Magento Application Security [EN]
Anna Völkl / @rescueAnn
• Magento Certified Developer
• IT & Telecommunication, IT-Security
• PHP (2004), Magento (2011)
• LimeSoda (Vienna, AT)
Anna Völkl / @rescueAnn
• 200 Magento Installations*
• 68 good passwords**
• 10 endless loops***
• 3 forgotten phpinfo.php
• 1 Stroopwafel purchase
* roughly estimated, including test-setups
** thanks to KeePass
*** last one 12/2012
Magento Application Security [EN]
Magento Application Security [EN]
Security-Technology
Department of Defense
Computer Security Initiative
1980
Magento Application Security
 Logins & Passwords
 Admin Backend protected
 SSL installed
Magento Application Security
 Logins & Passwords
 Admin Backend protected
 SSL installed
…there‘s more!
Magento Application
Security
Magento Application
Security
Software Development
Life Cycle
Software Development
Life Cycle
UserUser
DatabaseDatabase
WebserverWebserver
Version control &
delivery
Version control &
delivery
RequirementsRequirements
Software-DesignSoftware-Design DevelopmentDevelopment Extensions /
3rd Party
Extensions /
3rd Party
Out of serviceOut of service
Updates & PatchesUpdates & Patches
LoginsLogins
PasswordsPasswords
Web-Application
Firewall
Web-Application
Firewall
FirewallFirewall
File owner &
permissions
File owner &
permissions
Config filesConfig files
IDS, IPSIDS, IPS
http://blogs.technet.com/b/rhalbheer/archive/2011/01/14/real-physical-security.aspx
Security
Confidentiality
Confidentiality
IntegrityIntegrity
AvailabilityAvailability
Unsecure Software?
•No time
•No knowledge
•No priorities
•Performance
•SEO
•New features
Potential attackers
✗ (organized) criminals
✗ Defacer
✗ Script-Kiddies
✗ Former developers, agencies
✗ Competitors
✗ The merchant theirselves
Interest?
➢Payment data
➢Customer data
➢Personal gain
➢Damage competitors
Most critical web application security flaws
A1 Injection
A2 Broken Authentication and Session Management
A3 Cross-Site Scripting (XSS)
A4 Insecure Direct Object References
A5 Security Misconfiguration
More: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
web application security flaws
OWASP Top 10 2013,
https://www.owasp.org/images/4/42/OWASP_Top_10_2013_DE_Version_1_0.pdf, modified version
Secure Coding
Principles
Minimize attack
surface area
Every feature adds a risk.
Secure defaults
Secure configuration „out of the box“
Least Privilege
Least amount of privilege required to
perform actions
Fail secure
Fail secure vs. Fail safe
Don't trust services
...they can be wrong.
Don't trust user input
Validate the expected
Expect the unexpected
Longest place name (1 word)
Taumatawhakatangihangakoauauotamateaturipuk
akapikimaungahoronukupokaiwhenuakitanatahu
(New Zealand, 85 letters)
https://xkcd.com/327/
Security by obscurity
Security by lack of knowledge?!
KISS
Keep security simple
Simplicity vs. complexity
Fix security issues correctly
Understand the problem
Find related code
Write tests
...now what?!
Functional & non functional
Requirements
Be curious!
Read, learn, try to understand.
Secure Coding Guidelines:
OWASP Secure Coding Practices
Secure Coding
Validate your input
Expected input: Whitelist vs. Blacklist
Secure Coding
https://quadhead.de/cola-hack-sicherheitsluecke-auf-meinecoke-de/
User:
allowed to access a resource?
Admins:
ACLs
Mage::getSingleton('admin/session')
->isAllowed('admin/sales/order/actions/create');
Secure Coding
●
PHPSniffer
●
Magento ECG Coding Standard
●
Dependencies:
Sensio Labs composer.lock check
Security Testing
Scrutinizer CI
Code Climate
SensioLabsInsight
Security Testing
Scrutinizer CI
Code Climate
SensioLabsInsight
Security Testing
●
.git, .git/config
●
composer.lock
●
Standard /admin path
●
/downloader
●
app/etc/local.xml
●
Logfiles
●
phpinfo.php
●
Database-Dumps: livedb.sql.gz
Block access to
SUPEE-5344
SUPEE-5994
Latest security patches
●
Magento Community Edition 1.9.1.1 & Enterprise
Edition 1.14.2 contain SUPEE-5344
●
Magento Shoplift Bug Tester:
https://shoplift.byte.nl
●
Coming soon: Magento Alert Registry
●
@magesecurity
Patch!
Leave your code more
secure (better) than you
found it.
1 von 42

Recomendados

Intro to IronWASP von
Intro to IronWASPIntro to IronWASP
Intro to IronWASPn|u - The Open Security Community
3K views13 Folien
[OWASP Poland Day] Security in developer's life von
[OWASP Poland Day] Security in developer's life[OWASP Poland Day] Security in developer's life
[OWASP Poland Day] Security in developer's lifeOWASP
640 views26 Folien
SPI Dynamics web application security 101 von
SPI Dynamics web application security 101 SPI Dynamics web application security 101
SPI Dynamics web application security 101 Wade Malone
518 views19 Folien
Create code confidence for better application security von
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application securityRogue Wave Software
252 views35 Folien
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities von
Understanding The Known: OWASP A9 Using Components With Known VulnerabilitiesUnderstanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known VulnerabilitiesAnant Shrivastava
5.2K views52 Folien

Más contenido relacionado

Was ist angesagt?

Top 3 tips for security documentation von
Top 3 tips for security documentationTop 3 tips for security documentation
Top 3 tips for security documentationMichael Furman
617 views15 Folien
Security hole #5 application security science or quality assurance von
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assuranceTjylen Veselyj
1.4K views26 Folien
How can you deliver a secure product von
How can you deliver a secure productHow can you deliver a secure product
How can you deliver a secure productMichael Furman
544 views42 Folien
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 von
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Ajin Abraham
8K views53 Folien
Owasp Mobile Risk Series : M4 : Unintended Data Leakage von
Owasp Mobile Risk Series : M4 : Unintended Data LeakageOwasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data LeakageAnant Shrivastava
40.3K views13 Folien
Pentesting Your Own Wireless Networks, June 2011 Issue von
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
2.1K views35 Folien

Was ist angesagt?(20)

Top 3 tips for security documentation von Michael Furman
Top 3 tips for security documentationTop 3 tips for security documentation
Top 3 tips for security documentation
Michael Furman617 views
Security hole #5 application security science or quality assurance von Tjylen Veselyj
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assurance
Tjylen Veselyj1.4K views
How can you deliver a secure product von Michael Furman
How can you deliver a secure productHow can you deliver a secure product
How can you deliver a secure product
Michael Furman544 views
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 von Ajin Abraham
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham8K views
Owasp Mobile Risk Series : M4 : Unintended Data Leakage von Anant Shrivastava
Owasp Mobile Risk Series : M4 : Unintended Data LeakageOwasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Anant Shrivastava40.3K views
Pentesting Your Own Wireless Networks, June 2011 Issue von Ishan Girdhar
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar2.1K views
Why 'positive security' is a software security game changer von Jaap Karan Singh
Why 'positive security' is a software security game changerWhy 'positive security' is a software security game changer
Why 'positive security' is a software security game changer
Jaap Karan Singh60 views
Secure Coding for Java - An Introduction von Sebastien Gioria
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
Sebastien Gioria1.5K views
Android Application Penetration Testing - Mohammed Adam von Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
Mohammed Adam3.3K views
Automated Security Analysis of Android & iOS Applications with Mobile Securit... von Ajin Abraham
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham26.1K views
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S... von Ajin Abraham
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham10K views
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014 von Anant Shrivastava
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava41K views
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation von Derrick Hunter
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Derrick Hunter1.6K views
Securing Underprotected APIs - Deja vu Security von Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu Security
Deja vu Security719 views
[OPD 2019] Governance as a missing part of IT security architecture von OWASP
[OPD 2019] Governance as a missing part of IT security architecture[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Governance as a missing part of IT security architecture
OWASP162 views
Continuous and Visible Security Testing with BDD-Security von Stephen de Vries
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-Security
Stephen de Vries4.3K views
[OPD 2019] Top 10 Security Facts of 2020 von OWASP
[OPD 2019] Top 10 Security Facts of 2020[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020
OWASP240 views

Similar a Magento Application Security [EN]

OWASP an Introduction von
OWASP an Introduction OWASP an Introduction
OWASP an Introduction alessiomarziali
894 views53 Folien
Top Ten Proactive Web Security Controls v5 von
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Jim Manico
5.6K views85 Folien
Developing Secure Applications and Defending Against Common Attacks von
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksPayPalX Developer Network
3.5K views35 Folien
OWASP_Top_Ten_Proactive_Controls_v2.pptx von
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxazida3
7 views92 Folien
00. introduction to app sec v3 von
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3Eoin Keary
95 views33 Folien
香港六合彩 von
香港六合彩香港六合彩
香港六合彩baoyin
564 views20 Folien

Similar a Magento Application Security [EN](20)

Top Ten Proactive Web Security Controls v5 von Jim Manico
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
Jim Manico5.6K views
OWASP_Top_Ten_Proactive_Controls_v2.pptx von azida3
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
azida37 views
00. introduction to app sec v3 von Eoin Keary
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
Eoin Keary95 views
香港六合彩 von baoyin
香港六合彩香港六合彩
香港六合彩
baoyin564 views
Avoiding damage, shame and regrets data protection for mobile client-server a... von Stanfy
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
Stanfy7.1K views
BUSTED! How to Find Security Bugs Fast! von Parasoft
BUSTED! How to Find Security Bugs Fast!BUSTED! How to Find Security Bugs Fast!
BUSTED! How to Find Security Bugs Fast!
Parasoft1.8K views
Securing your web applications a pragmatic approach von Antonio Parata
Securing your web applications a pragmatic approachSecuring your web applications a pragmatic approach
Securing your web applications a pragmatic approach
Antonio Parata533 views
Survey Presentation About Application Security von Nicholas Davis
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
Nicholas Davis204 views
1.3. (In)security Software von defconmoscow
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Software
defconmoscow432 views
Security in the cloud protecting your cloud apps von Cenzic
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
Cenzic1.4K views
Remote Workforces Secure by Barracuda von Prime Infoserv
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
Prime Infoserv61 views
Benefits of web application firewalls von EnclaveSecurity
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
EnclaveSecurity8.1K views
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities... von Veracode
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Veracode469 views
OWASP Top 10 2007 for JavaEE von Magno Logan
OWASP Top 10 2007 for JavaEE OWASP Top 10 2007 for JavaEE
OWASP Top 10 2007 for JavaEE
Magno Logan4K views
Top Ten Java Defense for Web Applications v2 von Jim Manico
Top Ten Java Defense for Web Applications v2Top Ten Java Defense for Web Applications v2
Top Ten Java Defense for Web Applications v2
Jim Manico37.2K views
Slide Griffin - Practical Attacks and Mitigations von EnergySec
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
EnergySec550 views
Automating your AWS Security Operations von Evident.io
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
Evident.io1.5K views

Más de Anna Völkl

Schnell, schön, sicher: Technische Konzeption und Betrieb sicherer E-Commerce... von
Schnell, schön, sicher: Technische Konzeption und Betrieb sicherer E-Commerce...Schnell, schön, sicher: Technische Konzeption und Betrieb sicherer E-Commerce...
Schnell, schön, sicher: Technische Konzeption und Betrieb sicherer E-Commerce...Anna Völkl
2 views18 Folien
Magento Security Best Practises - MM17PL von
Magento Security Best Practises - MM17PLMagento Security Best Practises - MM17PL
Magento Security Best Practises - MM17PLAnna Völkl
1.9K views50 Folien
Magento Security Best Practises - MM17DE von
Magento Security Best Practises - MM17DEMagento Security Best Practises - MM17DE
Magento Security Best Practises - MM17DEAnna Völkl
1.9K views49 Folien
Secure development environment @ Meet Magento Croatia 2017 von
Secure development environment @ Meet Magento Croatia 2017Secure development environment @ Meet Magento Croatia 2017
Secure development environment @ Meet Magento Croatia 2017Anna Völkl
1.9K views48 Folien
Secure input and output handling - Mage Titans Manchester 2016 von
Secure input and output handling - Mage Titans Manchester 2016Secure input and output handling - Mage Titans Manchester 2016
Secure input and output handling - Mage Titans Manchester 2016Anna Völkl
1.7K views57 Folien
Secure input and output handling - Meet Magento Romania 2016 von
Secure input and output handling - Meet Magento Romania 2016Secure input and output handling - Meet Magento Romania 2016
Secure input and output handling - Meet Magento Romania 2016Anna Völkl
1.8K views54 Folien

Más de Anna Völkl(9)

Schnell, schön, sicher: Technische Konzeption und Betrieb sicherer E-Commerce... von Anna Völkl
Schnell, schön, sicher: Technische Konzeption und Betrieb sicherer E-Commerce...Schnell, schön, sicher: Technische Konzeption und Betrieb sicherer E-Commerce...
Schnell, schön, sicher: Technische Konzeption und Betrieb sicherer E-Commerce...
Anna Völkl2 views
Magento Security Best Practises - MM17PL von Anna Völkl
Magento Security Best Practises - MM17PLMagento Security Best Practises - MM17PL
Magento Security Best Practises - MM17PL
Anna Völkl1.9K views
Magento Security Best Practises - MM17DE von Anna Völkl
Magento Security Best Practises - MM17DEMagento Security Best Practises - MM17DE
Magento Security Best Practises - MM17DE
Anna Völkl1.9K views
Secure development environment @ Meet Magento Croatia 2017 von Anna Völkl
Secure development environment @ Meet Magento Croatia 2017Secure development environment @ Meet Magento Croatia 2017
Secure development environment @ Meet Magento Croatia 2017
Anna Völkl1.9K views
Secure input and output handling - Mage Titans Manchester 2016 von Anna Völkl
Secure input and output handling - Mage Titans Manchester 2016Secure input and output handling - Mage Titans Manchester 2016
Secure input and output handling - Mage Titans Manchester 2016
Anna Völkl1.7K views
Secure input and output handling - Meet Magento Romania 2016 von Anna Völkl
Secure input and output handling - Meet Magento Romania 2016Secure input and output handling - Meet Magento Romania 2016
Secure input and output handling - Meet Magento Romania 2016
Anna Völkl1.8K views
Secure input and output handling - ViennaPHP von Anna Völkl
Secure input and output handling - ViennaPHPSecure input and output handling - ViennaPHP
Secure input and output handling - ViennaPHP
Anna Völkl824 views
Secure input and output handling - Magento Meetup Vienna Edition von Anna Völkl
Secure input and output handling - Magento Meetup Vienna EditionSecure input and output handling - Magento Meetup Vienna Edition
Secure input and output handling - Magento Meetup Vienna Edition
Anna Völkl9.3K views
Magento Application Security [DE] von Anna Völkl
Magento Application Security [DE]Magento Application Security [DE]
Magento Application Security [DE]
Anna Völkl919 views

Último

231121 SP slides - PAS workshop November 2023.pdf von
231121 SP slides - PAS workshop November 2023.pdf231121 SP slides - PAS workshop November 2023.pdf
231121 SP slides - PAS workshop November 2023.pdfPAS_Team
195 views15 Folien
Timeahead Agency Pitch Deck.pdf von
Timeahead Agency Pitch Deck.pdfTimeahead Agency Pitch Deck.pdf
Timeahead Agency Pitch Deck.pdfHabib-ur- Rehman
13 views13 Folien
Roozbeh Torkzadeh - TU Eindhoven von
Roozbeh Torkzadeh - TU EindhovenRoozbeh Torkzadeh - TU Eindhoven
Roozbeh Torkzadeh - TU EindhovenDutch Power
106 views14 Folien
PPS.pptx von
PPS.pptxPPS.pptx
PPS.pptxmdabzayub
5 views51 Folien
Pdffromtextfile_1.pdf von
Pdffromtextfile_1.pdfPdffromtextfile_1.pdf
Pdffromtextfile_1.pdfTRIEU QUANG NGO
8 views2 Folien
ERGONOMIC RISK ASSESSMENT (ERA).pptx von
ERGONOMIC RISK ASSESSMENT (ERA).pptxERGONOMIC RISK ASSESSMENT (ERA).pptx
ERGONOMIC RISK ASSESSMENT (ERA).pptxj967z4hcnp
6 views7 Folien

Último(20)

231121 SP slides - PAS workshop November 2023.pdf von PAS_Team
231121 SP slides - PAS workshop November 2023.pdf231121 SP slides - PAS workshop November 2023.pdf
231121 SP slides - PAS workshop November 2023.pdf
PAS_Team195 views
Roozbeh Torkzadeh - TU Eindhoven von Dutch Power
Roozbeh Torkzadeh - TU EindhovenRoozbeh Torkzadeh - TU Eindhoven
Roozbeh Torkzadeh - TU Eindhoven
Dutch Power106 views
ERGONOMIC RISK ASSESSMENT (ERA).pptx von j967z4hcnp
ERGONOMIC RISK ASSESSMENT (ERA).pptxERGONOMIC RISK ASSESSMENT (ERA).pptx
ERGONOMIC RISK ASSESSMENT (ERA).pptx
j967z4hcnp6 views
Managing Github via Terrafom.pdf von micharaeck
Managing Github via Terrafom.pdfManaging Github via Terrafom.pdf
Managing Github via Terrafom.pdf
micharaeck5 views
Christan van Dorst - Hyteps von Dutch Power
Christan van Dorst - HytepsChristan van Dorst - Hyteps
Christan van Dorst - Hyteps
Dutch Power111 views
Gym Members Community.pptx von nasserbf1987
Gym Members Community.pptxGym Members Community.pptx
Gym Members Community.pptx
nasserbf198710 views
I use my tools to help people von mywampa
I use my tools to help peopleI use my tools to help people
I use my tools to help people
mywampa7 views

Magento Application Security [EN]