[seam-dev] Re: Adding a security audit to the Seam QA (release) process

Pete Muir pmuir at redhat.com
Wed Oct 22 07:08:10 EDT 2008


On 22 Oct 2008, at 12:05, Anil Saldhana wrote:

> Shane Bryzak wrote:
>> Rodney Russ wrote:
>>> Pete Muir wrote:
>>>> Marc, Christian, Jay and I met and discussed this. Here is the  
>>>> outcome:
>>>>
>>>> 1) Create a wiki page and list out the "top ten" web security  
>>>> problems. This page should list not actual exploits, but the  
>>>> underlying problems (for example XSS and XSRF). This page will  
>>>> also link to good resources describing the problem, and common  
>>>> solutions. Christian and Marc will collaborate to build this page.
>>> Any reason why we wouldn't look to existing lists for the top web  
>>> application exploits in the "wild"?  For example:
>>>
>>> * The OWASP top ten:  http://www.owasp.org/index.php/Top_10_2007
>>> * The Web Application Security Consortium's Threat  
>>> Classification:  http://www.webappsec.org/projects/threat/

Agreed, I hope this is part of the research that Marc and Christian  
will do :-)

>>>
>>
>> I took a look at both of these, I especially liked the second one  
>> (WASC) as they provide a PDF document containing details of known  
>> attack types broken down by class (authentication, authorization,  
>> client-side, command-execution, information disclosure, and logical  
>> attacks).  I would ultimately like to see a table detailing how  
>> Seam addresses each of these vulnerabilities, and I think an  
>> additional chapter in the docs as Pete suggested would be the best  
>> place for this (item 4 in the task list).  The great thing about  
>> the WASC document was that it gave clear examples of how each of  
>> the exploits worked -  I think we need to work the same kind of  
>> explanations into the documentation also.  For example, rather than  
>> just say 'this is how Seam is secure against session fixation  
>> attacks' we actually explain what a session fixation attack is.

Or if we can get a permalink to a good resource....

BTW Dan is going to coordinate (2) and (4)

>>
> Both OWASP and webappsec are the results of Jeremiah Grossman, CEO  
> of Whitehat Security.  So they will have the same contents.  You can  
> combine them to get the list. :)
>
> I agree with Shane that we need to explain the vulnerabilities in  
> addition to listing them.
>>>>
>>>> 2) Create a second wiki page to discuss how these problems affect  
>>>> the various points at which Seam is exposed (e.g. JSF, Wicket,  
>>>> remoting), the resources collected for (1) can be used to  
>>>> identify and help close any holes. Currently there is no-one  
>>>> leading this effort.
>>>>
>>>> 3) At release time QA will run through the list from (1) and  
>>>> identify if there are any new features added to Seam which could  
>>>> be affected. If there are, and the developer has not documented  
>>>> them on (2), QA will discuss the problem with the developer. Jay/ 
>>>> QA to lead.
>>>>
>>>> 4) Building out a "Securing your application" chapter and tools  
>>>> which Seam users can follow to secure their application built  
>>>> using Seam. An example of this is provide a tool which can  
>>>> generate a unique token to prevent XSRF attacks. Currently there  
>>>> is no one leading this, but the same person as (2) should own it  
>>>> IMO.
>>>>
>>>> If someone would like to volunteer for (2) & (4) who has an  
>>>> interest in security, that would be great :-)
>>>>
>>>> We also discussed the process for dealing with found exploits:
>>>>
>>>> 1) We already tell people to email security at jboss.org with any  
>>>> suspected problems.
>>>>
>>>> 2) We need to publish the response policy, probably on jboss.org.  
>>>> Christian will talk to Anil about publishing this, and the jboss  
>>>> advisory list info.
>>>>
>>>> 3) It is at the discretion of the JBoss Security Response Team to  
>>>> decide whether to embargo an issue, and discuss just with a  
>>>> developer, and not make it public until there is a release or  
>>>> whether the issue is more general and should be discussed on seam-dev at lists.jboss.org
>>>>
>>>>
>>>> On 6 Oct 2008, at 11:55, Pete Muir wrote:
>>>>
>>>>> Marc,
>>>>>
>>>>> Sounds great. I'm in the UK, so GMT+1 atm. Christian, will you  
>>>>> join us to discuss?
>>>>>
>>>>> Best,
>>>>>
>>>>> On 6 Oct 2008, at 11:13, Marc Schoenefeld wrote:
>>>>>
>>>>>> Hi Pete,
>>>>>>
>>>>>> that sounds like a good plan, let's schedule some initial  
>>>>>> planning for
>>>>>> next week, because this week I am quite busy with after-PTO  
>>>>>> workload
>>>>>> and SOA testing. How about next tuesday? BTW, which timezone  
>>>>>> are you
>>>>>> in,  maybe we can start with a phone chat?
>>>>>>
>>>>>> The first things that come into my mind are JSF view state  
>>>>>> injection,
>>>>>> XSS in all different kinds, remoting misuse, insecure servlet  
>>>>>> mappings.
>>>>>> During this week I will catch with the current Seam codebase by
>>>>>> findbugs-ing through it, and maybe already stumble over the one  
>>>>>> or
>>>>>> other place to start poking into.
>>>>>>
>>>>>> Cheers
>>>>>> Marc
>>>>>>
>>>>>> Pete Muir wrote:
>>>>>>> Hi Marc,
>>>>>>>
>>>>>>> Something that we've been discussing is the idea creating a  
>>>>>>> security
>>>>>>> audit checklist that will cover Seam and the ways it interacts  
>>>>>>> with
>>>>>>> the outside world; initially, we want to focus on JSF, Seam  
>>>>>>> Remoting
>>>>>>> (Ajax) and Servlet but we will also consider adding in WS  
>>>>>>> including
>>>>>>> JAX-RS, Wicket, GWT and perhaps others, though these are what  
>>>>>>> I can
>>>>>>> think off. This checklist would then be added to the Seam QA  
>>>>>>> process
>>>>>>> (which is run through at release time).
>>>>>>>
>>>>>>> We were wondering if you would be able to work with us on  
>>>>>>> this? My
>>>>>>> suggestion is, that as you (I hope ;-) have a good  
>>>>>>> understanding of
>>>>>>> the general approaches that could be used to exploit a Seam  
>>>>>>> that you
>>>>>>> would be to work with us both on an initial list of areas to  
>>>>>>> focus on,
>>>>>>> and then help us develop the checklist.
>>>>>>>
>>>>>>> Let us know :)
>>>>>>>
>>>>>>> Pete
>>>>>>
>>>>>>
>>>>>> -- 
>>>>>> Marc Schoenefeld / Red Hat Security Response Team
>>>>>>
>




More information about the seam-dev mailing list