WebApp Sec mailing list archives

Plone CMS Security Research: the Art of Plowning


From: Adrian Pastor <adrian.pastor () procheckup com>
Date: Thu, 13 Mar 2008 17:42:28 +0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello webappsec folks!

I thought the following research makes a good case study of a CMS that
is based on secure web application development guidelines (OWASP Top
10), but is still susceptible to issues that could allow the target to
be compromised.

Full details can be found here:
http://www.procheckup.com/Hacking_Plone_CMS.pdf

- --
Adrian P. | Security Consultant | +44 (0)207 307 5026 | ProCheckUp Ltd
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFH2WeEUmN3xwbmU6YRAkGhAJ0Z4GFkWqm0aRatSCpLi3NligJa3gCeMVdk
CZGnSZ9maKVTowm211tyg1M=
=cLod
-----END PGP SIGNATURE-----

-------------------------------------------------------------------------
Sponsored by: Watchfire Methodologies & Tools for Web Application Security Assessment With the rapid rise in the number and types of security threats, web application security assessments should be considered a crucial phase in the development of any web application. What methodology should be followed? What tools can accelerate the assessment process? Download this Whitepaper today!
https://www.watchfire.com/securearea/whitepapers.aspx?id=70170000000940F
-------------------------------------------------------------------------


Current thread: