WebApp Sec mailing list archives
Plone CMS Security Research: the Art of Plowning
From: Adrian Pastor <adrian.pastor () procheckup com>
Date: Thu, 13 Mar 2008 17:42:28 +0000
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello webappsec folks! I thought the following research makes a good case study of a CMS that is based on secure web application development guidelines (OWASP Top 10), but is still susceptible to issues that could allow the target to be compromised. Full details can be found here: http://www.procheckup.com/Hacking_Plone_CMS.pdf - -- Adrian P. | Security Consultant | +44 (0)207 307 5026 | ProCheckUp Ltd -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFH2WeEUmN3xwbmU6YRAkGhAJ0Z4GFkWqm0aRatSCpLi3NligJa3gCeMVdk CZGnSZ9maKVTowm211tyg1M= =cLod -----END PGP SIGNATURE----- -------------------------------------------------------------------------Sponsored by: Watchfire Methodologies & Tools for Web Application Security Assessment With the rapid rise in the number and types of security threats, web application security assessments should be considered a crucial phase in the development of any web application. What methodology should be followed? What tools can accelerate the assessment process? Download this Whitepaper today!
https://www.watchfire.com/securearea/whitepapers.aspx?id=70170000000940F -------------------------------------------------------------------------
Current thread:
- Plone CMS Security Research: the Art of Plowning Adrian Pastor (Mar 13)