+1

it would be nice to have a blog for this type of news...

2015-10-05 15:27 GMT+02:00 Ian Ryder <[email protected]>:

> Thanks, just running some of their tools against our app - all good so
> far, if there's anything of interest I'll let you know (possibly off forum
> first :))
>
>
> On Monday, 5 October 2015 12:25:20 UTC+2, Niphlod wrote:
>>
>> here in ***undisclosed company**** web2py survives a
>> https://www.qualys.com/ security scan with no reports whatsoever.
>>
>> On Sunday, October 4, 2015 at 2:47:44 PM UTC+2, Ian Ryder wrote:
>>>
>>> Hi, just looking back over anything about penetration testing and web2py
>>> - does anyone know of any recent (or any at all) testing of web2py? We're
>>> getting close to our first customers on an app we've been developing the
>>> last year so really need to try and pick it to pieces now while we have a
>>> few months to work on anything we need to.
>>>
>>> Thanks
>>> Ian
>>>
>>> On Tuesday, 10 July 2012 19:42:46 UTC+2, Massimo Di Pierro wrote:
>>>>
>>>> Thank you Dave for the feedback. It would be nice to have the results
>>>> of those  tests (Cenznic, Hailstorm, Quails) published somewhere. Once in a
>>>> while people ask about this.
>>>>
>>>> Massimo
>>>>
>>>> On Tuesday, 10 July 2012 11:28:39 UTC-5, Dave wrote:
>>>>>
>>>>> Well....
>>>>>
>>>>> I can't say that I have tested the current trunk version, but last
>>>>> December I ran a pretty exhaustive penetration test against a site
>>>>> developed web2py.  The results were very good.  No findings above low.  
>>>>> The
>>>>> low findings were insignificant.  I ran Cenzic Hailstorm, Qualys and one
>>>>> other automated vulnerability test suite (I cant remember which at the
>>>>> moment) against it without issue.
>>>>>
>>>>> Here are some things that can cause issue though...
>>>>>
>>>>> * anywhere you use the XML() method in a view you should make sure you
>>>>> have validation turned on.  Even though the framework is resilient and 
>>>>> does
>>>>> a good job of sanitizing data in & out, you can still end up in XSS or 
>>>>> XSRF
>>>>> trouble with XML().
>>>>>
>>>>> * redirects can trip up or slow down a lot of vuln scanners.  Watch
>>>>> out if you perform your own testing that you're not getting false 
>>>>> negatives.
>>>>>
>>>>> I know some people that would take on a more "formal" assessment if
>>>>> there is consensus....
>>>>>
>>>>> Dave
>>>>>
>>>>> On Monday, July 9, 2012 11:48:39 AM UTC-4, scausten wrote:
>>>>>>
>>>>>> One of the awesome things about web2py is of course the built-in and
>>>>>> well-documented resilience against a range of attack methods, but I was
>>>>>> wondering if anyone has attempted a methodical (white-hat) attack to 
>>>>>> probe
>>>>>> any potential weaknesses?
>>>>>>
>>>>>> Just out of interest :)
>>>>>>
>>>>> --
> Resources:
> - http://web2py.com
> - http://web2py.com/book (Documentation)
> - http://github.com/web2py/web2py (Source code)
> - https://code.google.com/p/web2py/issues/list (Report Issues)
> ---
> You received this message because you are subscribed to the Google Groups
> "web2py-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> For more options, visit https://groups.google.com/d/optout.
>

-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to