Any updates on this? I am in the process of finding a supplier to pen test, wondering if i should be prepared for anything.
On Friday, October 9, 2015 at 11:26:55 AM UTC-4, Michael M wrote: > > My company has to have an outside firm Pen test all Web-Service > applications. So I am spinning up two internal services and both are going > to be tested around November before they go into Prod from Non-Prod. I'm > starting talks with the InfoSec team to see if I can share the findings of > the test. > > On Thursday, October 8, 2015 at 12:13:33 PM UTC-7, Richard wrote: >> >> :) >> >> Nice to heard that! >> >> Richard >> >> On Thu, Oct 8, 2015 at 2:59 PM, Niphlod <[email protected]> wrote: >> >>> not really. >>> I built some apps on web2py that are live and in production, and since >>> EVERY app in my environment NEEDS to pass a Qualys scan to be live and >>> production ready, I know that MY apps survive a Qualys scan with flying >>> colors. >>> Point being "ATM web2py does not expose any obvious/hidden threat that >>> Qualys identifies". >>> I'll reinstate the obvious though: this "just" means that if you code >>> responsibly, your app is safe. It's not too little of a "just". But it's a >>> "just" nonetheless. >>> Noone is saying that EVERY app you code will pass a white-hat attempt if >>> it's hosted on web2py, and I don't think that any framework in any language >>> will ever have the guts to assure it. >>> >>> >>> On Thursday, October 8, 2015 at 8:38:05 PM UTC+2, Richard wrote: >>>> >>>> @Antonio >>>> >>>> I think Simone just point to the tool that can be use for such >>>> purpose... You can use it over your App. From my understanding the App >>>> tested is the Ian App... >>>> >>>> Richard >>>> >>>> On Thu, Oct 8, 2015 at 1:19 PM, António Ramos <[email protected]> >>>> wrote: >>>> >>>>> Niphold, >>>>> i dont see where you are pointing on https://www.qualys.com/ >>>>> where is the web2py app that survived the security scan ? >>>>> >>>>> thank you >>>>> >>>>> 2015-10-05 11:25 GMT+01:00 Niphlod <[email protected]>: >>>>> >>>>>> here in ***undisclosed company**** web2py survives a >>>>>> https://www.qualys.com/ security scan with no reports whatsoever. >>>>>> >>>>>> >>>>>> On Sunday, October 4, 2015 at 2:47:44 PM UTC+2, Ian Ryder wrote: >>>>>>> >>>>>>> Hi, just looking back over anything about penetration testing and >>>>>>> web2py - does anyone know of any recent (or any at all) testing of >>>>>>> web2py? >>>>>>> We're getting close to our first customers on an app we've been >>>>>>> developing >>>>>>> the last year so really need to try and pick it to pieces now while we >>>>>>> have >>>>>>> a few months to work on anything we need to. >>>>>>> >>>>>>> Thanks >>>>>>> Ian >>>>>>> >>>>>>> On Tuesday, 10 July 2012 19:42:46 UTC+2, Massimo Di Pierro wrote: >>>>>>>> >>>>>>>> Thank you Dave for the feedback. It would be nice to have the >>>>>>>> results of those tests (Cenznic, Hailstorm, Quails) published >>>>>>>> somewhere. >>>>>>>> Once in a while people ask about this. >>>>>>>> >>>>>>>> Massimo >>>>>>>> >>>>>>>> On Tuesday, 10 July 2012 11:28:39 UTC-5, Dave wrote: >>>>>>>>> >>>>>>>>> Well.... >>>>>>>>> >>>>>>>>> I can't say that I have tested the current trunk version, but last >>>>>>>>> December I ran a pretty exhaustive penetration test against a site >>>>>>>>> developed web2py. The results were very good. No findings above >>>>>>>>> low. The >>>>>>>>> low findings were insignificant. I ran Cenzic Hailstorm, Qualys and >>>>>>>>> one >>>>>>>>> other automated vulnerability test suite (I cant remember which at >>>>>>>>> the >>>>>>>>> moment) against it without issue. >>>>>>>>> >>>>>>>>> Here are some things that can cause issue though... >>>>>>>>> >>>>>>>>> * anywhere you use the XML() method in a view you should make sure >>>>>>>>> you have validation turned on. Even though the framework is >>>>>>>>> resilient and >>>>>>>>> does a good job of sanitizing data in & out, you can still end up in >>>>>>>>> XSS or >>>>>>>>> XSRF trouble with XML(). >>>>>>>>> >>>>>>>>> * redirects can trip up or slow down a lot of vuln scanners. >>>>>>>>> Watch out if you perform your own testing that you're not getting >>>>>>>>> false >>>>>>>>> negatives. >>>>>>>>> >>>>>>>>> I know some people that would take on a more "formal" assessment >>>>>>>>> if there is consensus.... >>>>>>>>> >>>>>>>>> Dave >>>>>>>>> >>>>>>>>> On Monday, July 9, 2012 11:48:39 AM UTC-4, scausten wrote: >>>>>>>>>> >>>>>>>>>> One of the awesome things about web2py is of course the built-in >>>>>>>>>> and well-documented resilience against a range of attack methods, >>>>>>>>>> but I was >>>>>>>>>> wondering if anyone has attempted a methodical (white-hat) attack to >>>>>>>>>> probe >>>>>>>>>> any potential weaknesses? >>>>>>>>>> >>>>>>>>>> Just out of interest :) >>>>>>>>>> >>>>>>>>> -- >>>>>> Resources: >>>>>> - http://web2py.com >>>>>> - http://web2py.com/book (Documentation) >>>>>> - http://github.com/web2py/web2py (Source code) >>>>>> - https://code.google.com/p/web2py/issues/list (Report Issues) >>>>>> --- >>>>>> You received this message because you are subscribed to the Google >>>>>> Groups "web2py-users" group. >>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>> send an email to [email protected]. >>>>>> For more options, visit https://groups.google.com/d/optout. >>>>>> >>>>> >>>>> -- >>>>> Resources: >>>>> - http://web2py.com >>>>> - http://web2py.com/book (Documentation) >>>>> - http://github.com/web2py/web2py (Source code) >>>>> - https://code.google.com/p/web2py/issues/list (Report Issues) >>>>> --- >>>>> You received this message because you are subscribed to the Google >>>>> Groups "web2py-users" group. >>>>> To unsubscribe from this group and stop receiving emails from it, send >>>>> an email to [email protected]. >>>>> For more options, visit https://groups.google.com/d/optout. >>>>> >>>> >>>> -- >>> Resources: >>> - http://web2py.com >>> - http://web2py.com/book (Documentation) >>> - http://github.com/web2py/web2py (Source code) >>> - https://code.google.com/p/web2py/issues/list (Report Issues) >>> --- >>> You received this message because you are subscribed to the Google >>> Groups "web2py-users" group. >>> To unsubscribe from this group and stop receiving emails from it, send >>> an email to [email protected]. >>> For more options, visit https://groups.google.com/d/optout. >>> >> >> -- Resources: - http://web2py.com - http://web2py.com/book (Documentation) - http://github.com/web2py/web2py (Source code) - https://code.google.com/p/web2py/issues/list (Report Issues) --- You received this message because you are subscribed to the Google Groups "web2py-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.

