Thank you Dave for the feedback. It would be nice to have the results of 
those  tests (Cenznic, Hailstorm, Quails) published somewhere. Once in a 
while people ask about this.

Massimo

On Tuesday, 10 July 2012 11:28:39 UTC-5, Dave wrote:
>
> Well....
>
> I can't say that I have tested the current trunk version, but last 
> December I ran a pretty exhaustive penetration test against a site 
> developed web2py.  The results were very good.  No findings above low.  The 
> low findings were insignificant.  I ran Cenzic Hailstorm, Qualys and one 
> other automated vulnerability test suite (I cant remember which at the 
> moment) against it without issue.  
>
> Here are some things that can cause issue though...
>
> * anywhere you use the XML() method in a view you should make sure you 
> have validation turned on.  Even though the framework is resilient and does 
> a good job of sanitizing data in & out, you can still end up in XSS or XSRF 
> trouble with XML().
>
> * redirects can trip up or slow down a lot of vuln scanners.  Watch out if 
> you perform your own testing that you're not getting false negatives.
>
> I know some people that would take on a more "formal" assessment if there 
> is consensus....
>
> Dave
>
> On Monday, July 9, 2012 11:48:39 AM UTC-4, scausten wrote:
>>
>> One of the awesome things about web2py is of course the built-in and 
>> well-documented resilience against a range of attack methods, but I was 
>> wondering if anyone has attempted a methodical (white-hat) attack to probe 
>> any potential weaknesses?
>>
>> Just out of interest :)
>>
>

Reply via email to