Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

OWASP Top 10 is a list of critical web application security risks. While there is no certificate that could certify the Magnolia platform as secure, OWASP Top 10 is a very reasonable checklist. It's a good idea to validate your project implementation against the Top 10.

RankRisk
A1
Expand
titleInjection

Magnolia is inherently protected against OS and SQL injections by not using a direct access to the OS or database in any way. All access to database and OS data is handled via JCR APIs.

However Magnolia allows the implementor of a solution on top of Magnolia to use custom queries for SQL-like JCR search. The implementor is fully responsible for making sure that such custom queries can't be used by an attacker for injection.

A2
Expand
titleBroken Authentication and Session Management

In order to make security configurable and allow integration with external security systems, Magnolia's security implementation is based on the Java Authentication and Authorization Service (JAAS) standard. The configuration of the JAAS login chain and implementation of JAAS modules provided by Magnolia are secure and handle user security correctly. However, it is the responsibility of the implementor to ensure that their custom configuration also behaves correctly and that by changing configuration they do not allow any insecure access.

A3
Expand
titleCross-Site Scripting (XSS)

All templates provided by Magnolia are continuously checked and improved to prevent any such attacks. In case of discovering any such vulnerability Magnolia is fully committed to providing a fix immediately. The in-place templating functionality in Magnolia allows the client to apply a patch for the issue in a quick and easy manner to help protect their site. By default, Magnolia wraps all content nodes to prevent malicious input entered also by users who have access to the system such as an editor with malicious intent. However, since implementors often introduce custom templates with special functionality, it is the responsibility of the implementor to ensure that all such modifications are still safe from XSS.

A4
Expand
titleInsecure direct object references

Magnolia doesn't expose any database objects, all database access is handled over the JCR API, nor any file object for direct user manipulation.

A5
Expand
titleSecurity misconfiguration

Magnolia delivers secure rather than insecure default configuration. Active action from implementor is required to make configuration insecure. 

A6
Expand
titleSensitive data exposure

The only sensitive data used by Magnolia is user credentials. Those are either not stored in Magnolia at all but rather in LDAP/AD/custom security or when stored, Magnolia stores only a hash of such information. The hash itself is generated with slow hashing functions with additional complexity to prevent brute force, rainbow and other forms of attacks.

When storing sensitive additional data, the implementor has to ensure encryption of such data. Magnolia provides cryptographic libraries out of the box to make such a task as simple as possible.

A7
Expand
titleMissing Function level Access Control

Magnolia security is based on node access, reading the data itself. Permissions are checked on every access to the data. 

A8
Expand
titleCross Site request forgery (CSRF)

Session management is handled by the application server that Magnolia is deployed on, not by Magnolia itself.

A9
Expand
titleUsing components with known vulnerabilities

Magnolia is not aware of any vulnerabilities in the libraries used in the product at the moment. If at any point such a vulnerability is discovered, Magnolia immediately upgrades to a newer version of the library to avoid the issue or provides a workaround to be applied on top of the library to prevent an exploit.

A10
Expand
titleUnvalidated Redirects and Forwards

Out of the box Magnolia doesn't forward any requests to other sites. When configuring such a functionality in Magnolia, the implementor is fully responsible for preventing abuse of such features.

How to report vulnerabilities

...

All currently maintained Magnolia branches get security fixes backported if the branch is vulnerable. For example, if a vulnerability is reported in Magnolia 5.4 6 we backport the fix to Magnolia 5.35.

Maintenance releases for the current major version are available for the Community Edition as well as the Enterprise Edition.

...