Risk
2/5/2009
08:15 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

IBM Tool Scans For Malevolent Ajax, Flash Code

Rational AppScan monitors interactive Web applications and SOA services built as Web services to spot potential security holes.

Both Flash and Ajax contain known potential security holes. Nevertheless, developers rely on them for building an interactive Web presence. IBM has added AppScan to its Rational tools line to in a bid to cope with new vulnerabilities.

Rational AppScan can both scan and continuously monitor interactive Web applications and SOA services built as Web services to spot potential exposures.

MySpace hackers have in the past planted Ajax code in fields meant to be links, causing the code to run in an unsuspecting user's browser when the link is clicked, a practice known as cross-site scripting. Likewise, manipulative users can submit SQL commands where a value is sought for a database process, and the database, running the command, produces unanticipated results, a vulnerability known as SQL injection. AppScan can watch for such activity and alert administrators if it's spotted, said Scott Hebner, Rational's VP of marketing.

The vulnerabilities can be avoided through careful, up-front programming as Web applications are developed. So IBM is offering both an AppScan Standard Edition for monitoring running applications and separate Developer, Tester, and Build editions for use in the software development process. The Tester edition plugs into another product, Rational Quality Manager, for use during the testing phase.

Hebner said AppScan not only identifies where a vulnerability occurs and sends alerts, but also produces reports on the nature of a vulnerability and how it might be remedied. The product stems from IBM's July 2007 acquisition of Watchfire, producer of a Web site security and compliance system.

AppScan can be set to run timed checks, such as one every 10 minutes, to provide continuous coverage of running applications.

"When customers think of quality of applications, they used to think 20 years ago in terms of functionality. Today they think security is a big consideration," Hebner said. Concern over reliable, secure Web applications "is cutting through economic worries," in part because breach-of-security incidents themselves pose a considerable expense to the company, he added.

He put a price tag of $16,000 on repairing a software defect after the application has already been placed in production use. Hebner cited Capers Jones' book Applied Software Measurement as the source of the figure. The starting price of AppScan is $17,000, including the first year's support.

The Adobe Flash Player is on most end-user computers, and knowledge of ActionScript, the scripting language that's activated in the Player, is widespread. As a result, the increasing use of Flash tends to open more invasion routes.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3541
Published: 2014-07-29
The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on.

CVE-2014-3542
Published: 2014-07-29
mod/lti/service.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) is...

Best of the Web
Dark Reading Radio