Risk
2/5/2009
08:15 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

IBM Tool Scans For Malevolent Ajax, Flash Code

Rational AppScan monitors interactive Web applications and SOA services built as Web services to spot potential security holes.

Both Flash and Ajax contain known potential security holes. Nevertheless, developers rely on them for building an interactive Web presence. IBM has added AppScan to its Rational tools line to in a bid to cope with new vulnerabilities.

Rational AppScan can both scan and continuously monitor interactive Web applications and SOA services built as Web services to spot potential exposures.

MySpace hackers have in the past planted Ajax code in fields meant to be links, causing the code to run in an unsuspecting user's browser when the link is clicked, a practice known as cross-site scripting. Likewise, manipulative users can submit SQL commands where a value is sought for a database process, and the database, running the command, produces unanticipated results, a vulnerability known as SQL injection. AppScan can watch for such activity and alert administrators if it's spotted, said Scott Hebner, Rational's VP of marketing.

The vulnerabilities can be avoided through careful, up-front programming as Web applications are developed. So IBM is offering both an AppScan Standard Edition for monitoring running applications and separate Developer, Tester, and Build editions for use in the software development process. The Tester edition plugs into another product, Rational Quality Manager, for use during the testing phase.

Hebner said AppScan not only identifies where a vulnerability occurs and sends alerts, but also produces reports on the nature of a vulnerability and how it might be remedied. The product stems from IBM's July 2007 acquisition of Watchfire, producer of a Web site security and compliance system.

AppScan can be set to run timed checks, such as one every 10 minutes, to provide continuous coverage of running applications.

"When customers think of quality of applications, they used to think 20 years ago in terms of functionality. Today they think security is a big consideration," Hebner said. Concern over reliable, secure Web applications "is cutting through economic worries," in part because breach-of-security incidents themselves pose a considerable expense to the company, he added.

He put a price tag of $16,000 on repairing a software defect after the application has already been placed in production use. Hebner cited Capers Jones' book Applied Software Measurement as the source of the figure. The starting price of AppScan is $17,000, including the first year's support.

The Adobe Flash Player is on most end-user computers, and knowledge of ActionScript, the scripting language that's activated in the Player, is widespread. As a result, the increasing use of Flash tends to open more invasion routes.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas and her guest, David Shearer, (ISC)2 Chief Executive Officer, as they discuss issues that keep IT security professionals up at night, including results from the recent 2016 Black Hat Attendee Survey.