Vulnerabilities / Threats
1/31/2011
11:58 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Veracode Launches Free XSS Bug Scanning Service

Offering detects cross-site scripting flaws in Java applications, provides reports, remediation information

Cross-site scripting may typically be one of the easiest vulnerabilities to detect and fix, but it remains one of the most pervasive. Veracode turned up the heat on the bug today with a free service that scans for XSS in Java-based applications.

Veracode's new, cloud-based Free XSS Detection Service offers a free XSS scan for one Java-based application per user, and is available for 30 days to anyone who signs up for it. "We want to eradicate XSS. It sounds like a lofty goal, but we felt it was about time someone took this issue more seriously," says Sam King, vice president of product marketing for Veracode.

XSS long has been at the top of the list of most common flaws found in applications. According to Veracode's recent State of Software Security Report, XSS was the No. 1 flaw in all applications: It accounted for 51 percent of all vulnerabilities found by Veracode.

"It doesn't have to be this way," King says. "Most cross-site scripting issues are relatively easy to find and easy to fix."

And King says the free XSS scan may be only the beginning: Veracode is considering doing the same for the SQL injection, another common bug in apps, and other vulnerabilities. Veracode went with Java apps initially because Java is the most common development platform its customers submit for the company's security scanning service.

The free service includes a detailed report on the XSS flaws, as well as information on how to fix them and free access to Veracode's XSS e-learning courses. "It's a one-time offer; you can upload one application, and we provide the results" of the scan as well as remediation information, says Fergal Glynn, senior product manager for Veracode.

While the free service also offers Veracode potential for new customers, it's also a significant step toward more widespread XSS awareness among developers, especially ones from smaller organizations. "I think the uptick will be good," says Chenxi Wang, vice president and principal analyst with Forrester Research, who first came up with the idea for a free XSS scan.

Wang says she thinks the move by Veracode could encourage other security vendors to also offer free scanning services for XSS. Eliminating the majority of XSS bugs in apps would be a big step in making Web apps more secure. "If you do anything in software security in 2011, [you should] do this," she says.

This isn't the first free scanning offering for finding vulnerabilities in applications: WhiteHat Security has done so in the past. But the offers typically didn't generate many new regular customers for the firm, notes Jeremiah Grossman, founder and CTO at WhiteHat. Grossman says that may be because those who were serious about securing their apps were more likely to sign on as paying customers. "But maybe our [experience] was the exception" and Veracode's standing free service will attract more customers, he says.

WhiteHat would consider offering another free service of its own if the Veracode service takes off, he says. "We give away free assessments all the time. But we've never stood up a long-term service like [Veracode] has," Grossman says.

Whether users of the free service will actually go and fix the XSS bugs Veracode finds for them is unclear. Veracode detects up to tens of thousands of XSS vulnerabilities in a week, according to the company, and while some customers fix them and then upload a new build to Veracode the next day, others don't bother correcting the XSS flaws at all.

Wang says Veracode's free scan is more likely to be used by developers who will follow through with fixing their XSS bugs. "It won't get people who don't want to fix [the vulnerabilities]," she says.

Why has XSS been so hard to kill? It's the volume of XSS bugs an organization harbors, WhiteHat's Grossman says. While it's easy to fix the bugs when they are discovered, it's not so simple to do so when they span a large number of sites companywide, he says.

Veracode's new service is available for sign-up here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4907
Published: 2014-07-11
Cross-site scripting (XSS) vulnerability in share/pnp/application/views/kohana_error_page.php in PNP4Nagios before 0.6.22 allows remote attackers to inject arbitrary web script or HTML via a parameter that is not properly handled in an error message.

CVE-2014-4908
Published: 2014-07-11
Multiple cross-site scripting (XSS) vulnerabilities in PNP4Nagios through 0.6.22 allow remote attackers to inject arbitrary web script or HTML via the URI used for reaching (1) share/pnp/application/views/kohana_error_page.php or (2) share/pnp/application/views/template.php, leading to improper hand...

CVE-2014-2963
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

CVE-2014-3310
Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

CVE-2014-3311
Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.