Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

2/14/2017
09:25 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

25 Percent of Web Apps Still Vulnerable to Eight of the OWASP Top Ten

Research from Contrast Security also finds that 80 Percent of software applications aad at least one vulnerability

Los Altos, Calif. – Feb. 13, 2017Contrast Security, the first company to enable self-protecting software, today announced the findings from a security research project on web application vulnerabilities. The data, collected by Contrast Labs from the Contrast Security platform across several popular development languages, revealed sensitive data exposure, which includes missing and weak encryption, as the top vulnerability, plaguing 69 percent of web applications and accounting for 26 percent of all vulnerabilities. The research also found that 80 percent of tested software applications had at least one vulnerability, with an average of 45 vulnerabilities per application.

The top 5 web application vulnerabilities according to the Contrast Labs research are as follows:

  • Sensitive data exposure – affects 69 percent of applications
  • Cross-site request forgery – affects 55 percent of applications
  • Broken authentication and session management – affects 41 percent of applications
  • Security misconfiguration – affects 37 percent of applications
  • Missing function level access control – affects 33 percent of applications

“The level of application vulnerability revealed by this analysis is deeply concerning,” said Jeff Williams, CTO and co-founder of Contrast Security. “All of these vulnerabilities have been documented in the OWASP Top Ten for over a decade, yet they’re obviously still a major problem. Given the level of vulnerability and increasing threat, organizations should adopt a continuous application security strategy and make sure the development and security teams are bought in.

Top Vulnerabilities by Language: Java and .NET

Contrast Labs compared the top web application vulnerabilities across two of the most popular web application development languages: Java and .NET. In so doing, Contrast Labs revealed that Java suffers from higher prevalence of cross-site request forgery (impacting 69 percent of Java applications, as compared to 31 percent in .NET) and less security misconfiguration problems than .NET (14 percent in Java versus 73 percent in .NET). This is almost certainly because .NET relies far more on configuration than Java applications do; however, the high numbers of security misconfiguration in .NET indicate that this approach is not without its own set of problems.

Contrast Labs also found a lower number of injection flaws in .NET applications (affecting 17 percent of applications), where the use of persistence layers has helped to stamp out these flaws. However, injection flaws are still quite prevalent in Java applications at 38 percent, where there are many more database options. Injection, a common vulnerability often missed by traditional application security tools, can sometimes lead to a much more serious compromise. If attackers are able to pivot from injection to a complete host takeover, there’s no limit to the access that attackers would have to a software application’s data and capabilities.

“In today’s world, every organization has become a software company,” said Williams. “Insecure code has become the leading security risk and, increasingly, the leading business risk as well. Unfortunately, when it comes to addressing web application vulnerabilities, many businesses are relying on legacy scanners that are difficult to manage, inaccurate and do not fit in with modern software environments. To protect software applications effectively, continuous security must go along with continuous integration, delivery and deployment to provide up-to-the-minute analysis of web application vulnerabilities.”

Contrast Labs is a team of accomplished cybersecurity researchers and industry experts that perform application security threat analysis, security analytics and other security research at Contrast Security. The work performed by Contrast Labs continuously improves the Contrast Security platform with support for new threats, attacks, vulnerabilities, and defenses.

About Contrast Security

Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production. More information can be found at www.contrastsecurity.com or by following Contrast on Twitter at @ContrastSec.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16168
PUBLISHED: 2020-08-07
Temi firmware 20190419.165201 does not properly verify that the source of data or communication is valid, aka an Origin Validation Error.
CVE-2020-8025
PUBLISHED: 2020-08-07
A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the p...
CVE-2020-8026
PUBLISHED: 2020-08-07
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior...
CVE-2020-16219
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16221
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.