A new report on Web threats released today by the Web Application Security Consortium says that in-depth manual and automated assessments found nearly 97 percent of sites carry a severe vulnerability.
About 7.72% [of] applications had a high-severity vulnerability detected during automated scanning, according to the WASC report. Detailed manual and automated assessment using white and black box methods shows that probability to detect high-severity vulnerability reaches 96.85 percent."
WASC combined custom Web application vulnerability data from 32,000 Websites that had been searched for vulnerabilities using automated scanning as well as so-called white- and black-box scans, where manual and automated analysis methods are used. Booz Allen Hamilton, BT, Cenzic, dblogic.it, HP, Positive Technologies, Veracode, and WhiteHat Security all provided sanitized data for the report.
The pervasive cross-site request forgery (CSRF) vulnerability didnt get a high ranking in the report (it was found in only 1.43 percent of the apps) however -- even though its the most prevalent vulnerability, according to WASC. Thats because it is difficult to detect automatically and because a lot of experts take its existence for granted.
As usual, the vulnerabilities most found in Web applications were cross-site scripting, information leakage, and SQL injection. XSS accounted for 41 percent of all vulnerabilities; information leakage, 32 percent; SQL injection, 9 percent; and predictable resource location flaws, 8 percent.
Security expert Jeremiah Grossman praised the report, but says to be careful not to read too much into the data. Its best to view reports such as these, where the true number and type of vulnerabilities is an unknown, as the best-case scenario, blogged Grossman, CTO of WhiteHat, and a member of WASC who contributed to the report. There are certainly inaccuracies, such as with CSRF, but at the very least this gives us something to go on.
But that didnt stop experts from trying to decipher what the report reveals about the state of Web security.
Looking at the numbers, I thought SQL injection would have a bigger presence in the number of vulnerabilities and vulnerable sites. Although the statistics seem to show the number is decreasing from previous years, do not stop fighting this class of attack, and all types of injection in general!! From a threat classification perspective, client-based attacks and information disclosure (again) are the most prevalent ones, blogged Raul Siles of the SANS Internet Storm Center.
The report also compared the testing methodologies used to identify Web vulnerabilities. The more detailed black box and white box methods better detect authorization and authentication-type vulnerabilities and logic flaws, according to the report, and these methods also are 12.5 times more likely to detect a high-risk vulnerability than an automated scanner.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.