Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:30 AM
Connect Directly

Report: In-Depth Analysis Finds More Severe Web Flaws

Web Application Security Consortium (WASC) report suggests automated scanning alone isn't as thorough when it comes to serious bugs

A new report on Web threats released today by the Web Application Security Consortium says that in-depth manual and automated assessments found nearly 97 percent of sites carry a severe vulnerability.

“About 7.72% [of] applications had a high-severity vulnerability detected during automated scanning,” according to the WASC report. “Detailed manual and automated assessment using white and black box methods shows that probability to detect high-severity vulnerability reaches 96.85 percent."

WASC combined custom Web application vulnerability data from 32,000 Websites that had been searched for vulnerabilities using automated scanning as well as so-called white- and black-box scans, where manual and automated analysis methods are used. Booz Allen Hamilton, BT, Cenzic, dblogic.it, HP, Positive Technologies, Veracode, and WhiteHat Security all provided “sanitized” data for the report.

The pervasive cross-site request forgery (CSRF) vulnerability didn’t get a high ranking in the report (it was found in only 1.43 percent of the apps) however -- even though it’s “the most prevalent vulnerability,” according to WASC. That’s because “it is difficult to detect automatically and because a lot of experts take its existence for granted.”

As usual, the vulnerabilities most found in Web applications were cross-site scripting, information leakage, and SQL injection. XSS accounted for 41 percent of all vulnerabilities; information leakage, 32 percent; SQL injection, 9 percent; and predictable resource location flaws, 8 percent.

Security expert Jeremiah Grossman praised the report, but says to be careful not to read too much into the data. “It’s best to view reports such as these, where the true number and type of vulnerabilities is an unknown, as the best-case scenario,” blogged Grossman, CTO of WhiteHat, and a member of WASC who contributed to the report. “There are certainly inaccuracies, such as with CSRF, but at the very least this gives us something to go on.”

But that didn’t stop experts from trying to decipher what the report reveals about the state of Web security.

“Looking at the numbers, I thought SQL injection would have a bigger presence in the number of vulnerabilities and vulnerable sites. Although the statistics seem to show the number is decreasing from previous years, do not stop fighting this class of attack, and all types of injection in general!! From a threat classification perspective, client-based attacks and information disclosure (again) are the most prevalent ones,” blogged Raul Siles of the SANS Internet Storm Center.

The report also compared the testing methodologies used to identify Web vulnerabilities. The more detailed black box and white box methods better detect authorization and authentication-type vulnerabilities and logic flaws, according to the report, and these methods also are 12.5 times more likely to detect a high-risk vulnerability than an automated scanner.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Florida Town Pays $600K to Ransomware Operators
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
Pledges to Not Pay Ransomware Hit Reality
Robert Lemos, Contributing Writer,  6/21/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-06-25
LiveZilla Server before is vulnerable to SQL Injection in functions.internal.build.inc.php via the parameter p_dt_s_d.
PUBLISHED: 2019-06-25
LiveZilla Server before is vulnerable to CSV Injection in the Export Function.
PUBLISHED: 2019-06-25
LiveZilla Server before is vulnerable to XSS in mobile/index.php via the Accept-Language HTTP header.
PUBLISHED: 2019-06-25
LiveZilla Server before is vulnerable to XSS in the chat.php Create Ticket Action.
PUBLISHED: 2019-06-25
LiveZilla Server before is vulnerable to XSS in the ticket.php Subject.