Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/10/2008
08:30 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Report: In-Depth Analysis Finds More Severe Web Flaws

Web Application Security Consortium (WASC) report suggests automated scanning alone isn't as thorough when it comes to serious bugs

A new report on Web threats released today by the Web Application Security Consortium says that in-depth manual and automated assessments found nearly 97 percent of sites carry a severe vulnerability.

“About 7.72% [of] applications had a high-severity vulnerability detected during automated scanning,” according to the WASC report. “Detailed manual and automated assessment using white and black box methods shows that probability to detect high-severity vulnerability reaches 96.85 percent."

WASC combined custom Web application vulnerability data from 32,000 Websites that had been searched for vulnerabilities using automated scanning as well as so-called white- and black-box scans, where manual and automated analysis methods are used. Booz Allen Hamilton, BT, Cenzic, dblogic.it, HP, Positive Technologies, Veracode, and WhiteHat Security all provided “sanitized” data for the report.

The pervasive cross-site request forgery (CSRF) vulnerability didn’t get a high ranking in the report (it was found in only 1.43 percent of the apps) however -- even though it’s “the most prevalent vulnerability,” according to WASC. That’s because “it is difficult to detect automatically and because a lot of experts take its existence for granted.”

As usual, the vulnerabilities most found in Web applications were cross-site scripting, information leakage, and SQL injection. XSS accounted for 41 percent of all vulnerabilities; information leakage, 32 percent; SQL injection, 9 percent; and predictable resource location flaws, 8 percent.

Security expert Jeremiah Grossman praised the report, but says to be careful not to read too much into the data. “It’s best to view reports such as these, where the true number and type of vulnerabilities is an unknown, as the best-case scenario,” blogged Grossman, CTO of WhiteHat, and a member of WASC who contributed to the report. “There are certainly inaccuracies, such as with CSRF, but at the very least this gives us something to go on.”

But that didn’t stop experts from trying to decipher what the report reveals about the state of Web security.

“Looking at the numbers, I thought SQL injection would have a bigger presence in the number of vulnerabilities and vulnerable sites. Although the statistics seem to show the number is decreasing from previous years, do not stop fighting this class of attack, and all types of injection in general!! From a threat classification perspective, client-based attacks and information disclosure (again) are the most prevalent ones,” blogged Raul Siles of the SANS Internet Storm Center.

The report also compared the testing methodologies used to identify Web vulnerabilities. The more detailed black box and white box methods better detect authorization and authentication-type vulnerabilities and logic flaws, according to the report, and these methods also are 12.5 times more likely to detect a high-risk vulnerability than an automated scanner.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18885
PUBLISHED: 2019-11-14
fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka CID-09ba3bc9dd15.
CVE-2019-18895
PUBLISHED: 2019-11-14
Scanguard through 2019-11-12 on Windows has Insecure Permissions for the installation directory, leading to privilege escalation via a Trojan horse executable file.
CVE-2019-18957
PUBLISHED: 2019-11-14
Microstrategy Library in MicroStrategy before 2019 before 11.1.3 has reflected XSS.
CVE-2019-16863
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
CVE-2019-18949
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.