Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/31/2011
11:58 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Veracode Launches Free XSS Bug Scanning Service

Offering detects cross-site scripting flaws in Java applications, provides reports, remediation information

Cross-site scripting may typically be one of the easiest vulnerabilities to detect and fix, but it remains one of the most pervasive. Veracode turned up the heat on the bug today with a free service that scans for XSS in Java-based applications.

Veracode's new, cloud-based Free XSS Detection Service offers a free XSS scan for one Java-based application per user, and is available for 30 days to anyone who signs up for it. "We want to eradicate XSS. It sounds like a lofty goal, but we felt it was about time someone took this issue more seriously," says Sam King, vice president of product marketing for Veracode.

XSS long has been at the top of the list of most common flaws found in applications. According to Veracode's recent State of Software Security Report, XSS was the No. 1 flaw in all applications: It accounted for 51 percent of all vulnerabilities found by Veracode.

"It doesn't have to be this way," King says. "Most cross-site scripting issues are relatively easy to find and easy to fix."

And King says the free XSS scan may be only the beginning: Veracode is considering doing the same for the SQL injection, another common bug in apps, and other vulnerabilities. Veracode went with Java apps initially because Java is the most common development platform its customers submit for the company's security scanning service.

The free service includes a detailed report on the XSS flaws, as well as information on how to fix them and free access to Veracode's XSS e-learning courses. "It's a one-time offer; you can upload one application, and we provide the results" of the scan as well as remediation information, says Fergal Glynn, senior product manager for Veracode.

While the free service also offers Veracode potential for new customers, it's also a significant step toward more widespread XSS awareness among developers, especially ones from smaller organizations. "I think the uptick will be good," says Chenxi Wang, vice president and principal analyst with Forrester Research, who first came up with the idea for a free XSS scan.

Wang says she thinks the move by Veracode could encourage other security vendors to also offer free scanning services for XSS. Eliminating the majority of XSS bugs in apps would be a big step in making Web apps more secure. "If you do anything in software security in 2011, [you should] do this," she says.

This isn't the first free scanning offering for finding vulnerabilities in applications: WhiteHat Security has done so in the past. But the offers typically didn't generate many new regular customers for the firm, notes Jeremiah Grossman, founder and CTO at WhiteHat. Grossman says that may be because those who were serious about securing their apps were more likely to sign on as paying customers. "But maybe our [experience] was the exception" and Veracode's standing free service will attract more customers, he says.

WhiteHat would consider offering another free service of its own if the Veracode service takes off, he says. "We give away free assessments all the time. But we've never stood up a long-term service like [Veracode] has," Grossman says.

Whether users of the free service will actually go and fix the XSS bugs Veracode finds for them is unclear. Veracode detects up to tens of thousands of XSS vulnerabilities in a week, according to the company, and while some customers fix them and then upload a new build to Veracode the next day, others don't bother correcting the XSS flaws at all.

Wang says Veracode's free scan is more likely to be used by developers who will follow through with fixing their XSS bugs. "It won't get people who don't want to fix [the vulnerabilities]," she says.

Why has XSS been so hard to kill? It's the volume of XSS bugs an organization harbors, WhiteHat's Grossman says. While it's easy to fix the bugs when they are discovered, it's not so simple to do so when they span a large number of sites companywide, he says.

Veracode's new service is available for sign-up here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Can you smell me now?
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11844
PUBLISHED: 2020-05-29
There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.
CVE-2020-6937
PUBLISHED: 2020-05-29
A Denial of Service vulnerability in MuleSoft Mule CE/EE 3.8.x, 3.9.x, and 4.x released before April 7, 2020, could allow remote attackers to submit data which can lead to resource exhaustion.
CVE-2020-7648
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
CVE-2020-7650
PUBLISHED: 2020-05-29
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
CVE-2020-7654
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.