[Infowarrior] - 60 Percent Of Apps Fail First Security Test
Richard Forno
rforno at infowarrior.org
Tue Mar 2 17:41:08 UTC 2010
State Of Application Security: Nearly 60 Percent Of Apps Fail First
Security Test
Veracode app-testing data demonstrates that application security still
has a ways to go
Mar 01, 2010 | 09:00 AM
By Kelly Jackson Higgins
DarkReading
http://www.darkreading.com/vulnerability_management/security/app-security/showArticle.jhtml
SAN FRANCISCO -- RSA Conference 2010 -- Even with all of the emphasis
on writing software with security in mind, most software applications
remain riddled with security holes, according to a new report released
today about the actual security quality of all types of software.
Around 58 percent of the applications tested by application security
testing service provider Veracode in the past year-and-a-half failed
to achieve a successful rating in their first round of testing. "The
degree of failure to meet acceptable standards on first submission is
astounding -- and this is coming from folks who care enough to submit
their software to our [application security testing] services," says
Roger Oberg, senior vice president of marketing for Veracode. "The
implication here is that more than half of all applications are
susceptible to the kinds of vulnerabilities we saw at Heartland,
Google, DoD, and others -- these were all application-layer attacks."
The data for Veracode's State of Software Security Report comes from a
combination of static, dynamic, and manual testing of all types of
software across multiple programming languages -- everything from non-
Web and Web applications to components and shared libraries. Veracode
tests commercial, internally developed, open-source, and outsourced
applications, all of which were represented in its findings.
And nearly 90 percent of internally developed applications contained
vulnerabilities in the SANS Top 25 and OWASP Top 10 lists of most
common programming errors and flaws in the first round of tests, Oberg
says.
So is software getting more or less secure? Hard to say, Veracode
says, since this is the first such report, and there's nothing to
compare it to. "We don't know if it's getting better or worse, but
it's pretty bad," Oberg says. "Despite all of the awareness about
breaches ... this awareness doesn't translate into sufficient action.
We hope this report is a call to action."
Around 60 percent of the software tested by Veracode was internally
developed applications; 30 percent, commercial applications; 8
percent, open source; and 2 percent, outsourced. The software was 60
percent Web applications, and 40 percent non-Web, according to
Veracode, and came from companies across 15 different industries.
Despite the relatively gloomy picture of developers still missing the
mark initially on security, there were some bright spots in the
report: Open-source software isn't as risky as you'd think, and
financial services organizations and government agencies tend to have
more secure applications from the get-go; more than half of their apps
passed as acceptable in the first submission to testing, according to
Veracode's report.
"The conventional wisdom is that open source is risky. But open source
was no worse than commercial software upon first submission. That's
encouraging," Oberg says. And it was the quickest to remediate any
flaws: "It took about 30 days to remediate open-source software, and
much longer for commercial and internal projects," he says.
Meanwhile, financial services firms and government agencies were
second-best in terms of remediation: They took anywhere from one to
two tries to fix their vulnerabilities. "This is good news. But
there's a lot of room for improvement," Oberg says.
The data showed that third-party software is often a part of
internally developed apps -- 30 percent of them were based on third-
party apps.
The vulnerability with the highest total count was cross-site
scripting (XSS), and was the third most prevalent flaw. "There's been
intense focus on cross-site scripting, and there are lots of different
libraries and utilities available to eliminate it, but it's still
extremely prevalent," says Chris Eng, director of security research
for Veracode. Eng says it's likely due to a lack of education on how
to quell XSS, plus it's not uncommon to find 100 XSS bugs in one
application. "Cross-site scripting adds up real quickly," he says.
Around 20 percent of the applications carried a SQL injection flaw,
and most of those were Web applications. And 44 percent of the apps
had one or more cryptographic flaw issue, Eng says. "Crypto issues are
not generally well-understood by developers," he says.
More information about the Infowarrior
mailing list