Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Study Suggests Website Vulnerabilities Commonplace

Cross-site request forgery (CSRF) and cross-site scripting vulnerabilities are not going away.

Cross-site request forgery (CSRF) and cross-site scripting vulnerabilities are not going away.

According to a report by DOSarrest Internet Security, its Vulnerability Testing and Optimization (VTO) service found that 90 percent of the 50 websites it scanned had one or more vulnerabilities. Of the websites found to have vulnerabilities, 95 percent were susceptible to information leakage due to out-dated software versions and installed modules.

CSRF is a category of attack that forces a victim to execute unwanted actions on a website with the attacker gaining the identity and privileges of the victim to perform an undesired function on the victim’s behalf. Cross-site scripting meanwhile occurs when an attacker injects malicious scripts into legitimate websites.

“It is not the case that 90 per cent of the websites are vulnerable to a severe flaw, but it is more likely to be an information protection or session management flaw,” said Sean Power, security operation manager at DOSarrest, in a statement. “We put the mark at quite a high standard and there were only one or two instances where we couldn’t make any recommendations to the website. However, findings did show that 95 percent of the sites scanned found flaws that could cause sensitive information to be leaked, so they are not to be taken lightly.”

Advertisement. Scroll to continue reading.

SQL Injection – which involves the insertion of a SQL query to allow database access and privileges – was also a common occurrence. According to the company, 22 percent of the sites had SQL injection vulnerabilities, and some sites had vulnerabilities in more than one category.

In May, WhiteHat Security reported that in 2012, the average number of serious vulnerabilities per website was actually in decline, going from 79 in 2011 to 56 in 2012. Despite this, the firm found that 86 percent of the sites tested had at least one vulnerability susceptible to attack every single day in 2012.

“Website security is an ever-moving target, and organizations need to better understand how various parts of the SDLC affect the introduction of vulnerabilities, which leave the door open to breaches,” Jeremiah Grossman, co-founder and CTO of WhiteHat Security, said in a statement at the time.

“It is apparent that these organizations take the approach of ‘wait-until-something-goes-wrong’ before kicking into gear unless there is some sense of accountability,” Grossman said.


Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.

Register

Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.

Register

People on the Move

Mike Byron has been named Chief Financial Officer (CFO) at Exabeam.

Ex-GitHub chief technology officer Mike Hanley has joined GM as CISO.

Network security and compliance assurance firm Titania has appointed Victoria Dimmick as CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.