SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
2014 Website Security Statistics Report
2014 Website Security Statistics Report2
An end to the war of languages… maybe.
Whenever beginning a new software project, you have to make a choice: what programming
languages or development frameworks to use? While it would be nice to select the most
secure software stack at the start of a project, more often this decision is made for different
reasons and security is commonly an afterthought.
The software stack decision is commonly based upon parameters such as:
§§ What the development teams are most familiar with.
§§ The current market momentum around the latest and greatest technology.
§§ What will generate code the fastest and can be maintained at a low cost.
§§ The available talent pool as the project grows.
§§ And of course, whatever gets the job done.
Familiarity with a programming language or development framework can drastically
impact the ‘security’ outcome – whether it is designed to be secure by default or must be
configured properly, and whether various libraries are available. Still, conventional wisdom
suggests that most popular modern languages and frameworks (commercial and open
source) perform similarly when it comes to an overall security posture. At least in theory,
none is noticeably more secure than another. That being said, suggesting that PHP, Java,
C# and others are any more secure than other languages is sure to spark heated debate.
This is curious since the security of various programming languages rarely comes up when
choosing what to use for a project.
In the security industry, you often hear that any programming language can be coded
securely – or conversely, insecurely – therefore, it really comes down to the development
process. We know information security, and in particular application security, is littered
with conventional wisdom and lacks foundational data. So we must ask, is this really true?
Do programming languages perform relatively the same security-wise in the real-world,
the only place where it matters? Or is their thought-to-be-similar-performance only true
when restricted to technical documentation and anecdotes of their advocates? This area
warrants deeper investigation.
In this report, we put this area of application security understanding to the test by measuring
how various web programming languages and development frameworks actually perform
in the field. To which classes of attack are they most prone, how often and for how long;
and, how do they fare against popular alternatives? Is it really true that the most popular
modern languages and frameworks yield similar results in production websites?
By analyzing the vulnerability assessment results of more than 30,000 websites under
management with WhiteHat Sentinel, we begin to answer these questions. These answers
may enable the application security community to ask better and deeper questions, which
will eventually lead to more secure websites. Organizations deploying these technologies
can have a closer look at particularly risk-prone areas. Software vendors may focus on
areas that are found to be lacking. Developers can increase their familiarity with the
strengths and weaknesses of their technology stack. All of this is vitally important because
security must be baked into development frameworks and must be virtually transparent.
Only then will application security progress be made.
Introduction
2014 Website Security Statistics Report3
Déjà vu
Literally translated in English as “already seen,” déjà vu would best describe the current state
of website security. The Verizon Data Breach Incidents Report, the FireHost “Superfecta”
Attack Report, and many other industry reports are in firm alignment that websites and web
applications remain one of the leading targets of cyber-attacks. Further, the conclusions
drawn from these varying industry reports all point to the need for more secure software.
As a society, our reliance on the web continues to grow and the financial implications of
these attacks are multiplying. Those who have sought to transfer some of these risks to
more traditional instruments such as the burgeoning cyber insurance market have filed
claims reaching as high as $20 million, with an average payout of just above $900,000*.
Unfortunately, these policies are expensive and complicated, and do not always cover
damages incurred from attacks.
Tide goes in, tide goes out…
The Software Development Lifecycle (SDLC) is well-defined and can be readily explained.
If asked, IT teams are likely to point to a number of reasons for their choice of software
stack which was likely made during the requirements or planning phase of development.
The missing piece to achieving more secure software is the absence of relevant security
data assisting in the technology selection process.
The requirements phase revisited
Application security professionals understand that websites with multiple users must have
a way to securely handle each user, to ensure their sessions are initiated, managed, and
terminated in a secure manner, and also to determine that if these sessions are authenticated,
they must begin as an encrypted authentication event to avoid session fixation. What
application security professionals are not currently able to add to the decision-making
process is the determination, for example, of which programming language most securely
handles sessions. If the choice of language is not one that handles sessions as securely
as others, other determinations of how the chosen language is affected by the ability to
correct session fixation issues, comes into play. Is it difficult to address? How long is the
average time to fix those issues?
The above is just one example of how our choices could be positively affected by
understanding the security of the software stacks we choose. The same is reflected across
the many security-focused scenarios that should be made at the requirements gathering
and design phases. Another example of such a scenario:
What happens if user X posts a question on the system? What happens if user Y then
reads this question? We know there is a risk of Cross Site Scripting (XSS) but what we
do not know is how well-equipped the chosen technology will be to protect against XSS.
Is it difficult to address XSS?
As security professionals, we need to meet the business requirements while controlling
cost, and ensuring the security and integrity of our systems and data. It would be nice to
get to a place where application security professionals can say “we can keep development
costs down and be secure by choosing language X, given our requirements and the relative
ease-to-fix issues that are known to affect our design.” This report aims to examine the
prevalence of threats per programming language and the ensuing analysis reveals the
relative security of those languages.
Executive summary
*Source: http://www.netdiligence.com/files/CyberClaimsStudy-2013.pdf
2014 Website Security Statistics Report4
Data Set
The data
All URLs for active slots with a PE* service level were selected. Clients that are used in
QA/Demo and other “non-real” clients were removed from the sample.
An unknown number of scan responses were missing and therefore, no language data
was collected on these URLs. These only affected URLs that did not have a vulnerability
detected.
Problems with the data
Scan responses that are more than 90-days old and not associated with a vulnerability
are deleted from the server. This policy resulted in an unknown number of slots missing
scan responses. While there is a lack of empirical evidence, it was determined that this
was occurring on large slots and we probably had a sufficient number of URLs with
vulnerabilities to accurately determine the language profile on the slot.
Slots were partially validated by comparing the slot information from the Salesforce
database as it is the canonical authority on the client list. However, this data is dirty in that
it is missing about 118 slot IDs that were used in the analysis.
We were using the most recent completed instance or, the most recent failed instance
or, the active instance. There is a notable number of instances that have missing scan
responses.
It is worth noting that we were able to detect SSI, Ruby, HTC, and GO, however, the
sampling of these languages were statistically to small to include. We also detected Flash
applications, but as Flash is not a server-side language it was generally excluded unless
specifically stated.
The distribution of URLs per slot has a strong positive skew (8.1371). That is, the majority
of slots had a small number of URLs and a few had a large number. This may be the result
of differences in the size of the sites, the number of interactive elements and the language
that was used. Therefore the average values reported will be based on the median and
not the mean.
There were a large number of slots (811) that had fewer than 10 URLs. Of the 122,800
URLs used, there were 2,652 URLs associated with those slots that had fewer than
10 URLs.
The language classification system was able to find 179,146 markers for language.
*WhiteHat Security’s PE level service combines automated scanning by the Sentinel platform and combines
manual custom testing to identity business logic flaws by the WhiteHat Threat Research Center.
2014 Website Security Statistics Report5
Methodology
Terminology
Modern websites are composed of multiple technologies. WhiteHat Security defines the
boundaries of a web application as a “slot.” The research data was derived from slots that
had at least three completed assessments.
Language classification
Language classification was based on file extensions and HTTP header information.
The URL file extension and the HTTP response body headers were used for language
classification. A list of file extensions was mapped to selected languages. Many languages
had several file extensions associated with them. The headers were examined and
classification criteria were used to determine which language was used. Some languages
and frameworks emit characteristic headers that were mapped to a given language. The
same is true for cookies. Headers such as “content-disposition” had the filename section
parsed and the file extension was used for classification. The “x-powered-by” header often
listed the language used. The “content-type” header often listed the type of data, such
as json or flash. In addition, there were many header names, such as “x-aspnet-version”
that were used to indicate which language was used. The headers were collected and
classified. Any unclassified headers went into a pool to be reexamined when sufficient
numbers of the headers could be classified. 56.3% of URLs were able to be classified.
We were able to determine at least one language on every slot. 31.7% of the slots had
multiple languages.
Methodology
Scripts were written to extract supplemental data about the slots, such as industry, class,
vulnerability status (open or closed), and timestamps. These data points are stored in our
database and were extracted into a form that was imported into our statistical software.
This extraction was done using SQL commands or Perl calls to our custom data framework.
No cleaning of the data occurred at this phase, simply extraction.
We used the R programming language to validate, clean, and link data. This is well-
documented and results are reproducible. Raw data from the extraction, transformation,
and loading phases were loaded into R. All cleaning and validation was done in R so that
the results could be reproduced. This used a series of custom written routines on top of
the R libraries. The statistical analysis was also scripted so that it could be repeated. A
markdown language was used to generate a report with the results from the analysis and
comments about their meaning.
2014 Website Security Statistics Report6
The most widely
used languages are
.NET and Java. Many
organizations use ASP,
a legacy language.
0
10
20
30
40
50
PerlColdFusionPHPASPJAVA.NET
28%
25%
16%
11%
6%
3%
Percent of URLs by language
Key findings
In analyzing the data, our goal was to learn about the consequences of different technology
decisions and to empower security decision makers that aim for a modern approach to
addressing the real business challenges they face.
Fundamental data points
§§ We observed .Net to be the most widely represented language choice with 28.1% of
web applications using the framework, followed by Java at 24.9% and ASP at 15.9%.
§§ There was no significant difference between languages in examining the highest
averages of vulnerabilities per slot. .Net had an average of 11.36 vulnerabilities per
slot. Java was found to have an average of 11.32 and ASP came in at 10.98.
§§ The bottom of the spectrum, or the most “secure”, also showed no significant
difference between languages with the lowest averages of vulnerabilities per slot. Perl
was observed as having 7 vulnerabilities per slot. ColdFusion was found to have the
fewest with an average of 6.
Risk exposure does not vary widely between languages, as language choice does not
affect the number of vulnerabilities. A one-way analysis of the variance showed that there
was no statistically significant difference between these languages. In fact, there was no
statistical difference, in terms of the average number of vulnerabilities per slot, between
any of the languages in this study.
2014 Website Security Statistics Report7
Vulnerability classes
§§ 10.59% of ColdFuision sites had at least one SQL Injection vulnerability, the highest
observed, followed by ASP with 7.67% and .NET 5.78%.
§§ Perl sites had a 67% chance of having at least one Cross Site Scripting (XSS)
vulnerability, over 11% more than any other language.
§§ There was less than a 2% difference among the languages with Cross Site Request
Forgery (CSRF).
§§ Many vulnerability classes were not affected by language choice.
Language observations
§§ ColdFusion has the best overall remediation rates at 74.3%.
§§ ColdFusion is significantly affected by Abuse of Functionality vulnerabilities with 5.93%
of all sites having at least one occurrence, five times that of other languages.
§§ PHP had the lowest observed remediation rates.
§§ PHP is significantly affected by Insufficient Transport Layer Protection vulnerabilities, at
4.13% versus an average of 1% of all the combined major languages (Perl, Java, ASP,
.Net  ColdFusion).
§§ Perl has the greatest remediation time of XSS, at 265 days to resolve.
§§ Perl’s median remediation rate of CSRF is 23.8 days, three times faster than the next
closest langague, PHP at 68.97 days. All other languages were over 100 days.
§§ ColdFusion and PHP have fast remediation times when vulnerabilities are addressed:
50.5 and 47.5 days respectively.
§§ ASP takes the longest to fix all vulnerabilities averaging 139.97 days. .Net averages
111.86 days and PHP rounded out the bottom with an average of 47.49 days.
§§ ASP is remediating vulnerabilities at the same rate as other languages, but efforts are
focused on critical issues.*
Industry observations
§§ Financial Services, HealthCare and Insurance organizations had the highest number
of ASP sites by a 3:1 ratio.
§§ 86% of Gaming industry sites are written in PHP.
§§ 36% of Banking industry sites were written in Java and 55% in .Net.
§§ 43% of Manufacturing sites leveraged Perl as their language of choice.
§§ 35% of the Technology sector wrote their sites in PHP.
Risk exposure does
not vary widely
between languages, as
language choice does
not affect number of
vulnerabilities.
PerlColdfusionPHPASPJava.NET
11 11 11 10 7 6
Mean number of vulnerabilities in each language
*Observation based on the types of vulnerability classes being remediated.
2014 Website Security Statistics Report8
The big picture
In a moment, we will return to exploring the security of software stacks. But first, knowing
that there was no significant difference between languages with the highest averages of
vulnerabilities per slot we took a step back to look at how each website performed as
they are most often comprised of multiple technologies. The importance of knowing the
security posture of your websites is, from a security perspective, more important than
language choice.
Vulnerabilities per language
Now that we have examined the average number of vulnerabilities observed in websites
we will drill down and explore the vulnerabilities found in each language and the possible
significance of these findings.
We found that 31% of all vulnerabilities found were in .Net applications. It must be noted
that there are more websites written in .Net than all of the other languages in the study and
that there was no evidence to suggest that .Net is any less secure based on this data point.
In fact, .Net sites have a tendency to be larger and more complicated, which is directly
correlated with having a larger attack surface and consequently more vulnerabilities.
Java – by virtue of its popularity with its extensive standard library class and its familiarity
among programmers – accounted for 28% of all the vulnerabilities found. Again, the
number of applications written in the language along with the complexities of the websites
has to be considered as a contributing factor.
Originally released almost two decades ago ASP totaled 15% of all the discovered
vulnerabilities. Although lacking the complexities of modern frameworks, many of the same
critical vulnerability classifications were found to be present, as we will explore.
Another popular server-side scripting language, PHP also accounted for 15% of
vulnerabilities discovered. A language still popular with Retail, Technology, and Financial
Services organizations, PHP sites do not have a tendency to be as large or complex as
.NET or Java sites but still suffer from many of the same issues.
The percentage of vulnerabilities found among the remaining languages experiences a
sharp drop off from this point. ColdFusion, another platform almost 20 years in existence,
only accounted for 4% of the vulnerabilities, while Perl registered at 2%.
Average vulnerabilities
2014 Website Security Statistics Report9
Median days open
By language
The next data set we examined was the average number of days vulnerabilities remained
open. Vulnerabilities go unfixed for many reasons and it begged the question as to whether
there was anything to be learned from studying the length of time vulnerabilities were open
in each of the languages.
ASP vulnerabilities were open for an median of 139 days, more so than any of the other
languages.
PHP rounds out the top of the list with an average days open of 129.5 days. The numbers
begin to significantly decline beyond Java, which had an average of 90.9 days open. The
other languages were all under 45 days once we hit this drop off.
By class
Cross-Site Scripting in the PHP environment was open the least median number of days
at 49. Perl and ASP respectively had XSS issues open an average of 184 and 135 days.
.Net did not fare much better with XSS having an average number of days open of 126.
Overall XSS appears to take a relative amount of effort regardless of the language class.
PHP stood out from the pack when looking at SQL Injection, with the languages instances
of the vulnerability exhibiting the lowest average number of days at 6.8, closely followed
by Perl, which had the issue open an average of 19.4 days. ColdFusion topped the list
averaging 107.4 days of exposed SQL Injection vulnerabilities. ASP’s average number of
days open for SQL Injection was not far off of the ColdFusion average at 97.5 days. .Net
and Java fell roughly in the middle at 51.4 and 64.8 days respectively.
The vulnerability with the highest average number of days open was Weak Password
Recovery Validation in ASP websites, while not the most damaging vulnerability by itself,
this could speak to a number of things such as, complexities of the language itself,
programming experience necessary, or simply that this vulnerability class is not a priority
in that environment.
2014 Website Security Statistics Report10
Days open of top 5 vulnerability classes
200
400
600
800
PHP
Perl
Java
.NET
ColdFusion
ASP
Top five vulnerabilities:
Cross Site Scripting
Information Leakage
Content Spoofing
HTTP Response Splitting
Predictable Resource
Location
The following vulnerabilities
are unremarkable on graph:
 Predictable Resource Location
 SQL Injection
 Cross Site Request Forgery
 Insufficient Transport Layer
Protection
 Abuse of Functionality
 Brute Force
 URL Redirector Abuse
 Insufficient Authorization
 Fingerprinting
 Session Fixation
 Directory Indexing
Key findings:
§§ ASP vulnerabilities remain open the longest at 139 days.
§§ Cross-Site Scripting takes the longest to close in Perl
taking 184 median days.
§§ ColdFusion has the largest average days open for SQL
Injection vulnerabilities at 107 median days.
§§ Languages with the most security controls are taking the
longest to remediate.
2014 Website Security Statistics Report11
Cross-Site Scripting (XSS)
XSS regained the number one spot for being the most common vulnerability, after being
overtaken by Information Leakage last year in all but one language: .Net, which still has
Information Leakage as the number one vulnerability, followed by XSS.
Stand-outs
ColdFusion has a significantly higher percentage of abuse of functionality vulnerabilities
at 6% compared to Java, the language with the second highest percentage at 1%.
ColdFusion does, however, boast a 100% remediation rate versus Java’s 78% remediation
rate or abuse of functionality vulnerabilities.
ColdFusion also suffers from the greatest percentage of SQL Injection at 11%. ASP takes
second place with 8%. Java had the lowest percentage of SQL Injection at 1%. Again we
see ColdFusion with a higher remediation rate of 96% versus Java’s 89%.
PHP’s rate of Insufficient Transport Layer at 4.13% is the highest, exceeding Java by
almost 4-times which came in second at 1.34%. Coupled with a low remediation rate of
52%, PHP applications are at a much higher risk of exposing sensitive information.
Vulnerability classes
2014 Website Security Statistics Report12
Key findings:
§§ Cross-Site Scripting regains the number one spot after being overtaken by Information
Leakage last year in all but one language. .Net has Information Leakage as the number
one vulnerability, followed by Cross-Site Scripting.
§§ ColdFusion has a rate of 11% SQL Injection vulnerabilities, the highest observed,
followed by ASP with 8% and .NET 6%.
§§ Perl has an observed rate of 67% Cross-Site Scripting vulnerabilities, over 17% more
than any other language.
§§ There was less than a 2% difference among the languages with Cross-Site Request
Forgery.
§§ Many vulnerabilities classes were not affected by language choice.
Cross-Site Scripting
is a significant issue
across all languages.
Vulnerability class by language (percentage)
ASP ColdFusion .NET Java Perl PHP
Cross-Site Scripting 49 46 35 57 67 56
Information Leakage 29 24 44 15 11 17
Content Spoofing 5 4 5 8 6 7
SQL Injection 8 11 6 1 3 6
Cross-Site Request Forgery 2 2 2 4 4 2
Insufficient Transport Layer Protection 0.8 1 0.9 1 0.3 4
Abuse of Functionality 0.3 6 0.3 0.9 0.5 0.2
HTTP Response Splitting 0.9 3 0.8 2 0.8 0.3
Predictable Resource Location 0.1 0.1 0.0 0.2 0.1 1
Brute Force 0.7 0.3 1 2 0.8 1
URL Redirector Abuse 0.7 0.4 0.5 1 1 0.9
Insufficient Authorization 0.2 0.3 0.5 0.9 1 0.2
Fingerprinting 0.3 0.1 0.5 0.6 0.3 0.1
Session Fixation 0.2 0.3 0.2 0.6 0.1 0.3
Directory Indexing - - 0.0 0.0 - 0.3
2014 Website Security Statistics Report13
Remediation rates
Progress measured
Remediation rate is the key accountability metric in any web application security program.
Affected by many factors – including business functionality, complexity, and priority – the
rate at which vulnerabilities are addressed is a key indicator of application security maturity.
Likewise, languages are affected by unique factors as they pertain to remediation rates.
Some languages have frameworks that make addressing different vulnerability classes
less complex than others. The skill levels of the available programmer resources and the
libraries used directly affect the security of individual languages.
Perl’s remediation rate of XSS vulnerabilities bested the pack boasting an 85% rate. When
it came to addressing SQL Injection vulnerabilities on the other hand, Perl had the lowest
remediation rate of 18%. Perl did have the lowest number of days open for SQL Injection,
so it is apparent that when these vulnerabilities were addressed, they closed faster than
any other language.
SQL Injection had a 96% remediation rate in ColdFusion applications and every single
abuse of functionality vulnerability found in ColdFusion sites was remediated.
Legacy ASP sites exhibited remediation rates on par with other languages while suffering
from large windows of exposure suggesting that there were strategic decisions being
made regarding the maintenance and security of these sites. Classic ASP struggles from
being developed at a time in the history of the web when the breadth of attacks were not
what they are today, yet what we see here is a great amount of effort to keep pace with the
remediation rates of modern frameworks.
There was no immediate data to suggest that language choice greatly affected remediation
rates given that a language such as ASP is able to keep track while PHP lagged much
further behind. The efforts to keep pace may be enough reason to retire these legacy sites,
however more often this choice is based on the need for update functionality.
2014 Website Security Statistics Report14
0 20 40 60 80 100%
Directory Indexing
Session Fixation
Fingerprinting
Insufficient Authorization
URL Redirector Abuse
Brute Force
Predictable Resource
Location
HTTP Response Splitting
Abuse of Functionality
Insufficient Transport
Layer Protection
Cross-Site Request Forgery
SQL Injection
Content Spoofing
Information Leakage
Cross-Site Scripting
Remediation rates by vulnerability class
■ ASP
■ ColdFusion
■ .NET
■ Java
■ Perl
■ PHP
—
—
—
—
Key findings
§§ Perl remediates 85% of
all Cross-Site Scripting
vulnerabilities, the highest
rate among all languages but
only 18% of SQL Injection.
§§ Net and Java have the same
remediation rate of SQL
Injection at 89%.
§§ ColdFusion remediates 100%
of its Abuse of Functionality
vulnerabilities, 96% of its
SQL Injection, and 87% of
Insufficient Transport Layer
Protection vulnerabilities.
ASP is remediating
at the same rate as
the other languages,
focusing on mission
critical vulnerabilities.
2014 Website Security Statistics Report15
Industry analysis
Across the board
An oft-repeated response to inquires about the languages their websites use is “a little of
everything,” however, the data showed that organizations tend to have a significant amount
of one or two languages with a very minimal investment in the others. The breakdown is
by far not equally spread, yet what we see is an attempt to approach the security of their
websites as though there were truly a distribution that favored no particular language. This
tends to lead to choices in tools, services and skill sets that may not have enough focus or
expertise on the areas with the greatest financial investment or impact.
There were some definite “favorites” among the industries. No doubt that there exists
correlations between financial drivers and functionality. The Gaming industry favored
PHP for their applications more so than other industries by a staggering amount, 83% of
all the Gaming industries websites were written in PHP, likely due to it’s speed and low
resource consumption. The reason for this was not immediately clear to us, however, the
remediation rates among ASP, ColdFusion, .Net, and Java were considerably higher than
those PHP and Perl sites. PHP was favored by Gaming and Food and Beverage, while Perl
was favored by Manufacturing sectors.
Java enjoyed a relatively even distribution among all of the industries while .Net was a
more favorable language choice to others, namely the Insurance, Pharmaceutical and
Transportation sectors. These two languages remain the number one and two choice for
those industries.
A legacy tale
Financial services favor .Net for their applications, and also maintain the largest number
of legacy ASP applications by a 3:1 ratio. It is unlikely that many, if any, new applications
are being built with classic ASP so it stands to reason that these applications are very
important to revenue-generating and mission-critical applications. The Retail sector had
the second largest collection of classic ASP applications which appear to have a similar
challenge, revenue-generating sites that cannot for one business reason or another be
retired.
This data point became particularly interesting to us when we considered that ASP has
the greatest time-to-fix but has a remediation rate on par with all other languages. These
sites, while unable to be sun-stetted because they are mission-critical and/or revenue-
generating are taking a cost to risk approach of fixing vulnerabilities.
It was not lost on us that both the financial services sector and the retail industry face
heavy regulation and compliance drivers. Our 2013 Website Statistics research showed
that compliance was also the number one reason vulnerabilities went unresolved* so that
did not explain why both of these industry’s legacy sites performed as well they did. In fact,
the driver here was revenue not compliance or regulation.
*2013 Website Statistics Report, https://www.whitehatsec.com/assets/WPstatsReport_052013.pdf.
2014 Website Security Statistics Report16
0 20 40 60 80 100%
Transport  Distribution
Telecommunications
Technology
Social Networking
Retail
Pharmaceutical
Non Profit
Manufacturing
IT
Insurance
Healthcare
Government
Gaming
Food  Beverage
Financial Services
Entertainment  Media
Energy
Education
Banking
Automotive
Percent of language in use by industry
■ ASP
■ ColdFusion
■ .NET
■ Java
■ Perl
■ PHP
—
—
—
—
—
—
Key findings
§§ Financial Services has the
highest number of ASP sites
by count, by almost 3 to 1.
§§ 83% of Gaming Industry sites
written in PHP.
§§ 49% of the Banking Industry
applications were written in
Java  42% in .Net.
§§ 32% of Manufacturing sites
leveraged Perl as their
language of choice.
§§ The Technology sector wrote
35% of their sites in PHP.
No industry has an
even breakdown.
Everyone skews in
a different direction.
2014 Website Security Statistics Report17
Recommendations
Language choice
Cross-Site Scripting is the one vulnerability that appears to be affected by language choice,
however, regular assessments and focused remediation efforts can manage that risk.
Language choice begins at the architecture and design stage of application development;
security must begin here as well. Understanding the impact of those decisions early will
help address the management of the risk later on. The practice of choosing languages
based on business needs and functionality is not in question here; those factors are how
our business derives revenue. However, we should not overly rely on frameworks to provide
protection. More security controls in a framework tend to make it harder to remediate
because developers don’t know how to fix it. Instead, solid coding practices and code
review are your best tools. Ensuring that software is tested in all phases of development
and including code reviews of web services as they are critical components to modern
complex web applications.
Governance
Corporate Governance has long since spawned excellent IT governance frameworks.
The inclusion of application security into your existing governance frameworks is vital for
the reduction in the risk that is inherent in web applications. The application investment
decisions should align with the strategic priorities of the information security group. If
budget were no object this would not be necessary, however, budget is limited and
security spending must be allocated to efforts that reduce as much risk as possible while
balancing budgets.
Current governance frameworks can be over-arching and require a herculean effort to apply
to your SDLC process. It is very important to not allow application security governance to
exceed the amount of effort required to deliver a project. If a developer has to spend more
time filling out request for change forms or your security department becomes inundated
by the processes of application assessment, the teams will lose trust in the system and
find ways around it.
When it comes to governance, one-size does not fit-all. This is why the frameworks are
as large as they are. They are intended to serve as a guideline for all. The governance that
you apply to your application security program must match your needs and requirements.
2014 Website Security Statistics Report18
A risk-based approach
A risk-based approach is a management method for application security that relies on
quantifying risk in dollars and cents as the main driver for security decisions. This approach
cannot be applied during the language selection process, however, that choice is best
made based on business needs and functionality.
The determined risk is then the probability and potential loss magnitude in dollars,
represented by application vulnerabilities.
Once risk is quantified, meaningful comparisons can be made to drive decisions.
These decisions include:
§§ Remediation decisions (to remediate an application vulnerability or not, and when
to remediate)
§§ Prioritization decisions (stack ranking of which vulnerabilities should be
remediated first)
§§ Resource decisions (opportunity cost to apply limited development resources to
fix vulnerabilities)
§§ Funding decisions (establishing business case justifications for web application
security projects, how much budget to allocate towards web application security
versus alternative security budgets)
§§ Policy decisions (establishing policies for handling web application risk –
remediate, mitigate, postpone, transfer, accept)
§§ Exception decisions (e.g. when to allow exceptions to remediation SLAs, and for
how long)
2014 Website Security Statistics Report19
Remediation percent by vulnerability class
ASP ColdFusion .NET Java Perl PHP
Cross-Site Scripting 79 75 76 71 85 65
Information Leakage 67 60 72 51 24 36
Content Spoofing 74 77 74 74 84 55
SQL Injection 87 96 89 89 18 25
Cross-Site Request Forgery 60 46 54 51 69 54
Insufficient Transport Layer Protection 50 87 46 51 100 52
Abuse of Functionality 62 100 62 78 70 65
HTTP Response Splitting 80 80 51 40 40 75
Predictable Resource Location 71 50* 38 22 100* 67
Brute Force 34 62 41 25 19 37
URL Redirector Abuse 44 53 49 66 26 32
Insufficient Authorization 80 80 83 51 32 50
Fingerprinting 33 67* 41 56 20* 33
Session Fixation 45 42 49 34 0* 48
Directory Indexing — — 100* 100* — 100
WhiteHat Security defines the boundaries of a web application as a “slot”.
* Limited amount of data available
Appendix
2014 Website Security Statistics Report20
0 100 200 300 400 500 600 700 800 Days
Directory Indexing
Session Fixation
Fingerprinting
Insufficient Authorization
URL Redirector Abuse
Brute Force
Predictable Resource
Location
HTTP Response Splitting
Abuse of Functionality
Insufficient Transport
Layer Protection
Cross-Site Request Forgery
SQL Injection
Content Spoofing
Information Leakage
Cross-Site Scripting
Median days vulnerability is open by language
■ ASP
■ ColdFusion
■ .NET
■ Java
■ Perl
■ PHP
—
—
—
—
—
More security controls
in the framework
correlates with longer
remediation time.
2014 Website Security Statistics Report21
ASP Coldfusion .NET Java Perl PHP
Automotive 8 17 25 50 33
Banking 19 12 42 49 7 5
Education 25 17 33 33 21
Energy 11 5 63 32 5 21
Entertainment  Media 7 10 28 37 1 31
Financial Services 32 7 55 36 3 8
Food  Beverage 6 28 28 33 6 50
Gaming 4 4 4 13 9 83
Government 50 50 50 25
Healthcare 31 10 47 40 6 16
Insurance 38 13 71 42 13
IT 21 6 36 39 8 30
Manufacturing 15 4 28 32 43 9
Non Profit 10 60 50 30 20 10
Pharmaceutical 67 67 33 17
Retail 28 16 37 42 5 23
Social Networking 19 10 29 24 5 57
Technology 14 21 28 30 3 34.6
Telecommunications 22 3 34 44 3 50
Transport  Distribution 15 8 69 46 8
Percent of languages in use by industry
WhiteHat Security, Inc. | 3970 Freedom Circle | Santa Clara, CA 95054 | 1.408.343.8300 | www.whitehatsec.com
©2014 WhiteHat Security, Inc. All rights reserved. WhiteHat Security and the WhiteHat Security logo are registered trademarks of WhiteHat Security, Inc.
All other trademarks are the property of their respective owners.
About WhiteHat Security
Founded in 2001 and headquartered in Santa Clara, California, WhiteHat Security provides end-to-end solutions for application
security. The company’s cloud website vulnerability management platform and leading security engineers turn verified security
intelligence into actionable insights for customers. Through a combination of core products and strategic partnerships, WhiteHat
Security provides complete application security at a scale and accuracy unmatched in the industry. WhiteHat Sentinel, the company’s
flagship product line, currently manages thousands of websites – including sites in highly regulated industries, such as e-commerce,
financial services and healthcare companies. For more information, visit www.whitehatsec.com.

Weitere ähnliche Inhalte

Was ist angesagt?

2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment Victor Oluwajuwon Badejo
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4Meg Weber
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframePrecisely
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
The VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth AnalysisThe VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth AnalysisEMC
 

Was ist angesagt? (19)

2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 
Case study on JP Morgan Chase & Co
Case study on JP Morgan Chase & CoCase study on JP Morgan Chase & Co
Case study on JP Morgan Chase & Co
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
The VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth AnalysisThe VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth Analysis
 

Ähnlich wie 2014 Website Security Statistics Report Reveals Programming Language Vulnerabilities

Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩baoyin
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...ESET Middle East
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsAlan Kan
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools usedZoe Gilbert
 
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsWhite Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsSonatype
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Papitha Velumani
 
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...Black Duck by Synopsys
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityTyler Shields
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work togetherWendy Knox Everette
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxmattjtoni51554
 
Cyber Security for Critical Infrastructure
Cyber Security for Critical InfrastructureCyber Security for Critical Infrastructure
Cyber Security for Critical InfrastructureMohit Rampal
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Berezha Security Group
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxCheckmarx
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideLudovic Petit
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and ComplianceAnton Chuvakin
 

Ähnlich wie 2014 Website Security Statistics Report Reveals Programming Language Vulnerabilities (20)

Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsWhite Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities
 
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Cyber Security for Critical Infrastructure
Cyber Security for Critical InfrastructureCyber Security for Critical Infrastructure
Cyber Security for Critical Infrastructure
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's Toolbox
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference Guide
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and Compliance
 

Mehr von Jeremiah Grossman

All these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterAll these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterJeremiah Grossman
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorJeremiah Grossman
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryJeremiah Grossman
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Jeremiah Grossman
 
Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowJeremiah Grossman
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
 
WhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedWhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedJeremiah Grossman
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Jeremiah Grossman
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Jeremiah Grossman
 
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Jeremiah Grossman
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)Jeremiah Grossman
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Jeremiah Grossman
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Jeremiah Grossman
 

Mehr von Jeremiah Grossman (20)

All these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterAll these vulnerabilities, rarely matter
All these vulnerabilities, rarely matter
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare Sector
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare Industry
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?
 
Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 
WhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedWhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report Explained
 
Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

2014 Website Security Statistics Report Reveals Programming Language Vulnerabilities

  • 1. 2014 Website Security Statistics Report
  • 2. 2014 Website Security Statistics Report2 An end to the war of languages… maybe. Whenever beginning a new software project, you have to make a choice: what programming languages or development frameworks to use? While it would be nice to select the most secure software stack at the start of a project, more often this decision is made for different reasons and security is commonly an afterthought. The software stack decision is commonly based upon parameters such as: §§ What the development teams are most familiar with. §§ The current market momentum around the latest and greatest technology. §§ What will generate code the fastest and can be maintained at a low cost. §§ The available talent pool as the project grows. §§ And of course, whatever gets the job done. Familiarity with a programming language or development framework can drastically impact the ‘security’ outcome – whether it is designed to be secure by default or must be configured properly, and whether various libraries are available. Still, conventional wisdom suggests that most popular modern languages and frameworks (commercial and open source) perform similarly when it comes to an overall security posture. At least in theory, none is noticeably more secure than another. That being said, suggesting that PHP, Java, C# and others are any more secure than other languages is sure to spark heated debate. This is curious since the security of various programming languages rarely comes up when choosing what to use for a project. In the security industry, you often hear that any programming language can be coded securely – or conversely, insecurely – therefore, it really comes down to the development process. We know information security, and in particular application security, is littered with conventional wisdom and lacks foundational data. So we must ask, is this really true? Do programming languages perform relatively the same security-wise in the real-world, the only place where it matters? Or is their thought-to-be-similar-performance only true when restricted to technical documentation and anecdotes of their advocates? This area warrants deeper investigation. In this report, we put this area of application security understanding to the test by measuring how various web programming languages and development frameworks actually perform in the field. To which classes of attack are they most prone, how often and for how long; and, how do they fare against popular alternatives? Is it really true that the most popular modern languages and frameworks yield similar results in production websites? By analyzing the vulnerability assessment results of more than 30,000 websites under management with WhiteHat Sentinel, we begin to answer these questions. These answers may enable the application security community to ask better and deeper questions, which will eventually lead to more secure websites. Organizations deploying these technologies can have a closer look at particularly risk-prone areas. Software vendors may focus on areas that are found to be lacking. Developers can increase their familiarity with the strengths and weaknesses of their technology stack. All of this is vitally important because security must be baked into development frameworks and must be virtually transparent. Only then will application security progress be made. Introduction
  • 3. 2014 Website Security Statistics Report3 Déjà vu Literally translated in English as “already seen,” déjà vu would best describe the current state of website security. The Verizon Data Breach Incidents Report, the FireHost “Superfecta” Attack Report, and many other industry reports are in firm alignment that websites and web applications remain one of the leading targets of cyber-attacks. Further, the conclusions drawn from these varying industry reports all point to the need for more secure software. As a society, our reliance on the web continues to grow and the financial implications of these attacks are multiplying. Those who have sought to transfer some of these risks to more traditional instruments such as the burgeoning cyber insurance market have filed claims reaching as high as $20 million, with an average payout of just above $900,000*. Unfortunately, these policies are expensive and complicated, and do not always cover damages incurred from attacks. Tide goes in, tide goes out… The Software Development Lifecycle (SDLC) is well-defined and can be readily explained. If asked, IT teams are likely to point to a number of reasons for their choice of software stack which was likely made during the requirements or planning phase of development. The missing piece to achieving more secure software is the absence of relevant security data assisting in the technology selection process. The requirements phase revisited Application security professionals understand that websites with multiple users must have a way to securely handle each user, to ensure their sessions are initiated, managed, and terminated in a secure manner, and also to determine that if these sessions are authenticated, they must begin as an encrypted authentication event to avoid session fixation. What application security professionals are not currently able to add to the decision-making process is the determination, for example, of which programming language most securely handles sessions. If the choice of language is not one that handles sessions as securely as others, other determinations of how the chosen language is affected by the ability to correct session fixation issues, comes into play. Is it difficult to address? How long is the average time to fix those issues? The above is just one example of how our choices could be positively affected by understanding the security of the software stacks we choose. The same is reflected across the many security-focused scenarios that should be made at the requirements gathering and design phases. Another example of such a scenario: What happens if user X posts a question on the system? What happens if user Y then reads this question? We know there is a risk of Cross Site Scripting (XSS) but what we do not know is how well-equipped the chosen technology will be to protect against XSS. Is it difficult to address XSS? As security professionals, we need to meet the business requirements while controlling cost, and ensuring the security and integrity of our systems and data. It would be nice to get to a place where application security professionals can say “we can keep development costs down and be secure by choosing language X, given our requirements and the relative ease-to-fix issues that are known to affect our design.” This report aims to examine the prevalence of threats per programming language and the ensuing analysis reveals the relative security of those languages. Executive summary *Source: http://www.netdiligence.com/files/CyberClaimsStudy-2013.pdf
  • 4. 2014 Website Security Statistics Report4 Data Set The data All URLs for active slots with a PE* service level were selected. Clients that are used in QA/Demo and other “non-real” clients were removed from the sample. An unknown number of scan responses were missing and therefore, no language data was collected on these URLs. These only affected URLs that did not have a vulnerability detected. Problems with the data Scan responses that are more than 90-days old and not associated with a vulnerability are deleted from the server. This policy resulted in an unknown number of slots missing scan responses. While there is a lack of empirical evidence, it was determined that this was occurring on large slots and we probably had a sufficient number of URLs with vulnerabilities to accurately determine the language profile on the slot. Slots were partially validated by comparing the slot information from the Salesforce database as it is the canonical authority on the client list. However, this data is dirty in that it is missing about 118 slot IDs that were used in the analysis. We were using the most recent completed instance or, the most recent failed instance or, the active instance. There is a notable number of instances that have missing scan responses. It is worth noting that we were able to detect SSI, Ruby, HTC, and GO, however, the sampling of these languages were statistically to small to include. We also detected Flash applications, but as Flash is not a server-side language it was generally excluded unless specifically stated. The distribution of URLs per slot has a strong positive skew (8.1371). That is, the majority of slots had a small number of URLs and a few had a large number. This may be the result of differences in the size of the sites, the number of interactive elements and the language that was used. Therefore the average values reported will be based on the median and not the mean. There were a large number of slots (811) that had fewer than 10 URLs. Of the 122,800 URLs used, there were 2,652 URLs associated with those slots that had fewer than 10 URLs. The language classification system was able to find 179,146 markers for language. *WhiteHat Security’s PE level service combines automated scanning by the Sentinel platform and combines manual custom testing to identity business logic flaws by the WhiteHat Threat Research Center.
  • 5. 2014 Website Security Statistics Report5 Methodology Terminology Modern websites are composed of multiple technologies. WhiteHat Security defines the boundaries of a web application as a “slot.” The research data was derived from slots that had at least three completed assessments. Language classification Language classification was based on file extensions and HTTP header information. The URL file extension and the HTTP response body headers were used for language classification. A list of file extensions was mapped to selected languages. Many languages had several file extensions associated with them. The headers were examined and classification criteria were used to determine which language was used. Some languages and frameworks emit characteristic headers that were mapped to a given language. The same is true for cookies. Headers such as “content-disposition” had the filename section parsed and the file extension was used for classification. The “x-powered-by” header often listed the language used. The “content-type” header often listed the type of data, such as json or flash. In addition, there were many header names, such as “x-aspnet-version” that were used to indicate which language was used. The headers were collected and classified. Any unclassified headers went into a pool to be reexamined when sufficient numbers of the headers could be classified. 56.3% of URLs were able to be classified. We were able to determine at least one language on every slot. 31.7% of the slots had multiple languages. Methodology Scripts were written to extract supplemental data about the slots, such as industry, class, vulnerability status (open or closed), and timestamps. These data points are stored in our database and were extracted into a form that was imported into our statistical software. This extraction was done using SQL commands or Perl calls to our custom data framework. No cleaning of the data occurred at this phase, simply extraction. We used the R programming language to validate, clean, and link data. This is well- documented and results are reproducible. Raw data from the extraction, transformation, and loading phases were loaded into R. All cleaning and validation was done in R so that the results could be reproduced. This used a series of custom written routines on top of the R libraries. The statistical analysis was also scripted so that it could be repeated. A markdown language was used to generate a report with the results from the analysis and comments about their meaning.
  • 6. 2014 Website Security Statistics Report6 The most widely used languages are .NET and Java. Many organizations use ASP, a legacy language. 0 10 20 30 40 50 PerlColdFusionPHPASPJAVA.NET 28% 25% 16% 11% 6% 3% Percent of URLs by language Key findings In analyzing the data, our goal was to learn about the consequences of different technology decisions and to empower security decision makers that aim for a modern approach to addressing the real business challenges they face. Fundamental data points §§ We observed .Net to be the most widely represented language choice with 28.1% of web applications using the framework, followed by Java at 24.9% and ASP at 15.9%. §§ There was no significant difference between languages in examining the highest averages of vulnerabilities per slot. .Net had an average of 11.36 vulnerabilities per slot. Java was found to have an average of 11.32 and ASP came in at 10.98. §§ The bottom of the spectrum, or the most “secure”, also showed no significant difference between languages with the lowest averages of vulnerabilities per slot. Perl was observed as having 7 vulnerabilities per slot. ColdFusion was found to have the fewest with an average of 6. Risk exposure does not vary widely between languages, as language choice does not affect the number of vulnerabilities. A one-way analysis of the variance showed that there was no statistically significant difference between these languages. In fact, there was no statistical difference, in terms of the average number of vulnerabilities per slot, between any of the languages in this study.
  • 7. 2014 Website Security Statistics Report7 Vulnerability classes §§ 10.59% of ColdFuision sites had at least one SQL Injection vulnerability, the highest observed, followed by ASP with 7.67% and .NET 5.78%. §§ Perl sites had a 67% chance of having at least one Cross Site Scripting (XSS) vulnerability, over 11% more than any other language. §§ There was less than a 2% difference among the languages with Cross Site Request Forgery (CSRF). §§ Many vulnerability classes were not affected by language choice. Language observations §§ ColdFusion has the best overall remediation rates at 74.3%. §§ ColdFusion is significantly affected by Abuse of Functionality vulnerabilities with 5.93% of all sites having at least one occurrence, five times that of other languages. §§ PHP had the lowest observed remediation rates. §§ PHP is significantly affected by Insufficient Transport Layer Protection vulnerabilities, at 4.13% versus an average of 1% of all the combined major languages (Perl, Java, ASP, .Net ColdFusion). §§ Perl has the greatest remediation time of XSS, at 265 days to resolve. §§ Perl’s median remediation rate of CSRF is 23.8 days, three times faster than the next closest langague, PHP at 68.97 days. All other languages were over 100 days. §§ ColdFusion and PHP have fast remediation times when vulnerabilities are addressed: 50.5 and 47.5 days respectively. §§ ASP takes the longest to fix all vulnerabilities averaging 139.97 days. .Net averages 111.86 days and PHP rounded out the bottom with an average of 47.49 days. §§ ASP is remediating vulnerabilities at the same rate as other languages, but efforts are focused on critical issues.* Industry observations §§ Financial Services, HealthCare and Insurance organizations had the highest number of ASP sites by a 3:1 ratio. §§ 86% of Gaming industry sites are written in PHP. §§ 36% of Banking industry sites were written in Java and 55% in .Net. §§ 43% of Manufacturing sites leveraged Perl as their language of choice. §§ 35% of the Technology sector wrote their sites in PHP. Risk exposure does not vary widely between languages, as language choice does not affect number of vulnerabilities. PerlColdfusionPHPASPJava.NET 11 11 11 10 7 6 Mean number of vulnerabilities in each language *Observation based on the types of vulnerability classes being remediated.
  • 8. 2014 Website Security Statistics Report8 The big picture In a moment, we will return to exploring the security of software stacks. But first, knowing that there was no significant difference between languages with the highest averages of vulnerabilities per slot we took a step back to look at how each website performed as they are most often comprised of multiple technologies. The importance of knowing the security posture of your websites is, from a security perspective, more important than language choice. Vulnerabilities per language Now that we have examined the average number of vulnerabilities observed in websites we will drill down and explore the vulnerabilities found in each language and the possible significance of these findings. We found that 31% of all vulnerabilities found were in .Net applications. It must be noted that there are more websites written in .Net than all of the other languages in the study and that there was no evidence to suggest that .Net is any less secure based on this data point. In fact, .Net sites have a tendency to be larger and more complicated, which is directly correlated with having a larger attack surface and consequently more vulnerabilities. Java – by virtue of its popularity with its extensive standard library class and its familiarity among programmers – accounted for 28% of all the vulnerabilities found. Again, the number of applications written in the language along with the complexities of the websites has to be considered as a contributing factor. Originally released almost two decades ago ASP totaled 15% of all the discovered vulnerabilities. Although lacking the complexities of modern frameworks, many of the same critical vulnerability classifications were found to be present, as we will explore. Another popular server-side scripting language, PHP also accounted for 15% of vulnerabilities discovered. A language still popular with Retail, Technology, and Financial Services organizations, PHP sites do not have a tendency to be as large or complex as .NET or Java sites but still suffer from many of the same issues. The percentage of vulnerabilities found among the remaining languages experiences a sharp drop off from this point. ColdFusion, another platform almost 20 years in existence, only accounted for 4% of the vulnerabilities, while Perl registered at 2%. Average vulnerabilities
  • 9. 2014 Website Security Statistics Report9 Median days open By language The next data set we examined was the average number of days vulnerabilities remained open. Vulnerabilities go unfixed for many reasons and it begged the question as to whether there was anything to be learned from studying the length of time vulnerabilities were open in each of the languages. ASP vulnerabilities were open for an median of 139 days, more so than any of the other languages. PHP rounds out the top of the list with an average days open of 129.5 days. The numbers begin to significantly decline beyond Java, which had an average of 90.9 days open. The other languages were all under 45 days once we hit this drop off. By class Cross-Site Scripting in the PHP environment was open the least median number of days at 49. Perl and ASP respectively had XSS issues open an average of 184 and 135 days. .Net did not fare much better with XSS having an average number of days open of 126. Overall XSS appears to take a relative amount of effort regardless of the language class. PHP stood out from the pack when looking at SQL Injection, with the languages instances of the vulnerability exhibiting the lowest average number of days at 6.8, closely followed by Perl, which had the issue open an average of 19.4 days. ColdFusion topped the list averaging 107.4 days of exposed SQL Injection vulnerabilities. ASP’s average number of days open for SQL Injection was not far off of the ColdFusion average at 97.5 days. .Net and Java fell roughly in the middle at 51.4 and 64.8 days respectively. The vulnerability with the highest average number of days open was Weak Password Recovery Validation in ASP websites, while not the most damaging vulnerability by itself, this could speak to a number of things such as, complexities of the language itself, programming experience necessary, or simply that this vulnerability class is not a priority in that environment.
  • 10. 2014 Website Security Statistics Report10 Days open of top 5 vulnerability classes 200 400 600 800 PHP Perl Java .NET ColdFusion ASP Top five vulnerabilities: Cross Site Scripting Information Leakage Content Spoofing HTTP Response Splitting Predictable Resource Location The following vulnerabilities are unremarkable on graph:  Predictable Resource Location  SQL Injection  Cross Site Request Forgery  Insufficient Transport Layer Protection  Abuse of Functionality  Brute Force  URL Redirector Abuse  Insufficient Authorization  Fingerprinting  Session Fixation  Directory Indexing Key findings: §§ ASP vulnerabilities remain open the longest at 139 days. §§ Cross-Site Scripting takes the longest to close in Perl taking 184 median days. §§ ColdFusion has the largest average days open for SQL Injection vulnerabilities at 107 median days. §§ Languages with the most security controls are taking the longest to remediate.
  • 11. 2014 Website Security Statistics Report11 Cross-Site Scripting (XSS) XSS regained the number one spot for being the most common vulnerability, after being overtaken by Information Leakage last year in all but one language: .Net, which still has Information Leakage as the number one vulnerability, followed by XSS. Stand-outs ColdFusion has a significantly higher percentage of abuse of functionality vulnerabilities at 6% compared to Java, the language with the second highest percentage at 1%. ColdFusion does, however, boast a 100% remediation rate versus Java’s 78% remediation rate or abuse of functionality vulnerabilities. ColdFusion also suffers from the greatest percentage of SQL Injection at 11%. ASP takes second place with 8%. Java had the lowest percentage of SQL Injection at 1%. Again we see ColdFusion with a higher remediation rate of 96% versus Java’s 89%. PHP’s rate of Insufficient Transport Layer at 4.13% is the highest, exceeding Java by almost 4-times which came in second at 1.34%. Coupled with a low remediation rate of 52%, PHP applications are at a much higher risk of exposing sensitive information. Vulnerability classes
  • 12. 2014 Website Security Statistics Report12 Key findings: §§ Cross-Site Scripting regains the number one spot after being overtaken by Information Leakage last year in all but one language. .Net has Information Leakage as the number one vulnerability, followed by Cross-Site Scripting. §§ ColdFusion has a rate of 11% SQL Injection vulnerabilities, the highest observed, followed by ASP with 8% and .NET 6%. §§ Perl has an observed rate of 67% Cross-Site Scripting vulnerabilities, over 17% more than any other language. §§ There was less than a 2% difference among the languages with Cross-Site Request Forgery. §§ Many vulnerabilities classes were not affected by language choice. Cross-Site Scripting is a significant issue across all languages. Vulnerability class by language (percentage) ASP ColdFusion .NET Java Perl PHP Cross-Site Scripting 49 46 35 57 67 56 Information Leakage 29 24 44 15 11 17 Content Spoofing 5 4 5 8 6 7 SQL Injection 8 11 6 1 3 6 Cross-Site Request Forgery 2 2 2 4 4 2 Insufficient Transport Layer Protection 0.8 1 0.9 1 0.3 4 Abuse of Functionality 0.3 6 0.3 0.9 0.5 0.2 HTTP Response Splitting 0.9 3 0.8 2 0.8 0.3 Predictable Resource Location 0.1 0.1 0.0 0.2 0.1 1 Brute Force 0.7 0.3 1 2 0.8 1 URL Redirector Abuse 0.7 0.4 0.5 1 1 0.9 Insufficient Authorization 0.2 0.3 0.5 0.9 1 0.2 Fingerprinting 0.3 0.1 0.5 0.6 0.3 0.1 Session Fixation 0.2 0.3 0.2 0.6 0.1 0.3 Directory Indexing - - 0.0 0.0 - 0.3
  • 13. 2014 Website Security Statistics Report13 Remediation rates Progress measured Remediation rate is the key accountability metric in any web application security program. Affected by many factors – including business functionality, complexity, and priority – the rate at which vulnerabilities are addressed is a key indicator of application security maturity. Likewise, languages are affected by unique factors as they pertain to remediation rates. Some languages have frameworks that make addressing different vulnerability classes less complex than others. The skill levels of the available programmer resources and the libraries used directly affect the security of individual languages. Perl’s remediation rate of XSS vulnerabilities bested the pack boasting an 85% rate. When it came to addressing SQL Injection vulnerabilities on the other hand, Perl had the lowest remediation rate of 18%. Perl did have the lowest number of days open for SQL Injection, so it is apparent that when these vulnerabilities were addressed, they closed faster than any other language. SQL Injection had a 96% remediation rate in ColdFusion applications and every single abuse of functionality vulnerability found in ColdFusion sites was remediated. Legacy ASP sites exhibited remediation rates on par with other languages while suffering from large windows of exposure suggesting that there were strategic decisions being made regarding the maintenance and security of these sites. Classic ASP struggles from being developed at a time in the history of the web when the breadth of attacks were not what they are today, yet what we see here is a great amount of effort to keep pace with the remediation rates of modern frameworks. There was no immediate data to suggest that language choice greatly affected remediation rates given that a language such as ASP is able to keep track while PHP lagged much further behind. The efforts to keep pace may be enough reason to retire these legacy sites, however more often this choice is based on the need for update functionality.
  • 14. 2014 Website Security Statistics Report14 0 20 40 60 80 100% Directory Indexing Session Fixation Fingerprinting Insufficient Authorization URL Redirector Abuse Brute Force Predictable Resource Location HTTP Response Splitting Abuse of Functionality Insufficient Transport Layer Protection Cross-Site Request Forgery SQL Injection Content Spoofing Information Leakage Cross-Site Scripting Remediation rates by vulnerability class ■ ASP ■ ColdFusion ■ .NET ■ Java ■ Perl ■ PHP — — — — Key findings §§ Perl remediates 85% of all Cross-Site Scripting vulnerabilities, the highest rate among all languages but only 18% of SQL Injection. §§ Net and Java have the same remediation rate of SQL Injection at 89%. §§ ColdFusion remediates 100% of its Abuse of Functionality vulnerabilities, 96% of its SQL Injection, and 87% of Insufficient Transport Layer Protection vulnerabilities. ASP is remediating at the same rate as the other languages, focusing on mission critical vulnerabilities.
  • 15. 2014 Website Security Statistics Report15 Industry analysis Across the board An oft-repeated response to inquires about the languages their websites use is “a little of everything,” however, the data showed that organizations tend to have a significant amount of one or two languages with a very minimal investment in the others. The breakdown is by far not equally spread, yet what we see is an attempt to approach the security of their websites as though there were truly a distribution that favored no particular language. This tends to lead to choices in tools, services and skill sets that may not have enough focus or expertise on the areas with the greatest financial investment or impact. There were some definite “favorites” among the industries. No doubt that there exists correlations between financial drivers and functionality. The Gaming industry favored PHP for their applications more so than other industries by a staggering amount, 83% of all the Gaming industries websites were written in PHP, likely due to it’s speed and low resource consumption. The reason for this was not immediately clear to us, however, the remediation rates among ASP, ColdFusion, .Net, and Java were considerably higher than those PHP and Perl sites. PHP was favored by Gaming and Food and Beverage, while Perl was favored by Manufacturing sectors. Java enjoyed a relatively even distribution among all of the industries while .Net was a more favorable language choice to others, namely the Insurance, Pharmaceutical and Transportation sectors. These two languages remain the number one and two choice for those industries. A legacy tale Financial services favor .Net for their applications, and also maintain the largest number of legacy ASP applications by a 3:1 ratio. It is unlikely that many, if any, new applications are being built with classic ASP so it stands to reason that these applications are very important to revenue-generating and mission-critical applications. The Retail sector had the second largest collection of classic ASP applications which appear to have a similar challenge, revenue-generating sites that cannot for one business reason or another be retired. This data point became particularly interesting to us when we considered that ASP has the greatest time-to-fix but has a remediation rate on par with all other languages. These sites, while unable to be sun-stetted because they are mission-critical and/or revenue- generating are taking a cost to risk approach of fixing vulnerabilities. It was not lost on us that both the financial services sector and the retail industry face heavy regulation and compliance drivers. Our 2013 Website Statistics research showed that compliance was also the number one reason vulnerabilities went unresolved* so that did not explain why both of these industry’s legacy sites performed as well they did. In fact, the driver here was revenue not compliance or regulation. *2013 Website Statistics Report, https://www.whitehatsec.com/assets/WPstatsReport_052013.pdf.
  • 16. 2014 Website Security Statistics Report16 0 20 40 60 80 100% Transport Distribution Telecommunications Technology Social Networking Retail Pharmaceutical Non Profit Manufacturing IT Insurance Healthcare Government Gaming Food Beverage Financial Services Entertainment Media Energy Education Banking Automotive Percent of language in use by industry ■ ASP ■ ColdFusion ■ .NET ■ Java ■ Perl ■ PHP — — — — — — Key findings §§ Financial Services has the highest number of ASP sites by count, by almost 3 to 1. §§ 83% of Gaming Industry sites written in PHP. §§ 49% of the Banking Industry applications were written in Java 42% in .Net. §§ 32% of Manufacturing sites leveraged Perl as their language of choice. §§ The Technology sector wrote 35% of their sites in PHP. No industry has an even breakdown. Everyone skews in a different direction.
  • 17. 2014 Website Security Statistics Report17 Recommendations Language choice Cross-Site Scripting is the one vulnerability that appears to be affected by language choice, however, regular assessments and focused remediation efforts can manage that risk. Language choice begins at the architecture and design stage of application development; security must begin here as well. Understanding the impact of those decisions early will help address the management of the risk later on. The practice of choosing languages based on business needs and functionality is not in question here; those factors are how our business derives revenue. However, we should not overly rely on frameworks to provide protection. More security controls in a framework tend to make it harder to remediate because developers don’t know how to fix it. Instead, solid coding practices and code review are your best tools. Ensuring that software is tested in all phases of development and including code reviews of web services as they are critical components to modern complex web applications. Governance Corporate Governance has long since spawned excellent IT governance frameworks. The inclusion of application security into your existing governance frameworks is vital for the reduction in the risk that is inherent in web applications. The application investment decisions should align with the strategic priorities of the information security group. If budget were no object this would not be necessary, however, budget is limited and security spending must be allocated to efforts that reduce as much risk as possible while balancing budgets. Current governance frameworks can be over-arching and require a herculean effort to apply to your SDLC process. It is very important to not allow application security governance to exceed the amount of effort required to deliver a project. If a developer has to spend more time filling out request for change forms or your security department becomes inundated by the processes of application assessment, the teams will lose trust in the system and find ways around it. When it comes to governance, one-size does not fit-all. This is why the frameworks are as large as they are. They are intended to serve as a guideline for all. The governance that you apply to your application security program must match your needs and requirements.
  • 18. 2014 Website Security Statistics Report18 A risk-based approach A risk-based approach is a management method for application security that relies on quantifying risk in dollars and cents as the main driver for security decisions. This approach cannot be applied during the language selection process, however, that choice is best made based on business needs and functionality. The determined risk is then the probability and potential loss magnitude in dollars, represented by application vulnerabilities. Once risk is quantified, meaningful comparisons can be made to drive decisions. These decisions include: §§ Remediation decisions (to remediate an application vulnerability or not, and when to remediate) §§ Prioritization decisions (stack ranking of which vulnerabilities should be remediated first) §§ Resource decisions (opportunity cost to apply limited development resources to fix vulnerabilities) §§ Funding decisions (establishing business case justifications for web application security projects, how much budget to allocate towards web application security versus alternative security budgets) §§ Policy decisions (establishing policies for handling web application risk – remediate, mitigate, postpone, transfer, accept) §§ Exception decisions (e.g. when to allow exceptions to remediation SLAs, and for how long)
  • 19. 2014 Website Security Statistics Report19 Remediation percent by vulnerability class ASP ColdFusion .NET Java Perl PHP Cross-Site Scripting 79 75 76 71 85 65 Information Leakage 67 60 72 51 24 36 Content Spoofing 74 77 74 74 84 55 SQL Injection 87 96 89 89 18 25 Cross-Site Request Forgery 60 46 54 51 69 54 Insufficient Transport Layer Protection 50 87 46 51 100 52 Abuse of Functionality 62 100 62 78 70 65 HTTP Response Splitting 80 80 51 40 40 75 Predictable Resource Location 71 50* 38 22 100* 67 Brute Force 34 62 41 25 19 37 URL Redirector Abuse 44 53 49 66 26 32 Insufficient Authorization 80 80 83 51 32 50 Fingerprinting 33 67* 41 56 20* 33 Session Fixation 45 42 49 34 0* 48 Directory Indexing — — 100* 100* — 100 WhiteHat Security defines the boundaries of a web application as a “slot”. * Limited amount of data available Appendix
  • 20. 2014 Website Security Statistics Report20 0 100 200 300 400 500 600 700 800 Days Directory Indexing Session Fixation Fingerprinting Insufficient Authorization URL Redirector Abuse Brute Force Predictable Resource Location HTTP Response Splitting Abuse of Functionality Insufficient Transport Layer Protection Cross-Site Request Forgery SQL Injection Content Spoofing Information Leakage Cross-Site Scripting Median days vulnerability is open by language ■ ASP ■ ColdFusion ■ .NET ■ Java ■ Perl ■ PHP — — — — — More security controls in the framework correlates with longer remediation time.
  • 21. 2014 Website Security Statistics Report21 ASP Coldfusion .NET Java Perl PHP Automotive 8 17 25 50 33 Banking 19 12 42 49 7 5 Education 25 17 33 33 21 Energy 11 5 63 32 5 21 Entertainment Media 7 10 28 37 1 31 Financial Services 32 7 55 36 3 8 Food Beverage 6 28 28 33 6 50 Gaming 4 4 4 13 9 83 Government 50 50 50 25 Healthcare 31 10 47 40 6 16 Insurance 38 13 71 42 13 IT 21 6 36 39 8 30 Manufacturing 15 4 28 32 43 9 Non Profit 10 60 50 30 20 10 Pharmaceutical 67 67 33 17 Retail 28 16 37 42 5 23 Social Networking 19 10 29 24 5 57 Technology 14 21 28 30 3 34.6 Telecommunications 22 3 34 44 3 50 Transport Distribution 15 8 69 46 8 Percent of languages in use by industry
  • 22. WhiteHat Security, Inc. | 3970 Freedom Circle | Santa Clara, CA 95054 | 1.408.343.8300 | www.whitehatsec.com ©2014 WhiteHat Security, Inc. All rights reserved. WhiteHat Security and the WhiteHat Security logo are registered trademarks of WhiteHat Security, Inc. All other trademarks are the property of their respective owners. About WhiteHat Security Founded in 2001 and headquartered in Santa Clara, California, WhiteHat Security provides end-to-end solutions for application security. The company’s cloud website vulnerability management platform and leading security engineers turn verified security intelligence into actionable insights for customers. Through a combination of core products and strategic partnerships, WhiteHat Security provides complete application security at a scale and accuracy unmatched in the industry. WhiteHat Sentinel, the company’s flagship product line, currently manages thousands of websites – including sites in highly regulated industries, such as e-commerce, financial services and healthcare companies. For more information, visit www.whitehatsec.com.