Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More

Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Trustwave's Global Security Report 2011: Web Application Risks

Yesterday, we released Trustwave's Global Security Report 2011 (short registration required). This report encompasses data gathered by the SpiderLabs Team during 220 forensic investigations and over 2,300 manual penetration tests. Notice the word "manual" was highlighted right? That means that this data was not gathered through the use of automated scanning tools but rather by manually testing target networks and applications. This means that we are able to dig in deeper into the target web application and uncover vulnerabilities that automated tools alone would never identify. While there is a ton of great data within the GSR 2011 report, for this blog post, I wanted to focus a bit of attention to the web application sections of the report.

Top 10 Web Application Risks

This Top 10 list was gathered by the Trustwave SpiderLabs Application Pentest Team. The attacks and vulnerabilities listed below are ranked by collective threat, based on the frequency of findings, difficulty in launching the attack and the potential impact when exploited by criminals. The report explains:

For example, while SQL injection is not the most common vulnerability we encounter, the potential for the bulk extraction of sensitive data makes it the number one threat of 2010. Conversely, cross-site request forgery (CSRF) is one of the most common application vulnerabilities, but requires a more complicated attack scheme, relegating it to eighth on the list.

Here is the Top 10 List:

  1. SQL Injection
  2. Logic Flaw
  3. Authorization Bypass
  4. Cross-site Scripting (XSS)
  5. Authentication Bypass
  6. Vulnerable Third Party Software
  7. Session Handling Flaw
  8. Cross-site Request Forgery (CSRF)
  9. Verbose Errors
  10. Source Code Disclosure

If you cross-reference our Top 10 list with the well-known OWASP Top 10 for 2010, you will see some discrepancies. This is mainly attributed to the fact that we had a concrete data set to work from vs. abstractions of Top 10 lists from various participating organizations in the OWASP Top 10.

Actively Targeted Vulnerabilities

The Top 10 list above is certainly interesting data and should help organizations to prioritize their remediation efforts, however it does not tell the whole story. The issues that the SpiderLabs Application Pentest Team identifies are possible methods of which an attacker could compromise the application. Therefore, the next step to take is to cross reference these particular vulnerabilities with the attack vectors used in real-world web application compromises gathered by the SpiderLabs Incident Response/Forensic Teams. The Infiltration sub-section of the Incident Response Investigations section of the GSR 2011 lists the top web application attack method as SQL Injection:

Even after a decade, SQL injection continues to be the most popular method of entry for Web-based applications; it is a perfect example of attackers only working hard enough to identify a vulnerability affecting many or all payment applications, and then take advantage of it. In 2010, more SQL injection attacks resulting in system-level shell access were observed. Traditional SQL injection attacks typically result only in the extraction of data residing within the backend database. As entities continued to eradicate the storage of unencrypted data within these databases, attackers relied on advanced SQL injection techniques to obtain access to usable data. In most instances, advanced SQL injection allowed attackers to obtain system-level shell access and to then modify Web code to harvest sensitive data during the submission of the data within the Web form.

A public example of this type of SQL Injection methodology can be found in the WASC Web Hacking Incident Database (WHID) entry WHID 2009-29: FBI & Secret Service warn of a sophisticated HSM attack. The data presented by the FBI/SS shows how attackers are able to use SQL Injection to install OS level sniffing programs in order to capture credit card data in transit.

Lessons Learned

If you were to have one takeaway from today's blog post, it should be to validate how your web applications use back-end databases. Have your developers review the OWASP SQL Injection Cheatsheet document and then implement a plan to have your environment actively assessed for weaknesses

ABOUT TRUSTWAVE

Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo