Feeds

Over half of all apps have security holes

Dodgy development practices blamed

Securing Web Applications Made Simple and Scalable

More than half of all software applications failed to meet an acceptable level of security, according to a study based on real-world code audits by application security firm Veracode.

Around 57 per cent of applications failed to pass muster when first submitted to Veracode’s cloud-based testing service. A similar 56 per cent of finance-related applications failed first testing by Veracode’s security audit. The quality of the code used in many business-critical banking and insurance operations was simply not up to snuff.

Cross-site scripting was the most common vulnerability, accounting for 51 per cent of vulnerabilities uncovered during the testing process. Web applications developed in .NET were particularly susceptible to this class of flaw.

Cross-site scripting holes were to blame for the worms that spread on Twitter on Tuesday. In other environments they can be used in either phishing or drive-by download attacks.

Veracode said eight out of 10 web applications would fail a PCI audit, because they failed against one or other of the top 10 application security risks as defined by OWASP.

Third-party code makes up nearly 30 per cent of all applications submitted to Veracode for review, and third-party components make up a substantial proportion of internal developed applications. Applications developed by third parties had lower security quality than those developed in-house, failing to reach acceptable security standards 81 per cent of the time, according to Veracode.

One positive finding in the otherwise gloomy survey is that developers are repairing security vulnerabilities more quickly. Development teams using Veracode were able to fix problems in 16 days, on average, compared to the 30 days recorded in previous edition of the same study.

Matt Peachey, Veracode’s VP EMEA, said: "Developers continue to focus on functionality, quality, and speed of release. Security slows down The process and often gets overlooked.

"Many of the problems, such as cross-site scripting, are down to sloppy coding. This class of flaw is well known and documented as well as easy to fix but continue to very common."

Veracode's study is based on more than 2,900 applications that were put through their paces over the last 18 months through the Veracode SecurityReview cloud-based Platform. Billions of lines of scanned code from internally developed, commercial, open source and outsourced software running in large enterprises was parsed for problems using this process.

An analysis of this feature was published on Wednesday as part of Veracode's second annual State of Software Security Report. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.