- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
Network World - A close look at vulnerabilities in about 15,000 websites found 86% had at least one serious hole that hackers could exploit, and “content spoofing” was the most prevalent vulnerability, identified in over half of the sites, according to WhiteHat Security’s annual study published today.
“’Content spoofing’ is a way to get a website to display content from the attacker,” says Jeremiah Grossman, CTO at WhiteHat, an IT security vendor. A criminal might do this to steal sensitive customer information or simply to embarrass the owners of a website. In any event, in content spoofing the fake content is not actually on the website as it would be in a web defacement, but simply appears to be there, Grossman points out.
The Open Web Application Security Project (OWASP) group says content spoofing is also sometimes referred to as “content injection” or “virtual defacement,” and it’s an attack made possible by an injection vulnerability in a web application that does not properly handle user-supplied data.
[SECURITY SCOOP: Phishing tactics and how hackers get away with it]
The content spoofing attack can supply content to a web application that is reflected back to the user, who’s presented with a modified page under the context of the trusted domain, according to OWASP. It’s said to be similar to a cross-site scripting attack but uses other techniques to modify the page for malicious reasons.
The annual WhiteHat Website Security Statistics Report examined vulnerabilities found over the course of 2012 in the 15,000 websites of 650 companies and government agencies for which it provides web application vulnerability assessments. These range from financial, manufacturing, technology, entertainment, energy to media, and government.
The top 15 vulnerability classes for websites are said to be cross-site scripting; information leakage; content spoofing;
cross-site request forgery; brute force; insufficient transport layer protection; insufficient authorization; SQL injection;
session fixation; fingerprinting; URL redirector abuse; directory indexing; abuse of functionality; predictable resource location;
and HTTP response splitting.
Grossman says there were a few unexpected findings related to how quickly organizations fixed vulnerabilities when taking into account how much they’d invested in application security training for their programmers.
Emphasis on training was correlated with 40% fewer website vulnerabilities and a 59% faster rate of resolving them than in organizations that didn’t do training. But the actual remediation rate to close all the holes related to the vulnerabilities was 12% less than in organizations without training. Grossman says WhiteHat’s analysis indicates that the poorest rates of remediation overall are associated with organizations where their regulatory compliance requirements are the No.1 driver for resolving vulnerabilities. If the vulnerability wasn’t tied to compliance, it was ignored.