Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks

  • Authors:
  • Jose Fonseca;Marco Vieira;Henrique Madeira

  • Affiliations:
  • -;-;-

  • Venue:
  • PRDC '07 Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Web applications are typically developed with hard time constraints and are often deployed with security vulnerabilities. Automatic web vulnerability scanners can help to locate these vulnerabilities and are popular tools among developers of web applications. Their purpose is to stress the application from the attacker's point of view by issuing a huge amount of interaction within it. Two of the most widely spread and dangerous vulnerabilities in web applications are SQL injection and Cross Site Scripting (XSS), because of the damage they may cause to the victim business. Trusting the results of web vulnerability scanning tools is of utmost importance. Without a clear idea on the coverage and false positive rate of these tools, it is difficult to judge the relevance of the results they provide. Furthermore, it is difficult, if not impossible, to compare key figures of merit of web vulnerability scanners. In this paper we propose a method to evaluate and benchmark automatic web vulnerability scanners using software fault injection techniques. The most common types of software faults are injected in the web application code which is then checked by the scanners. The results are compared by analyzing coverage of vulnerability detection and false positives. Three leading commercial scanning tools are evaluated and the results show that in general the coverage is low and the percentage of false positives is very high.