Impact of plugins on the security of web applications

  • Authors:
  • James Walden;Maureen Doyle;Rob Lenhof;John Murray;Andrew Plunkett

  • Affiliations:
  • Northern Kentucky University, Highland Heights, KY;Northern Kentucky University, Highland Heights, KY;Northern Kentucky University, Highland Heights, KY;Northern Kentucky University, Highland Heights, KY;Northern Kentucky University, Highland Heights, KY

  • Venue:
  • Proceedings of the 6th International Workshop on Security Measurements and Metrics
  • Year:
  • 2010

Quantified Score

Hi-index 0.01

Visualization

Abstract

Many web applications have evolved into complex software ecosystems, consisting of a core maintained by a set of long term developers and a range of plugins developed by third parties. The security of such applications depends as much on vulnerabilities found in plugins as it does in vulnerabilities in the application core. In this paper, we present a study of vulnerabilities in twelve open source web applications and 13,778 plugins for those applications. We used automated static analysis tools to count vulnerabilities. Plugins made up 93% of the aggregate code base of 10.2 MLOC and contained 92% of the 125,110 vulnerabilities found. Comparing the aggregate plugin source code of each project with its code, we found that four projects had more secure core code than plugin code, as measured by vulnerability density (vulnerabilities per thousand lines of code), while eight projects had plugin code that was more secure than core code. Vulnerability density was significantly correlated with code size for both core code and plugins. We also analyzed the density of individual vulnerability categories, finding plugins to have many more cross-site vulnerabilities and fewer injection vulnerabilities than core code.