Practical elimination of external interaction vulnerabilities in web applications

  • Authors:
  • James Miller;Toan Huynh

  • Affiliations:
  • University of Alberta, Canada;University of Alberta, Canada

  • Venue:
  • Journal of Web Engineering
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

External Interaction Vulnerabilities (EIVs) are currently the most common vulnerability for web applications. These vulnerabilities allow attackers to use vulnerable web applications as a vessel to transmit malicious code to external systems that interact with the web applications. The malicious code will modify the semantic content of the information sent to the external application. Current vulnerability detection approaches are black-box oriented and do not take advantage of the data flow information which is available in the source code. In this paper, we introduce a white-box approach called EIV analysis to eliminate web applications' vulnerabilities. This strategy allows investigators to accurately identify all inputs entering the web application and model the input as it reaches external systems acting as data sinks. The strategy is partially automated resulting in substantial effort savings when compared with common industrial approaches; while also providing superior performance in terms vulnerability detection. A case study using a commercial, currently deployed, mission-critical web application is presented to demonstrate the validity of these claims.