THAPS: automated vulnerability scanning of PHP applications

  • Authors:
  • Torben Jensen;Heine Pedersen;Mads Chr. Olesen;René Rydhof Hansen

  • Affiliations:
  • Department of Computer Science, Aalborg University, Denmark;Department of Computer Science, Aalborg University, Denmark;Department of Computer Science, Aalborg University, Denmark;Department of Computer Science, Aalborg University, Denmark

  • Venue:
  • NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we describe the THAPS vulnerability scanner for PHP web applications. THAPS is based on symbolic execution of PHP with specialised support for scanning extensions and plug-ins of larger application frameworks. We further show how THAPS can integrate the results of dynamic analyses, generated by a customised web crawler, into the static analysis. This enables analysis of often used advanced dynamic features such as dynamic code load and reflection. To the best of our knowledge, THAPS is the first tool to apply this approach and the first tool with specific support for analysis of plug-ins. In order to verify our approach, we have scanned 375 WordPress plug-ins and a commercial (monolithic) web application, resulting in 68 and 28 confirmed vulnerabilities respectively.