Menu
Web 2.0 apps riddled with holes

Web 2.0 apps riddled with holes

New browser-based application technologies are opening new security holes, warned SPI Dynamics, as it launched a re-engineered version of its SOA/Web 2.0 security testing software Webinspect this week.

Brian Cohen, SPI's CEO, says that older testing tools — including his — were fine for relatively static server-side applications, but are no good for modern dynamic apps built using the likes of AJAX, SOAP, SOA and Flash.

"These applications are not static, or even close to it," he says. "The underpinnings of the web have fundamentally changed. HTML and CGI applications were predictable, but now the environment is much more complicated to interpret — it is dynamic."

Cohen says that SPI had to completely redesign the platform that underlies the latest version of WebInspect so it can analyse Web 2.0 applications, looking at client-side security as well as server-side.

The danger is more widespread than users might think, says James Spooner, technical director of Lodoga Security, which beta-tested Webinspect 7.

"Proper corporate applications are using many of these features in quite subtle ways," he says. "For example, we've worked on a government application running single-sign on and data validation, all on web services and made up of 15 different applications.

"Traditional test tools look for menu systems and so on, but in AJAX, Javascript runs the show and you're handing over trust to the client — it's incredibly scary.

He continued, "Web developers are far too confident in the ability of their tools to protect them. The thing is, the existing toolkits are great for developing, but they don't do anything to stop you writing insecure code."

The risks are not just technical -- they also come from who's driving application development now and they come from later in the application lifecycle, Cohen added.

"Some aren't even written by engineers, they're being done by marketing," he says, noting that as applications evolve over time, it is all too easy for developers to code quick fixes onto the page without considering the security implications.

He says that as well as scanning for vulnerable application logic during development and testing apps before they go live, users need to regularly test them after they go live as well. "Most applications aren't AJAX, but most now use some element that uses AJAX," he warned.


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags SPI DynamicsWebinspect 7

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments