13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HP Security Research | Cyber Risk Report 2015Because more attention is paid to critical issues, we decided to create a view of top 10critical issues that plague Web applications. Below is the representation of the subset of thevulnerabilities of critical <strong>risk</strong> found in Web applications and their prevalence.Figure 22. Top 10 critical vulnerabilities noted in Web applications in 2014Cross-frame scripting: Reflected 33%Often misused: Login formCross-frame scripting17%18%Credential management: Sensitive information in URL15%Null dereference13%Unreleased resource: StreamsPassword management: Weak policy enforcementXML internal entity injectionPrivacy violation10%10%10%9%Insecure transport: Weak SSL cipher9%0% 5% 10% 15% 20% 25% 30% 35%While there is no surprise that Cross-Site scripting: Reflected is the top critical concern affectingmost Web applications, it is notable to see various authentication-related vulnerabilities in thetop 10. Erroneous implementation or configuration of login forms, credentials, passwords, andsecure transport may provide the right ingredients for privilege escalation.The trend with server misconfigurations seems to be very similar to last year, and it is thenumber-one issue across all analyzed applications within this category.Looking deeper into the breakdown, access to unnecessary files and directories seemsto dominate the misconfiguration-related issues. In comparison to the top 10 commonvulnerabilities shown in Figure 21, Unprotected File and Directory are the second and fourthmost pervasive, affecting 46.86 percent and 45.63 percent of applications respectively.54

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!