SQL injection flaws easy to find and exploit, Veracode report finds

'Everyday hackers' use search engines to hunt for holes

The software industry's inability to reduce the number of security flaws in its code is fuelling an age of the 'everyday hacker', criminals who can exploit vulnerabilities with a minimum of technical skills, Security testing firm Vercode's latest State of Software Security (SoSS) report (reg required) has suggested.

Of the 22,430 applications submitted to the firm's code analysis service in the three 18 months to June 2012, only 13 percent of web applications were able to pass the generic OWASP Top 10 list of security problems.

When it came to standalone applications, only 31 percent complied with the separate CWE/SANS Top 25, a significant decrease on the compliance rate in the previous SoSS report caused, Veracode suggested, by a broader sample of companies using the service.

Nevertheless, the percentage of applications containing common but serious flaws such as SQL injection remained static at 32 percent, with cross-site scripting also stubbornly entrenched at 67 percent.

In short, these failure rates underscore that weak and insecure software development lifecycles are still an issue years after the industry was supposed to have started fixing the problem. Dataq breaches were an inevitable consequence.

And having failed to eradicate issues such as SQL injection, the ability of non-technical hackers to hunt down and exploit them also augured badly for the industry, Veracode said.

The company predicts that around one in three data breaches during 2013 will be caused by SQL injection alone, one of the easiest for 'everyday hackers' to target.

"The pessimist remains very concerned that we are not seeing the dramatic decreases in exploitable coding flaws that I expect to see with each passing year,"said Veracode's co-founder and CTO, Chris Wysopal in his introduction to the report.

"It's as if for each customer, development team, or application that has become more secure, there are an equal number or more that do not," he added.

"Put more bluntly, we must figure out a way to code more securely simply to keep up with attacks from the most basic attacker."

The effect of failures in the SDL on the security professional and CISOs is open to some debate although Veracode claims that the average length of tenure could now be as low as 18 months. Is this an effect of data breaches, and therefore code insecurity? That's not clear.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

Tags Veracodesoftwareapplications

More about SDL

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John E Dunn

Latest Videos

More videos

Blog Posts