DETECTING VULNERABILITIES IN WEB APPLICATIONS
    1.
    发明申请
    DETECTING VULNERABILITIES IN WEB APPLICATIONS 审中-公开
    检测WEB应用程序中的漏洞

    公开(公告)号:US20130139267A1

    公开(公告)日:2013-05-30

    申请号:US13440416

    申请日:2012-04-05

    IPC分类号: G06F21/00

    摘要: A method, computer program product, and system for detecting vulnerabilities in web applications is described. A method may comprise determining one or more values associated with a web application that flow to response data associated with the web application. The one or more values may be modifiable by unreliable input. The method may further comprise generating a representation of the response data associated with the web application. The method may additionally comprise determining one or more potentially vulnerable portions of the response data based upon, at least in part, the one or more values modifiable by the unreliable input that flow to the response data associated with the web application, and the representation of the response data associated with the web application.

    摘要翻译: 描述了一种用于检测Web应用程序中的漏洞的方法,计算机程序产品和系统。 方法可以包括确定与web应用程序相关联的一个或多个值,其流向与web应用相关联的响应数据。 一个或多个值可能由不可靠的输入修改。 该方法还可以包括生成与web应用相关联的响应数据的表示。 该方法可以另外包括至少部分地基于流向与web应用相关联的响应数据的不可靠输入可修改的一个或多个值来确定响应数据的一个或多个潜在易受攻击的部分,以及 与Web应用程序相关联的响应数据。

    Detection of DOM-based cross-site scripting vulnerabilities
    2.
    发明授权
    Detection of DOM-based cross-site scripting vulnerabilities 有权
    检测基于DOM的跨站点脚本漏洞

    公开(公告)号:US09223977B2

    公开(公告)日:2015-12-29

    申请号:US13447904

    申请日:2012-04-16

    摘要: Testing a Web-based application for security vulnerabilities. At least one client request including a payload having a unique identifier can be communicated to the Web-based application. Response HTML and an associated Document Object Model (DOM) object can be received from the Web-based application. Content corresponding to the payload can be identified in the DOM object via the unique identifier. A section of the DOM object including the payload can be identified as un-trusted.

    摘要翻译: 测试基于Web的应用程序的安全漏洞。 包括具有唯一标识符的有效载荷的至少一个客户端请求可以被传送到基于Web的应用。 可以从基于Web的应用程序接收响应HTML和关联的文档对象模型(DOM)对象。 可以通过唯一标识符在DOM对象中识别与有效载荷相对应的内容。 包括有效载荷的DOM对象的一部分可以被识别为不可信。

    Detecting vulnerabilities in web applications
    3.
    发明授权
    Detecting vulnerabilities in web applications 有权
    检测Web应用程序中的漏洞

    公开(公告)号:US09124624B2

    公开(公告)日:2015-09-01

    申请号:US13440416

    申请日:2012-04-05

    IPC分类号: H04L29/06 H04W12/12 H04L29/08

    摘要: A method, computer program product, and system for detecting vulnerabilities in web applications is described. A method may comprise determining one or more values associated with a web application that flow to response data associated with the web application. The one or more values may be modifiable by unreliable input. The method may further comprise generating a representation of the response data associated with the web application. The method may additionally comprise determining one or more potentially vulnerable portions of the response data based upon, at least in part, the one or more values modifiable by the unreliable input that flow to the response data associated with the web application, and the representation of the response data associated with the web application.

    摘要翻译: 描述了一种用于检测Web应用程序中的漏洞的方法,计算机程序产品和系统。 方法可以包括确定与web应用程序相关联的一个或多个值,其流向与web应用相关联的响应数据。 一个或多个值可能由不可靠的输入修改。 该方法还可以包括生成与web应用相关联的响应数据的表示。 该方法可以另外包括至少部分地基于流向与web应用相关联的响应数据的不可靠输入可修改的一个或多个值来确定响应数据的一个或多个潜在易受攻击的部分,以及 与Web应用程序相关联的响应数据。

    DETECTING VULNERABILITIES IN WEB APPLICATIONS

    公开(公告)号:US20130139266A1

    公开(公告)日:2013-05-30

    申请号:US13307780

    申请日:2011-11-30

    IPC分类号: G06F11/00

    摘要: A method, computer program product, and system for detecting vulnerabilities in web applications is described. A method may comprise determining one or more values associated with a web application that flow to response data associated with the web application. The one or more values may be modifiable by unreliable input. The method may further comprise generating a representation of the response data associated with the web application. The method may additionally comprise determining one or more potentially vulnerable portions of the response data based upon, at least in part, the one or more values modifiable by the unreliable input that flow to the response data associated with the web application, and the representation of the response data associated with the web application.

    Detecting vulnerabilities in web applications

    公开(公告)号:US09032529B2

    公开(公告)日:2015-05-12

    申请号:US13307780

    申请日:2011-11-30

    IPC分类号: H04L29/06 H04L29/08 H04W12/12

    摘要: A method, computer program product, and system for detecting vulnerabilities in web applications is described. A method may comprise determining one or more values associated with a web application that flow to response data associated with the web application. The one or more values may be modifiable by unreliable input. The method may further comprise generating a representation of the response data associated with the web application. The method may additionally comprise determining one or more potentially vulnerable portions of the response data based upon, at least in part, the one or more values modifiable by the unreliable input that flow to the response data associated with the web application, and the representation of the response data associated with the web application.

    Detection of DOM-based cross-site scripting vulnerabilities
    6.
    发明授权
    Detection of DOM-based cross-site scripting vulnerabilities 有权
    检测基于DOM的跨站点脚本漏洞

    公开(公告)号:US08683596B2

    公开(公告)日:2014-03-25

    申请号:US13283989

    申请日:2011-10-28

    IPC分类号: G06F21/00

    摘要: Testing a Web-based application for security vulnerabilities. At least one client request including a payload having a unique identifier can be communicated to the Web-based application. Response HTML and an associated Document Object Model (DOM) object can be received from the Web-based application. Content corresponding to the payload can be identified in the DOM object via the unique identifier. A section of the DOM object including the payload can be identified as un-trusted.

    摘要翻译: 测试基于Web的应用程序的安全漏洞。 包括具有唯一标识符的有效载荷的至少一个客户端请求可以被传送到基于Web的应用。 可以从基于Web的应用程序接收响应HTML和关联的文档对象模型(DOM)对象。 可以通过唯一标识符在DOM对象中识别与有效载荷相对应的内容。 包括有效载荷的DOM对象的一部分可以被识别为不可信。

    Generating a custom parameter rule based on a comparison of a run-time value to a request URL
    7.
    发明授权
    Generating a custom parameter rule based on a comparison of a run-time value to a request URL 有权
    根据运行时间值与请求URL的比较生成自定义参数规则

    公开(公告)号:US09026612B2

    公开(公告)日:2015-05-05

    申请号:US13447952

    申请日:2012-04-16

    IPC分类号: G06F13/00 H04L29/08

    CPC分类号: G06F17/30893 H04L29/08981

    摘要: Identifying at least one custom parameter in a request uniform resource locator (URL). The method can include identifying at least a first portion of source code of a Web application that typically consumes the custom parameter provided in the request URL and, via a processor, instrumenting the Web application at the first portion of the source code. The Web application can receive the request URL and the Web application can be executed with the instrumented source code. At least one run-time value consumed by the second portion of the source code can be identified, and the run-time value can be compared to the request URL to determine whether the run-time value intersects with the request URL. Responsive to determining that the run-time value intersects with the request URL, the run-time value can be identified as the custom parameter. A custom parameter rule can be generated based on the comparison.

    摘要翻译: 在请求统一资源定位符(URL)中标识至少一个自定义参数。 该方法可以包括识别Web应用程序的源代码的至少第一部分,其通常消耗在请求URL中提供的自定义参数,并且经由处理器在源代码的第一部分检验Web应用程序。 Web应用程序可以接收请求URL,Web应用程序可以使用带检测的源代码执行。 可以识别由源代码的第二部分消耗的至少一个运行时值,并且可以将运行时值与请求URL进行比较,以确定运行时值是否与请求URL相交。 响应于确定运行时值与请求URL相交,运行时值可以被标识为自定义参数。 可以根据比较生成自定义参数规则。

    Detecting persistent vulnerabilities in web applications
    8.
    发明授权
    Detecting persistent vulnerabilities in web applications 有权
    检测Web应用程序中的持久漏洞

    公开(公告)号:US08949992B2

    公开(公告)日:2015-02-03

    申请号:US13149158

    申请日:2011-05-31

    申请人: Yair Amit Omer Tripp

    发明人: Yair Amit Omer Tripp

    摘要: A method, including storing a test payload to a persistent state of an application and performing a static analysis to identify a first code location in the application that retrieves the test payload, to identify a first path from an entry point to the first code location, and to identify a second path from the first code location to a second code location that executes a security sensitive operation using the retrieved data. A dynamic analysis is then performed to retrieve the test payload via the first path, and to convey the test payload to the second code location via the second path.

    摘要翻译: 一种方法,包括将测试有效负载存储到应用的持久状态并执行静态分析以识别应用中检索测试有效载荷的第一代码位置,以识别从入口点到第一代码位置的第一路径, 并且识别从第一代码位置到使用检索的数据执行安全敏感操作的第二代码位置的第二路径。 然后执行动态分析以经由第一路径检索测试有效载荷,并且经由第二路径将测试有效载荷传送到第二代码位置。

    Detecting stored cross-site scripting vulnerabilities in web applications
    9.
    发明授权
    Detecting stored cross-site scripting vulnerabilities in web applications 有权
    检测Web应用程序中存储的跨站点脚本漏洞

    公开(公告)号:US09460291B2

    公开(公告)日:2016-10-04

    申请号:US13429993

    申请日:2012-03-26

    IPC分类号: G06F21/57 H04L29/06

    摘要: A method for detecting security vulnerabilities in web applications can include providing a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, detecting the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determining, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.

    摘要翻译: 用于检测web应用程序中的安全漏洞的方法可以包括在计算机服务器与网络应用程序的第一次交互期间向web应用程序提供有效载荷,其中有效载荷包括有效负载指令和标识符,检测在 在所述第一交互之后与所述web应用的交互,以及响应于在所述有效载荷内检测到所述标识符,确定所述有效载荷指令是否在执行所述有效载荷指令之前进行了安全检查。