Netsparker's Web Application Security Blog

December 2018 Update for Netsparker Standard

Category: Releases - Last Updated: Thu, 10 Jan 2019 - by Netsparker Security Team

This blog post announces the new features and improvements in the latest Netsparker Standard release of December 2018. Highlights include: a rewritten sitemap and issues panel, a new family vulnerabilities feature, added support for 64-bit smart card drivers and Swagger 3.0 Importer, and several send to integration additions. Read More

Clickjacking Attack on Facebook: How a Tiny Attribute Can Save the Corporation

Category: Web Security Readings - Last Updated: Fri, 04 Jan 2019 - by Ziyahan Albeniz
Clickjacking Attack on Facebook: How a Tiny Attribute Can Save the Corporation

This article explains the origins of the Clickjacking Attack and how it works. It then examines how a researcher discovered a Clickjacking bug on Facebook and how Facebook responded to the Clickjacking attack. Finally, the article provides advice on how to prevent Clickjacking Attacks by using the X-Frame-Options HTTP security header. Read More

Sven Morgenroth Talks About PHP Object Injection Vulnerabilities on Paul's Security Weekly Podcast

Category: Web Security Readings - Last Updated: Thu, 20 Dec 2018 - by Allen Baird
Sven Morgenroth Talks About PHP Object Injection Vulnerabilities on Paul's Security Weekly Podcast

In episode #584 of Paul's Security Weekly, Sven Morgenroth, a Netsparker security researcher, discusses PHP Object injection vulnerabilities and explains the dangers of PHP's unserialize function. Sven provides background on PHP Objects, demos how to write an exploit for a PHP Object Injection vulnerability, and explains how to prevent them. Read More

End of Support for PHP 5 and PHP 7.0

Category: Web Security Readings - Last Updated: Tue, 18 Dec 2018 - by Allen Baird
End of Support for PHP 5 and PHP 7.0

At the end of 2018, PHP will stop security updates and support for some of its previous versions. This will expose hundreds of millions of websites to serious risk in terms of sites hacked, user details stolen, and massive fines. You need to update, and use systems that allow you to deploy only new versions of PHP by default. Read More

Netsparker Announces New Application & Websites Discovery Service

Category: News - Last Updated: Tue, 11 Dec 2018 - by Dawn Baird

Netsparker announces a new feature for Netsparker Enterprise that acts as an application and service discovery tool. Netsparker Radar – Application & Service Discovery Service enables you to locate your enterprise's online collateral, websites and services, which you can then add to Netsparker to scan, helping you reduce threats and increase security. Read More

Netsparker and GitLab Integration

Category: News - Last Updated: Tue, 11 Dec 2018 - by Robert Abela
Netsparker and GitLab Integration

Netsparker announces a new integration capability between Netsparker Enterprise and GitLab. GitLab is a web-based Git repository manager that provides CI/CD pipeline features, enabling you to add CI configuration to your source control using just one file, and gain access to our advanced integration functionality. Read More

Tabnabbing Protection Bypass

Category: Web Security Readings - Last Updated: Thu, 06 Dec 2018 - by Ziyahan Albeniz
Tabnabbing Protection Bypass

This blog post includes a discussion of URLs, their structure, how they can contain sensitive information and why it's so difficult to parse them without introducing vulnerabilities. We include an example of how a parsing error led to a Window Opener Protection Bypass. Read More

Bypass of Disabled System Functions

Category: Web Security Readings - Last Updated: Tue, 04 Dec 2018 - by Netsparker Security Team
Bypass of Disabled System Functions

In this article, our Security Researchers examine the explicit code of the disabled system functions bypass, including the parameters of the imap_oprn function, the IMAP server types and SSH connection, and the -oProxyCommand in the exploit. They conclude with some methods to protect yourself against this bypass method. Read More

Fragmented SQL Injection Attacks – The Solution

Category: Web Security Readings - Last Updated: Thu, 29 Nov 2018 - by Ziyahan Albeniz
Fragmented SQL Injection Attacks – The Solution

In this blog post, we discuss the research on Fragmented SQL Injection where the hackers control two entry points in the same context in order to bypass the authentication form. Our security researcher looks at the importance of single quotes in the SQL injection attacks and the solution, Prepared Statements, also known as Parameterized Queries. Read More

Web Browser Address Bar Spoofing

Category: Web Security Readings - Last Updated: Thu, 15 Nov 2018 - by Ziyahan Albeniz
Web Browser Address Bar Spoofing

This blog post looks at two address bar spoofing incidents. The first involved the Homograph vulnerability, where attackers used the IDN feature to trick users by imitating legitimate characters. The second involved Edge and Safari, in which visitors redirected to another website were intercepted by attackers. Code samples are included. Read More

The Powerful Resource of PHP Stream Wrappers

Category: Web Security Readings - Last Updated: Wed, 14 Nov 2018 - by Ziyahan Albeniz
The Powerful Resource of PHP Stream Wrappers

This blog post examines how PHP stream wrappers can be used to bypass keyword based blacklists. It includes an examination of the generic functions that can be used to interact with streams, the concept of stream-context and steam filters. It also looks at PHP wrappers in RFI attacks and bypassing blacklists. Code samples are supplied throughout. Read More

Pros and Cons of DNS Over HTTPS

Category: Web Security Readings - Last Updated: Thu, 01 Nov 2018 - by Sven Morgenroth
Pros and Cons of DNS Over HTTPS

This blog post introduces the Domain Name System and what happens when a browser issues a DNS request. It then explains the technical basics of its successor, DNS Over HTTPS (DoH), why it is unavailable on your Android phone and how to circumvent this. Finally, it examines whether it enhances security and privacy, and how to disable it. Read More