Unpatched Open Source Libraries Leave 71% of Apps Vulnerable

  /     /     /  
Publicated : 23/11/2024   Category : security


Unpatched Open Source Libraries Leave 71% of Apps Vulnerable


PHP and JavaScript developers need to pay close attention because different languages and frameworks have different rates of vulnerability, research finds.



The management of open source libraries poses a major challenge for secure development. Thats because seven in 10 applications use at least one flawed open source library, inheriting vulnerabilities that could potentially be exploited, according to a new study of more than 81,000 applications.
The vulnerability of open source libraries varies across languages and frameworks, and developers should take into consideration the characteristics of the framework they are working with, according to application security firm Veracode, which published the analysis. PHP applications, for example, have a modest number of imported open source components — an average of 34 — but a larger share of vulnerable libraries. On the other hand, while JavaScript typically has a relatively low number of vulnerable libraries, the typical application has a massive number of imported libraries — 377 on average — resulting in a large number of vulnerabilities, Veracode found.
Developers need to not just focus on patching, but also on approaching application security in a way that is right for the frameworks with which they are working, says Chris Eng, chief research officer at Veracode.  
Open source software has a surprising variety of flaws, he says. The attack surface of many applications is much larger than developers may expect due to the fact that open source libraries have dependencies on other libraries. Developers must be aware of this and the fact that language selection makes a difference in terms of the size of the ecosystem and in the prevalence of flaws in those ecosystems.
The report underscores that a lack of patching continues to be the No. 1 problem for application-security programs. Fixes exist for more than 90% of the vulnerabilities that have a published proof-of-concept, according to
Veracodes report
. Fixing such issues is critical because attackers regularly use older vulnerabilities to attack systems and applications, the US Cybersecurity and Infrastructure Security Agency
said in a recent advisory
.
Open source software gives companies tremendous advantages, but theres no free lunch here, and all code must be managed to avoid your own contributions — whether open or closed source in nature — from exposing your users to vulnerabilities, Veracode stated in the report.
Overall, the research suggests that developers who know the security characteristics of the open source libraries supporting their particular language and framework will have a greater likelihood of producing secure code. 
For example, one attribute of open source libraries, known as transitive dependencies — where a library pulls in code from other libraries — can result in an application relying on code that a developer may not know about because they did not explicitly import the library. More than 80% of the applications written in JavaScript, PHP, and Ruby import more than two-thirds of their libraries through such transitive dependencies, according to Veracode. On the other end of the spectrum, less than 10% of applications written in Microsofts .NET and Apples Swift have transitive dependencies. Go, Java, and Python applications straddle the middle ground with a balanced mix.
The approach each language and its core developers take to libraries can also have an impact. 
PHP applications, for example, typically import a modest number of libraries but gain a significant attack surface area through this friend-of-a-friend method of importing components, which exposes vulnerabilities that might not otherwise be anticipated by developers. Combined with the finding that 27% of all PHP libraries have an exploitable flaw, the framework can be a source of hidden dangers for developers, says Veracodes Eng.
JavaScript applications, on the other hand, tend to import a large number of small libraries — one, for example, consists only of four lines of code — but relatively few libraries include a vulnerability. Because each application includes more than 300 libraries, however, the probability of including one of the vulnerable open source components is high, he says.
More than any of the languages weve looked at, JavaScript encourages the creation and use of very, very, small libraries that do one task, Eng says. With JavaScript, PHP, and Ruby, developers need to make sure they are managing transitive inclusions.
The most numerous vulnerability classes are not the ones that developers should necessarily spend the most time eradicating, according to Veracode. While 29% of all flaws are cross-site scripting vulnerabilities, only about 8% of flawed libraries have an exploitable version of the vulnerability. Two other classes of vulnerabilities from the OWASP Top 10 — insecure deserialization and broken access controls — are much more likely to be exploitable, with 30% of flawed libraries having an exploitable version of the vulnerability.
But the good news for developers is that a minor update or patch could fix more than 90% of vulnerabilities with published exploits, Eng says. 
Open source software offers a lot of advantages, and its only growing from here, he says. My recommendation is that developers and their organizations increase their knowledge and ability to test for flaws in the libraries they are pulling into their applications. The fixes are usually minor and can have a big impact on reducing exposure.
Related Content:
Nine in 10 Applications Contain Outdated Software Components
Attackers Routinely Use Older Vulnerabilities to Exploit Businesses, US Cyber Agency Warns
A Security-First Approach to DevOps
About 50% of Apps Are Accruing Unaddressed Vulnerabilities
Web App Vulnerabilities Flying Under Your Radar
How Enterprises Are Developing and Maintaining Secure Applications
Latest Security News & Commentary about COVID-19
 

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Unpatched Open Source Libraries Leave 71% of Apps Vulnerable