Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

WebInspect Detects Site Defects: Page 2 of 3

Problem Solved

In the full scan I ran against a site that used a SQL database, WebInspect looked at the parameters in a Web form. It then manipulated them and performed a SQL command injection, where client-supplied data makes its way into an SQL query string. The site had a bug that would let an attacker perform session hijacking with a hidden user ID parameter being passed in the form. A few minutes after the Webmaster's coders saw the report, they were able to issue a fix with a single line of JavaScript. The report helped the coders understand the problem--an improper parameter verification--so they could devise a solution.



WebInspect Test Bed
click to enlarge

I ran the assault scan on an unpatched default IIS server installation. You can see a report from the assault test here. It shows the output of the assault scan, including a detailed description of the vulnerability and how to patch it. Among other things, WebInspect found an Internet Printing Protocol buffer overflow. The report included a link to source code of a program that could execute this attack, and the original Microsoft and eEye advisory pages. The report also showed every e-mail address found (spam address harvesting), hidden pages and fields, comments in the code, forms and JavaScripts on the page.

WebInspect's advanced features include support for basic and NTML authentication and tools to encode or decode hex, unicode, base64 and md5.

Michael J. DeMaria is an associate technology editor based at Network Computing's Syracuse University's Real-World Labs®. Write to him at [email protected].