AP NEWS

WhiteHat Security Identifies Top 10 Application Vulnerabilities for 2018

January 16, 2019

SANTA CLARA, Calif.--(BUSINESS WIRE)--Jan 16, 2019--WhiteHat Security, the leading application security provider committed to securing digital business, today released new threat research titled , detailing the most common web exploits used by malicious attackers during the past 12 months. This research will educate the market on avoiding hacks, like those that affected British Airways, Ticketmaster, the United States Postal Service (USPS) and more, due to these vulnerabilities and includes valuable prevention tips for enterprises to implement in the new year.

Examples of Top Application Vulnerabilities for 2018:

1. jQuery File Upload RCE - CVE-2018-9206

jQuery File Upload is a popular open source package that allows users to upload files to a website – however, it can be abused by creating a shell that is uploaded to run commands on the server. This vulnerability can be traced back to 2015, and all versions prior to 9.22.1 are vulnerable.

2. Magecart

Although not a common vulnerability and exposure (CVE), Magecart is a card-skimming attack that cannot be overlooked. It originated from a black hat group in 2018, and companies like Ticketmaster, British Airways, Feedify, ABS-CBN and Newegg were among the victims of this attack. Magecart breaches systems and replaces the JavaScript that handles payments with malicious code to send payment details to the hackers completely unbeknownst to the end user.

3. WordPress DoS - CVE-2018-6989

In WordPress, unauthenticated users can perform a Denial of Service (DoS) attack by abusing the functionality of the load-scripts.php file to request a large number of JavaScript files via a single request. This allows each request to quickly consume the resources of the server, leading to a DoS.

In 2018, WhiteHat analyzed and validated several million attack vectors across multiple market sectors. The WhiteHat Security platform is powered by a combination of automation, artificial and human intelligence to ensure that only actionable security threats are reported to its customers.

The Top 10 Application Security Vulnerabilities of 2018 reflect a combination of observed trends from the WhiteHat Security vulnerability data lake and the active customer feedback on the threats across its enterprise application portfolio.

To read the complete Top 10 Application Vulnerabilities of 2018 report, and see the recommendations for remediation, visit: https://whitehatsec.com/blog/whitehat-security-top-10-application-security-vulnerabilities-of-2018/

About WhiteHat Security

WhiteHat Security has honed its 17 years of experience in the application security space to provide developers with the tools and services they need to write and deliver the most secure software at the speed of business. The award-winning WhiteHat Application Security Platform, which has been featured on the Gartner Magic Quadrant for Application Security Testing for the last five years, is empowering true DevSecOps by continuously assessing the risk for organizations’ software assets and helping them to embed security throughout–and beyond– the software life cycle (SLC). The company is based in San Jose, California, with regional offices across the U.S. and Europe. For more information on WhiteHat Security, please visit www.whitehatsec.com, and follow us on  Twitter, LinkedIn and  Facebook.

View source version on businesswire.com:https://www.businesswire.com/news/home/20190116005070/en/

CONTACT: Touchdown PR

Emily Gallagher/Alyssa Pallotti

512-373-8500

egallagher@touchdownpr.com

KEYWORD: UNITED STATES NORTH AMERICA CALIFORNIA

INDUSTRY KEYWORD: TECHNOLOGY INTERNET SOFTWARE SECURITY

SOURCE: WhiteHat Security

Copyright Business Wire 2019.

PUB: 01/16/2019 09:00 AM/DISC: 01/16/2019 09:01 AM

http://www.businesswire.com/news/home/20190116005070/en

AP RADIO
Update hourly