Coverity Releases Security Spotlight Report on Critical Security Defects in Open Source Projects
Coverity, Inc announced the release of its latest Coverity Scan Project Spotlight, which analyzed the security defects detected by its open source software scanning service. In conjunction with the release of the report, Coverity also announced that it would enhance the Coverity Scan service by including the Coverity Security Advisor solution to the service so projects can now find critical Open Web Application Security Project (OWASP) Top 10 issues. The service has also been expanded to now include C# open source projects.
Recent high-profile vulnerabilities in open source code, including Shellshock, the OpenSSL Heartbleed and GoToFail vulnerabilities, have highlighted the importance of code quality and security for organizations. The Coverity Scan Security Spotlight identifies several common defects and exposures (CVEs) in open source code, and identifies that the GoToFail vulnerability could have been detected in Scan.
Since the inception of the Coverity Scan service in 2006, Coverity has enabled open source projects to find and fix critical security issues, including buffer overflows, integer overflows, and format string errors in C/C++ code. With today's announcement, the company is now enabling Java developers to find and fix security issues in their software code, including all of the OWASP Top 10 and other web application security issues.
The OWASP Top 10 presents the most critical threat to open source code. In the short time since Coverity Scan has been able to detect web application security defects in Java, the service has identified 688 OWASP Top 10 issues in 37 open source projects, including big data, network management, and blog server projects. The following are the specific number of OWASP Top 10 issues found:
Item |
Description |
Number of Issues Found |
A1 |
Injection |
135 |
A2 |
Broken Authentication and Session Management |
43 |
A3 |
Cross-site Scripting (XSS) |
139 |
A4 |
Insecure Direct Object References |
210 |
A5 |
Security Misconfiguration |
10 |
A6 |
Sensitive Data Exposure |
8 |
A7 |
Missing Function Level Access Control |
4 |
A8 |
Cross-Site Request Forgery (CSRF) |
139 |
A9 |
Using Components with Known Vulnerabilities |
NA |
A10 |
Unvalidated Redirects and Forwards |
0 |
"The road to application quality and security starts in development," said Zack Samocha, senior director of products at Coverity. "With three major security issues related to open source code defects this year, it's imperative that open source developers design code security into their projects starting as early as possible and utilize security experts to help them understand vulnerable areas in the code and potential attack vectors. Open source developers should leverage some of the best practices for application security employed by proprietary projects such as using static analysis and conducting regular security audits."
During the past eight years, the Coverity Scan service has analyzed several hundreds of millions of lines of code from more than 1,500 open source projects – including C/C++ projects such as NetBSD, FreeBSD, LibreOffice and Linux, and Java projects such as Apache Hadoop, HBase and Cassandra. The Scan service has helped developers find and fix more than 94,000 defects since 2006. Nearly 50,000 defects were fixed in 2013 alone – the largest single number of defects fixed in a single year by Scan users. More than 11,000 of these defects were fixed by the four largest projects in the service: NetBSD, FreeBSD, LibreOffice and Linux.