THAPS: Automated Vulnerability Scanning of PHP Applications

Torben Jensen, Heine Pedersen, Mads Chr. Olesen, Rene Rydhof Hansen

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

16 Citations (Scopus)

Abstract

In this paper we describe the THAPS vulnerability scanner for PHP web applications. THAPS is based on symbolic execution of PHP with specialised support for scanning extensions and plug-ins of larger application frameworks. We further show how THAPS can integrate the results of dynamic analyses, generated by a customised web crawler, into the static analysis. This enables analysis of often used advanced dynamic features such as dynamic code load and reflection. To the best of our knowledge, THAPS is the first tool to apply this approach and the first tool with specific support for analysis of plug-ins.
In order to verify our approach, we have scanned 375 WordPress plug-ins and a commercial (monolithic) web application, resulting in 68 and 28 confirmed vulnerabilities respectively.
Original languageEnglish
Title of host publicationProceedings of the 17th Nordic Conference on Secure IT-Systems (NordSec 2012)
Volume7617
PublisherSpringer
Publication date2012
Pages31-46
ISBN (Print)978-3-642-34209-7
ISBN (Electronic)978-3-642-34210-3
DOIs
Publication statusPublished - 2012
Event17th Nordic Conference, NordSec 2012: Secure IT Systems - Karslkrona, Sweden
Duration: 31 Oct 20122 Nov 2012
Conference number: 17

Conference

Conference17th Nordic Conference, NordSec 2012
Number17
Country/TerritorySweden
CityKarslkrona
Period31/10/201202/11/2012
SeriesLecture Notes in Computer Science
Volume7617
ISSN0302-9743

Cite this