Study: Websites, open source, social networking at risk

Open source players join usual suspects on Top Ten list

IBM and Websense are separately issuing their semiannual security trend reports this week, and the picture isn't pretty for websites, open source software and social networking programs.

The IBM Internet Security Systems "Midyear Trend Statistics" report tracked 3,534 disclosed vulnerabilities in software for the first half of the year, a 5% increase from the first half of 2007. When it comes to the Top Ten worst offenders in terms of vulnerabilities, big players like IBM, Microsoft, Apple, Sun, Cisco and Oracle continue to make the list. But this time they are joined by names in the open source software community: Joomla!, Drupal, WordPress and Linux.

"IBM makes a lot of software, and companies that make a lot of software are subject to more disclosures," says Tom Cross, X-Force researcher at IBM ISS, by way of explaining why IBM and other software giants make the Top Ten disclosures list.

But this is the first time that community-developed open source software such as the Drupal and Joomla! content-management software packages for the web also showed up on the list.

Drupal and Joomla! are open source packages that "have both been vulnerable to SQL injection attacks," Cross says.

The first half of this year will be remembered far and wide for SQL injection attacks. A massive series of such attacks struck earlier this year across the internet, hitting websites based on Microsoft's Internet Information Server.

Vulnerabilities in both proprietary and open source software has led to a spike in SQL injection as well as cross-site scripting attacks that allow perpetrators to compromise web servers, loading them up with malicious code for their own designs.

According to the Websense "State of Internet Security Q1-Q2" report, the situation regarding compromised websites is becoming dire.

"Sixty percent of the of 100 most-popular websites have been hosting malicious code or inadvertently distributing it," says Stephan Chenette, manager of the Websense Security Labs, adding, "75% of malicious websites in general are actually legitimate websites that are compromised." That's a huge jump from last year when Websense surmised that number stood at 51%.

Some popular websites inadvertently hosting malicious code during the last half include, and, Chenette says. "We've seen malicious code on, and, which is popular with developers. We've seen banner ads, which can be purchased on Yahoo, used for malicious code."

Blog sites, such as Google blogspot, have become popular spots to post malware, and social-networking sites Facebook, MySpace and YouTube have been tarnished by postings of malicious content as well. This first half of 2008 saw spammers develop tools for beating the CAPTCHA web security mechanism to prevent automated posting of content, Websense states in its report.

Another disturbing trend, according to IBM ISS, is that exploit code for vulnerable software is being publicly disclosed more frequently than it was in the past.

According to IBM, 95% of all browser-related online exploits occurred within 24 hours of official vulnerability disclosure. Though some researchers differ on the matter, IBM ISS says it does not favour publishing exploit code for discovered vulnerabilities because it can accelerate criminal activity.

Perhaps the only good news to be found in security in the first half of this year, according to both IBM and Websense, is that image spam, a huge problem last year, has declined significantly and the size of spam email has gone down.

"It appears the filters are working," Cross says, noting that about 90% of spam is now URL spam, forcing spammers "to go back to basics."

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags social networkingopen source softwareSecurity ID

Show Comments