AAU Student Projects - visit Aalborg University's student projects portal
A master's thesis from Aalborg University
Book cover


THAPS: Detection of Web Application Vulnerabilities

Authors

;

Term

4. term

Education

Publication year

2012

Submitted on

Pages

41

Abstract

THAPS er et værktøj, der scanner PHP-baserede webapplikationer for sårbarheder. Det introducerer to nye måder at analysere webapplikationer på: det udvider statisk analyse med en modelanalyse, og det kombinerer statisk analyse med dynamisk analyse. Statisk analyse gennemgår kildekoden uden at køre den. En modelbaseret udvidelse hjælper THAPS med at forstå modulære systemer som WordPress og TYPO3, så det kan analysere deres plugins og udvidelser uden at skulle undersøge hele kernesystemet. Dynamisk analyse observerer programmet, mens det kører. Ved at kombinere de to metoder kan THAPS håndtere specialbyggede applikationer med få indgangspunkter ved at opdele koden i mindre dele og stadig levere brugbare resultater. Det gør det også nemmere at analysere nytilføjede funktioner. Med disse tilgange bekræftede projektet 30 nye sårbarheder: 29 i WordPress-moduler og én i en TYPO3-kerneudvidelse. Værktøjet blev derudover brugt til at identificere 33 sårbarheder i en nystartet virksomheds webapplikation.

THAPS is a tool that scans PHP-based web applications for security vulnerabilities. It introduces two new ways to analyze web applications: it extends static analysis with a model-based analysis, and it combines static analysis with dynamic analysis. Static analysis examines the source code without running it. A model-based extension helps THAPS understand modular systems like WordPress and TYPO3, so it can analyze their plugins and extensions without inspecting the entire core system. Dynamic analysis observes the program while it runs. By combining the two methods, THAPS can handle custom-built applications with only a few entry points by breaking the code into smaller parts and still producing useful results. This also makes it easier to analyze newly added features. Using these approaches, the project confirmed 30 new vulnerabilities: 29 in WordPress modules and one in a core TYPO3 extension. The tool was also used to identify 33 vulnerabilities in a newly established company’s web application.

[This abstract was generated with the help of AI]