This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP LAPSE Project"

From OWASP
Jump to: navigation, search
 
(11 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 
=Main=
 
=Main=
  
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
+
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE -->
 
+
<div style="width:100%;height:100px;border:0,margin:0;overflow: hidden;">[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] </div>
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
 
  
 
==OWASP Lapse Project==
 
==OWASP Lapse Project==
 
+
[[Image:LapseLogo.png|300px|left]]
The OWASP Lapse Project is...
+
The OWASP Lapse Project is '''LAPSE+: The Security Scanner for Java EE Applications'''.
 +
'''OWASP LAPSE Project''' is an initiative to make available to developers and auditors a tool for detecting vulnerabilities in Java EE Applications. The project aims to put at their disposal a tool based on the static analysis of code, due to the importance and difficulty of this type of analysis to detect security flaws in Java EE Applications. The difficulty of this analysis increases when they face applications consisting of thousands of lines of code or having a complex structure with many Java classes. Hence, OWASP LAPSE Project offers a tool that helps the developer and auditor to carry out the static analysis of code in the most effective and efficient way. The tool that is provided and gives the name to the project is LAPSE+.
  
 
==Introduction==
 
==Introduction==
  
Write a short introduction
+
'''LAPSE+''' is a security scanner for detecting vulnerabilities of untrusted data injection in Java EE Applications. It has been developed as a plugin for Eclipse Java Development Environment, working specifically with Eclipse Helios and Java 1.6 or higher. LAPSE+ is based on the GPL software LAPSE, developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project]. This new release of the plugin developed by [http://www.evalues.es/index.php/en.html Evalues Lab] of [http://www.uc3m.es Universidad Carlos III de Madrid] provides more features to analyze the propagation of the malicious data through the application and includes the identification of new vulnerabilities.
  
 +
'''LAPSE+''' is based on the static analysis of code to detect the source and the sink of a vulnerability. The source of a vulnerability refers to the injection of untrusted data, e.g. in the parameters of an HTTP request or a Cookie. The sink of a vulnerability refers to the process of data modification to manipulate the behaviour of the application, such as a servlet response or a HTML page. The vulnerability sources can lead to sinks by simple assignments, method calls or parameters passing. When it is possible to reach a vulnerability sink from a vulnerability source then we have a vulnerability in our application.
  
  
 
==Description==
 
==Description==
  
Write a description that is just a few paragraphs long
+
[[Image:LapsePlusScreenshot.png|thumb|300px|right|LAPSE+ in action (click to see a bigger image)]]
 +
 
 +
'''The vulnerabilities detected by LAPSE+''' are related to the injection of untrusted data to manipulate the behavior of the application. This type of vulnerabilities are the most common in web applications. The vulnerability categories detected by LAPSE+ are enumerated below:
 +
 
 +
* Parameter Tampering.
 +
* URL Tampering.
 +
* Header Manipulation.
 +
* Cookie Poisoning.
 +
* SQL Injection.
 +
* Cross-site Scripting (XSS).
 +
* HTTP Response Splitting.
 +
* Command Injection.
 +
* Path Traversal.
 +
* XPath Injection.
 +
* XML Injection.
 +
* LDAP Injection.
 +
 
 +
'''Three steps are needed in LAPSE+''' for the detection of this kind of vulnerabilities:
 +
 
 +
* '''Vulnerability Source.''' The first step involves the detection of the points of code that can be source of an attack of untrusted data injection.
 +
* '''Vulnerability Sink.''' After detecting the points of code that can be target of data injection, LAPSE+ identifies the points that can propagate the attack and manipulate the behaviour of the application.
 +
* '''Provenance Tracker.''' Finally, we check if it is ''possible to reach a Vulnerability Source from a Vulnerability Sink'' performing the backward propagation through the different assignations. If this occurs, ''we have a security vulnerability'' in our code.
  
  
 
==Licensing==
 
==Licensing==
The OWASP Lapse Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
+
The OWASP Lapse Project is free to use. It is licensed under the GNU General Public License version 3.0 (GPLv3).
  
  
Line 31: Line 52:
 
The OWASP Lapse Project provides:
 
The OWASP Lapse Project provides:
  
* xxx
+
* Static Analysis (code analysis) for Java EE Applications
* xxx
 
 
 
 
 
== Presentation ==
 
 
 
Link to presentation
 
 
 
 
 
  
 +
== Code ==
 +
LAPSE+ on Google Code [https://code.google.com/p/lapse-plus/ https://code.google.com/p/lapse-plus/].
  
 
== Project Leader ==
 
== Project Leader ==
  
 
Gregory Disney-Leugers
 
Gregory Disney-Leugers
 
  
 
== Related Projects ==
 
== Related Projects ==
Line 51: Line 65:
 
* [[OWASP_CISO_Survey]]
 
* [[OWASP_CISO_Survey]]
  
 
+
| valign="top"  style="padding-left:25px;width:200px;" |
 
 
| valign="top"  style="padding-left:25px;width:200px;" |  
 
  
 
== Quick Download ==
 
== Quick Download ==
  
* Link to page/download
+
* LAPSE+ can be downloaded at http://evalues.es/?q=node/14
  
  
  
 
== News and Events ==
 
== News and Events ==
* [20 Nov 2013] News 2
+
* 2/16/2014 - Gregory Disney-Leugers adopts the OWASP LAPSE Project
* [30 Sep 2013] News 1
+
* 4/15/2011 - [http://evalues.es/?q=node/14 LAPSE+] released.
 +
* 8/23/2006 - [http://suif.stanford.edu/~livshits/work/lapse/download.html LAPSE 2.5.5] released.
 +
* 8/22/2006 - OWASP LAPSE Project Created.
  
  
Line 88: Line 102:
 
=FAQs=
 
=FAQs=
  
; Q1
+
; Q1: What should you do to avoid these vulnerabilities in your code?'' - ''How do we protect Web applications from exploits?
: A1
+
: A1: The proper way to deal with these types of attacks is by '''sanitizing the tainted input.''' Please refer to the [http://www.owasp.org/index.php/OWASP_Guide_Project#tab=Home OWASP Guide] to find out more about Web Application Security.''
 +
 
 +
LAPSE+ is inspired by existing lightweight security auditing tools such as [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike this tool, however, LAPSE+ addresses vulnerabilities in Web Applications. LAPSE+ is not intended as a comprehensive solution for Web Application Security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Ounce Labs.
  
 
; Q2
 
; Q2
Line 106: Line 122:
 
= Road Map and Getting Involved =
 
= Road Map and Getting Involved =
 
As of February 2014, the priorities are:
 
As of February 2014, the priorities are:
* xxx
+
* We hope you find the OWASP LAPSE Project useful. Please contribute to the Project by volunteering for one of the Tasks, sending your comments, questions, and suggestions to [email protected].  To join the OWASP LAPSE Project mailing list or view the archives, please visit the [https://lists.owasp.org/mailman/listinfo/owasp-lapse subscription page.]
* xxx
 
* xxx
 
  
 
Involvement in the development and promotion of OWASP Lapse Project is actively encouraged!
 
Involvement in the development and promotion of OWASP Lapse Project is actively encouraged!
Line 115: Line 129:
 
* xxx
 
* xxx
 
* xxx
 
* xxx
 +
  
  
Line 123: Line 138:
 
__NOTOC__ <headertabs />  
 
__NOTOC__ <headertabs />  
  
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]
+
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]][[Category:SAMM-CR-2]]
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
==== Main  ====
 
'''LAPSE+: The Security Scanner for Java EE Applications'''
 
 
 
== News ==
 
* 4/15/2011 - [http://evalues.es/?q=node/14 LAPSE+] released.
 
* 8/23/2006 - [http://suif.stanford.edu/~livshits/work/lapse/download.html LAPSE 2.5.5] released.
 
* 8/22/2006 - OWASP LAPSE Project Created.
 
 
 
== Overview ==
 
[[Image:LapseLogo.png|300px|left]]
 
'''OWASP LAPSE Project''' is an initiative to make available to developers and auditors a tool for detecting vulnerabilities in Java EE Applications. The project aims to put at their disposal a tool based on the static analysis of code, due to the importance and difficulty of this type of analysis to detect security flaws in Java EE Applications. The difficulty of this analysis increases when they face applications consisting of thousands of lines of code or having a complex structure with many Java classes. Hence, OWASP LAPSE Project offers a tool that helps the developer and auditor to carry out the static analysis of code in the most effective and efficient way. The tool that is provided and gives the name to the project is LAPSE+.
 
 
 
'''LAPSE+''' is a security scanner for detecting vulnerabilities of untrusted data injection in Java EE Applications. It has been developed as a plugin for Eclipse Java Development Environment, working specifically with Eclipse Helios and Java 1.6 or higher. LAPSE+ is based on the GPL software LAPSE, developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project]. This new release of the plugin developed by [http://www.evalues.es/index.php/en.html Evalues Lab] of [http://www.uc3m.es Universidad Carlos III de Madrid] provides more features to analyze the propagation of the malicious data through the application and includes the identification of new vulnerabilities.
 
 
 
'''LAPSE+''' is based on the static analysis of code to detect the source and the sink of a vulnerability. The source of a vulnerability refers to the injection of untrusted data, e.g. in the parameters of an HTTP request or a Cookie. The sink of a vulnerability refers to the process of data modification to manipulate the behaviour of the application, such as a servlet response or a HTML page. The vulnerability sources can lead to sinks by simple assignments, method calls or parameters passing. When it is possible to reach a vulnerability sink from a vulnerability source then we have a vulnerability in our application.
 
 
 
[[Image:LapsePlusScreenshot.png|thumb|300px|right|LAPSE+ in action (click to see a bigger image)]]
 
 
 
'''The vulnerabilities detected by LAPSE+''' are related to the injection of untrusted data to manipulate the behavior of the application. This type of vulnerabilities are the most common in web applications. The vulnerability categories detected by LAPSE+ are enumerated below:
 
 
 
* Parameter Tampering.
 
* URL Tampering.
 
* Header Manipulation.
 
* Cookie Poisoning.
 
* SQL Injection.
 
* Cross-site Scripting (XSS).
 
* HTTP Response Splitting.
 
* Command Injection.
 
* Path Traversal.
 
* XPath Injection.
 
* XML Injection.
 
* LDAP Injection.
 
 
 
'''Three steps are needed in LAPSE+''' for the detection of this kind of vulnerabilities:
 
 
 
* '''Vulnerability Source.''' The first step involves the detection of the points of code that can be source of an attack of untrusted data injection.
 
* '''Vulnerability Sink.''' After detecting the points of code that can be target of data injection, LAPSE+ identifies the points that can propagate the attack and manipulate the behaviour of the application.
 
* '''Provenance Tracker.''' Finally, we check if it is ''possible to reach a Vulnerability Source from a Vulnerability Sink'' performing the backward propagation through the different assignations. If this occurs, ''we have a security vulnerability'' in our code.
 
 
 
----
 
'''Question:''' ''What should you do to avoid these vulnerabilities in your code?'' - ''How do we protect Web applications from exploits?''
 
 
 
'''Answer:''' ''The proper way to deal with these types of attacks is by '''sanitizing the tainted input.''' Please refer to the [http://www.owasp.org/index.php/OWASP_Guide_Project#tab=Home OWASP Guide] to find out more about Web Application Security.''
 
 
 
LAPSE+ is inspired by existing lightweight security auditing tools such as [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike this tool, however, LAPSE+ addresses vulnerabilities in Web Applications. LAPSE+ is not intended as a comprehensive solution for Web Application Security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Ounce Labs.
 
 
 
== Download ==
 
 
 
LAPSE+ can be downloaded at http://evalues.es/?q=node/14
 
 
 
== Feedback and Participation: ==
 
 
 
We hope you find the OWASP LAPSE Project useful. Please contribute to the Project by volunteering for one of the Tasks, sending your comments, questions, and suggestions to [email protected].  To join the OWASP LAPSE Project mailing list or view the archives, please visit the [https://lists.owasp.org/mailman/listinfo/owasp-lapse subscription page.]
 
 
 
==== Project About ====
 
{{:Projects/OWASP LAPSE Project | Project About}}
 
 
 
[[Category:OWASP Project|LAPSE Project]]
 
[[Category:OWASP Download]]
 
[[Category:OWASP Tool]]
 
 
 
 
 
__NOTOC__ <headertabs />
 

Latest revision as of 17:12, 2 February 2017

OWASP Inactive Banner.jpg

OWASP Lapse Project

LapseLogo.png

The OWASP Lapse Project is LAPSE+: The Security Scanner for Java EE Applications. OWASP LAPSE Project is an initiative to make available to developers and auditors a tool for detecting vulnerabilities in Java EE Applications. The project aims to put at their disposal a tool based on the static analysis of code, due to the importance and difficulty of this type of analysis to detect security flaws in Java EE Applications. The difficulty of this analysis increases when they face applications consisting of thousands of lines of code or having a complex structure with many Java classes. Hence, OWASP LAPSE Project offers a tool that helps the developer and auditor to carry out the static analysis of code in the most effective and efficient way. The tool that is provided and gives the name to the project is LAPSE+.

Introduction

LAPSE+ is a security scanner for detecting vulnerabilities of untrusted data injection in Java EE Applications. It has been developed as a plugin for Eclipse Java Development Environment, working specifically with Eclipse Helios and Java 1.6 or higher. LAPSE+ is based on the GPL software LAPSE, developed by Benjamin Livshits as part of the Griffin Software Security Project. This new release of the plugin developed by Evalues Lab of Universidad Carlos III de Madrid provides more features to analyze the propagation of the malicious data through the application and includes the identification of new vulnerabilities.

LAPSE+ is based on the static analysis of code to detect the source and the sink of a vulnerability. The source of a vulnerability refers to the injection of untrusted data, e.g. in the parameters of an HTTP request or a Cookie. The sink of a vulnerability refers to the process of data modification to manipulate the behaviour of the application, such as a servlet response or a HTML page. The vulnerability sources can lead to sinks by simple assignments, method calls or parameters passing. When it is possible to reach a vulnerability sink from a vulnerability source then we have a vulnerability in our application.


Description

LAPSE+ in action (click to see a bigger image)

The vulnerabilities detected by LAPSE+ are related to the injection of untrusted data to manipulate the behavior of the application. This type of vulnerabilities are the most common in web applications. The vulnerability categories detected by LAPSE+ are enumerated below:

  • Parameter Tampering.
  • URL Tampering.
  • Header Manipulation.
  • Cookie Poisoning.
  • SQL Injection.
  • Cross-site Scripting (XSS).
  • HTTP Response Splitting.
  • Command Injection.
  • Path Traversal.
  • XPath Injection.
  • XML Injection.
  • LDAP Injection.

Three steps are needed in LAPSE+ for the detection of this kind of vulnerabilities:

  • Vulnerability Source. The first step involves the detection of the points of code that can be source of an attack of untrusted data injection.
  • Vulnerability Sink. After detecting the points of code that can be target of data injection, LAPSE+ identifies the points that can propagate the attack and manipulate the behaviour of the application.
  • Provenance Tracker. Finally, we check if it is possible to reach a Vulnerability Source from a Vulnerability Sink performing the backward propagation through the different assignations. If this occurs, we have a security vulnerability in our code.


Licensing

The OWASP Lapse Project is free to use. It is licensed under the GNU General Public License version 3.0 (GPLv3).


| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |

What is the OWASP Lapse Project?

The OWASP Lapse Project provides:

  • Static Analysis (code analysis) for Java EE Applications

Code

LAPSE+ on Google Code https://code.google.com/p/lapse-plus/.

Project Leader

Gregory Disney-Leugers

Related Projects

| valign="top" style="padding-left:25px;width:200px;" |

Quick Download


News and Events

  • 2/16/2014 - Gregory Disney-Leugers adopts the OWASP LAPSE Project
  • 4/15/2011 - LAPSE+ released.
  • 8/23/2006 - LAPSE 2.5.5 released.
  • 8/22/2006 - OWASP LAPSE Project Created.


In Print

This project can be purchased as a print on demand book from Lulu.com


Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files TOOL.jpg

|}

Q1
What should you do to avoid these vulnerabilities in your code? - How do we protect Web applications from exploits?
A1: The proper way to deal with these types of attacks is by sanitizing the tainted input. Please refer to the OWASP Guide to find out more about Web Application Security.

LAPSE+ is inspired by existing lightweight security auditing tools such as FlawFinder. Unlike this tool, however, LAPSE+ addresses vulnerabilities in Web Applications. LAPSE+ is not intended as a comprehensive solution for Web Application Security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Ounce Labs.

Q2
A2

Volunteers

The OWASP Lapse Project is developed by a worldwide team of volunteers. The primary contributors to date have been:

  • Gregory Disney-Leugers


Others

  • Pablo Martin Perez
  • Jose Maria Sierra

As of February 2014, the priorities are:

  • We hope you find the OWASP LAPSE Project useful. Please contribute to the Project by volunteering for one of the Tasks, sending your comments, questions, and suggestions to [email protected]. To join the OWASP LAPSE Project mailing list or view the archives, please visit the subscription page.

Involvement in the development and promotion of OWASP Lapse Project is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:

  • xxx
  • xxx



PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP LAPSE Project (home page)
Purpose: LAPSE stands for a Lightweight Analysis for Program Security in Eclipse. LAPSE is designed to help with the task of auditing Java EE Applications for common types of security vulnerabilities found in Web Applications. LAPSE was developed by Benjamin Livshits as part of the Griffin Software Security Project. The project's second push is being led by Pablo Martín Pérez, Evalues Lab ICT Security Researcher, developing LAPSE+, an enhanced version of LAPSE.
License: GNU General Public License v3
who is working on this project?
Project Leader(s):
  • Gregory Disney-Leugers @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Main links:
Key Contacts
  • Contact Gregory Disney-Leugers @ to contribute to this project
  • Contact Gregory Disney-Leugers @ to review or sponsor this project
current release
LapsePlus 2.8.1 - March 2011 - (download)
Release description: LAPSE+ is a security scanner for detecting vulnerabilities of untrusted data injection in Java EE Applications. It has been developed as a plugin for Eclipse Java Development Environment, working specifically with Eclipse Helios and Java 1.6 or higher. LAPSE+ is based on the GPL software LAPSE, developed by the SUIF Compiler Group of Stanford University. This new release of the plugin developed by Evalues Lab of Universidad Carlos III de Madrid provides more features to analyze the propagation of the malicious data through the application and includes the identification of new vulnerabilities.
Rating: Yellow button.JPG Not Reviewed - Assessment Details
last reviewed release
Not Yet Reviewed


other releases