This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP WAP-Web Application Protection"
(→News and Events) |
(→News and Events) |
||
Line 104: | Line 104: | ||
--> | --> | ||
[https://www.facebook.com/semanadascienciasetecnologiasaaue/photos/pb.701934916585847.-2207520000.1430093295./720636151382390/?type=3&theater WAP in 4th SCT of University of Évora by Miguel Correia]<br/> | [https://www.facebook.com/semanadascienciasetecnologiasaaue/photos/pb.701934916585847.-2207520000.1430093295./720636151382390/?type=3&theater WAP in 4th SCT of University of Évora by Miguel Correia]<br/> | ||
− | [https:// | + | [https://paris-isp.uni.lu WAP in ParIS - ISP at University of Luxembourg, by Ibéria Medeiros]<br/> |
<!-- | <!-- | ||
Cyber-attacks againts PHP Web Applications and How avoid them with the WAP tool | Cyber-attacks againts PHP Web Applications and How avoid them with the WAP tool |
Revision as of 00:31, 27 April 2015
OWASP WAP - Web Application Protection ProjectWAP is a tool to detect and correct input validation vulnerabilities in web applications written in PHP and predicts false positives. The tool combines source code static analysis and data mining to detect vulnerabilities and predict false positives. Then, corrects the source code to remove the real vulnerabilities inserting fixes (small functions) in the right places of the source e code. Introduction
DescriptionWAP is a source code static analysis and data mining tool to detect and correct input validation vulnerabilities in web applications written in PHP (version 4.0 or higher) with a low rate of false positives. WAP detects and corrects the following vulnerabilities:
This tool semantically analyses the source code. More precisely, it does taint analysis (data-flow analysis) to detect the input validation vulnerabilities. The aim of the taint analysis is to track malicious inputs inserted by entry points ($_GET, $_POST arrays) and to verify if they reach some sensitive sink (PHP functions that can be exploited by malicious input, such as mysql_query). After the detection, the tool uses data mining to confirm if the vulnerabilities are real or false positives. At the end, the real vulnerabilities are corrected by the insertion of the fixes (small pieces of code) in the source code.
LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. |
Project ResourcesProject LeaderRelated ProjectsClassifications
|
News and EventsWAP in 4th SCT of University of Évora by Miguel Correia None, for now... ContributorsOWASP WAP - Web Application Protection is brought to you by OWASP, a free and open software security community focusing on improving the security of software. Our goal with OWASP WAP project is to build secure software, by the detection of web application vulnerabilities and removing of them by the correction of web application source code.
VolunteersThe project is free and open source, and if you want to join to the development team, please contact the project leader by sending her an email. AcknowledgementsWe would like to thank the following people and organizations for their support:
The main goals are:
1. Build a PHP parser to create an abstract syntax tree (AST). These two phases can be improved by implementing the new characteristics of the PHP language, such as of object oriented.
Getting InvolvedInvolvement in the development and promotion of OWASP WAP is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
CodingYou can also help if you wish to extend the WAP tool with a new module or even improving some part(s) of it.
FeedbackFeedback should be sent to the project leader by sending her an email. The delivery of the project is a zip or tar.gz file containing:
The requirements to run the tool are only the JRE (Java Runtime Enviroment), which can be downloaded at http://www.oracle.com. No installation required.
|