SlideShare a Scribd company logo
5
Most read
8
Most read
9
Most read
The open source vulnerability scanner
Expectations.
u History of Dependency Check
u Importance of Dependency Check.
u Why to care about the Dependencies which we use in our daily coding.
u To understand what is Dependency Checker by
u Supported Languages/tech.
u Relation to OWASP top 10.
u Reviewing How it works.
u Vulnerability Data Source.
u Library Identification and issues.
u Evidence based identification, issues and Remediation.
u Using Dependency Check.
u Components of Dependency Check.
u Use Cases of Dependency Check.
u Enterprise Deployments.
u How to read the reports.
u Demo.
History of Dependency Check
u Dependency-Check is developed by a team of volunteers. The primary
contributors to date have been:
u Jeremy Long
u Steve Springett
u Will Stranathan
Relation to OWASP top 10.
u Most critical web application risks
u A9 – Using components with known vulnerabilities
u Prevalence: Widespread
u Detectability: Difficult
u Difficult for 3 reasons
u Awareness
u Visibility
u Lack of tooling in 2012/2013
Importance of Dependency Check
u CVE-2018-2815 – JAVA SE DOS via Serialization.
u CVE-2016-5000 - Apache POI Information Disclosure via External Entity
Expansion (XXE)
u CVE-2016-4216 - Adobe XMP Toolkit for Java Information Disclosure via
External Entity Expansion (XXE)
u CVE-2016-3081 - Remote code execution vulnerability in Apache Struts when
dynamic method invocation is enabled
u CVE-2015-8103 - Remote code execution vulnerability in Jenkins remoting;
related to the Apache commons-collections
u 95% of applications include open source
u 67% of applications contained open source vulnerabilities
u Average age of open source vulnerability identified: 1,894 days
Patching Programs
u Generally do not cover application dependencies
u Lack of awareness of 3rd party or FOSS application dependencies
u Patching teams cannot push patches
u Patching application dependencies requires
u Possible code changes
u Full regression testing
Supported Languages/tech.
u Fully supported: Java & .NET
u Experimental Analyzers:
u CocoaPods
u Swift Package Manager
u Python
u PHP (composer)
u Node.js
u Ruby
Components of Dependency Check
How it works.
u National Vulnerability Database (NVD)
u https://nvd.nist.gov
u Contains a listing of Common Vulnerability and Exposures (CVE)
u Each CVE entry contains
u A description of the vulnerability or exposure
u A Common Vulnerability Scoring System (CVSS) score
u A list of the affected platforms identified by their Common Platform Enumeration
(CPE)
Vulnerability Data Source.
Steps to run
u Extract the bat file obtained from link.
u Go to bin.
u Execute the command :
Dependency.bat --format <HTML or PDF> --out “<Location for extracting report>” --scan
“<location of jar/dependent files>” --project <name of report.>
e.g.
Dependency.bat --format HTML --out “C:UsersAdministratorDesktopSecurity Testing” --scan
“C:UsersAdministratorDesktopSecurity Testing*.*” --project SecurityScannerToolCommand
How to read the reports.
Evidence based identification, issues
and Remediation.
u Identification :
u Evidence is extracted from dependencies
u File name, manifest, POM, package names, etc.
u Evidence is grouped into Vendor, Product, and Version collections
u Local copy of the NVD CVE is maintained
u Lucene Index of the CPE information is created
u Evidence collected is used to search the index and identify the library by CPE
Evidence based identification, issues
and Remediation.
u Issues :
u False Positives
u Evidence extracted may cause incorrect identification
u False Negatives
u If key elements are not included in the dependency (e.g. jar,
dll) the library will not be identified and may result in un-
reported risk
Library Identification and issues.
u Identification :
Reporting on known/published vulnerabilities requires the correct identification of the libraries used
u Issues :
u Development & Security use different identifiers
u Development (GAV coordinates):
u org.springframework:spring-core:3.2.0.RELEASE
u Security uses Common Platform Enumeration (CPE):
u cpe:/a:springsource:spring_framework:3.2.0
u cpe:/a:pivotal:spring_framework:3.2.0
u cpe:/a:pivotal_software:spring_framework:3.2.0
u No publicly available database exists to map between the two
Dealing with False Positives
u Invalid dependency identification can be resolved using a suppression file:
<suppress>
<notes><![CDATA[
This suppresses false positives identified on spring security.
]]></notes>
<gav regex="true">org.springframework.security:spring.*</gav>
<cpe>cpe:/a:mod_security:mod_security</cpe>
<cpe>cpe:/a:springsource:spring_framework</cpe>
<cpe>cpe:/a:vmware:springsource_spring_framework</cpe>
</suppress>
Enterprise Deployments.
u Use a centralized database to maintain the local copy of the NVD
u Single instance of dependency-check used to update
u Scanning instances do not need to update
u Use an internal Nexus instead of Maven Central
u Run dependency-check within their CI
u Continuous monitoring/reporting using OWASP dependency-check sonar plugin,
OWASP dependency-track, or ThreadFix
Use Cases for dependency-check
u Prove the existence of the problem
u Baseline test when conducting POCs with commercial solutions
u OWASP dependency-check is used as the primary tool to identify known
vulnerable components
DEMO
Questions?
OWASP dependency-check
Appendix
Getting Involved
u Involvement in the development and promotion of dependency-check is actively
encouraged! You do not have to be a security expert in order to contribute. How you can
help:
• Use the tool
• Provide feedback via the mailing list or by creating github issues (both bugs and feature
requests are encouraged)
• The project source code is hosted on github - if you are so inclined fork it and provide
push requests!
References:-
u https://www.owasp.org/index.php/OWASP_Dependency_Check
u https://medium.com/@PrakhashS/checking-vulnerabilities-in-3rd-party-
dependencies-using-owasp-dependency-check-plugin-in-jenkins-bedfe8de6ba8
u https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Check+Plugin
u OWASP dependency-check
u http://jeremylong.github.io/DependencyCheck/
u OWASP dependency-track
u https://github.com/stevespringett/dependency-track
u OWASP dependency-check-sonar-plugin
u https://github.com/stevespringett/dependency-check-sonar-plugin

More Related Content

What's hot (20)

PDF
Introduction to Nexus Repository Manager.pdf
Knoldus Inc.
 
PPTX
Introduction to Maven
Onkar Deshpande
 
PDF
What is Jenkins | Jenkins Tutorial for Beginners | Edureka
Edureka!
 
PDF
Introduction to Docker Compose
Ajeet Singh Raina
 
PPTX
Secure your app with keycloak
Guy Marom
 
PPTX
Docker 基礎介紹與實戰
Bo-Yi Wu
 
PPTX
Docker 101 - High level introduction to docker
Dr Ganesh Iyer
 
PPTX
Static code analysis with sonar qube
Hayi Nukman
 
PDF
Secure Your Code Implement DevSecOps in Azure
kloia
 
PDF
Docker compose
Felipe Ruhland
 
PPTX
Introduction to jenkins
Abe Diaz
 
PDF
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
 
PDF
Jenkins with SonarQube
Somkiat Puisungnoen
 
PPT
presentation on Docker
Virendra Ruhela
 
PPTX
How to Get Started with DevSecOps
CYBRIC
 
PPTX
Jenkins CI
Viyaan Jhiingade
 
PPTX
Jenkins tutorial
Mamun Rashid, CCDH
 
PDF
Microservices Design Patterns
Haim Michael
 
PDF
Slide DevSecOps Microservices
Hendri Karisma
 
Introduction to Nexus Repository Manager.pdf
Knoldus Inc.
 
Introduction to Maven
Onkar Deshpande
 
What is Jenkins | Jenkins Tutorial for Beginners | Edureka
Edureka!
 
Introduction to Docker Compose
Ajeet Singh Raina
 
Secure your app with keycloak
Guy Marom
 
Docker 基礎介紹與實戰
Bo-Yi Wu
 
Docker 101 - High level introduction to docker
Dr Ganesh Iyer
 
Static code analysis with sonar qube
Hayi Nukman
 
Secure Your Code Implement DevSecOps in Azure
kloia
 
Docker compose
Felipe Ruhland
 
Introduction to jenkins
Abe Diaz
 
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
 
Jenkins with SonarQube
Somkiat Puisungnoen
 
presentation on Docker
Virendra Ruhela
 
How to Get Started with DevSecOps
CYBRIC
 
Jenkins CI
Viyaan Jhiingade
 
Jenkins tutorial
Mamun Rashid, CCDH
 
Microservices Design Patterns
Haim Michael
 
Slide DevSecOps Microservices
Hendri Karisma
 

Similar to OWASP - Dependency Check (20)

PPTX
dependency-check is ppt from owasp to test dependecies
AshishKandari9
 
PPTX
Managing Security in External Software Dependencies
Tharindu Edirisinghe
 
PPTX
Managing Security in External Software Dependencies
thariyarox
 
PPTX
Dependency check
David Karlsen
 
PDF
Secure Software Development with 3rd Party Dependencies
thariyarox
 
PPTX
Dependency-Check Ecosystem - OWASP Summit 2017
Steve Springett
 
PPTX
Software Composition Analysis Deep Dive
Ulisses Albuquerque
 
PPT
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
Steve Poole
 
PPTX
Geecon 2017 Anatomy of Java Vulnerabilities
Steve Poole
 
PDF
SFScon 2020 - Ivan Pashchenko - Learning from Developers How to Make Dependen...
South Tyrol Free Software Conference
 
PPTX
[OWASP Poland Day] Application frameworks' vulnerabilities
OWASP
 
ODP
Tracking vulnerable JARs
David Jorm
 
PPTX
BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat Security Conference
 
PDF
Stranger Danger: Your Java Attack Surface Just Got Bigger | JBCNConf 2022
Brian Vermeer
 
PDF
FOSDEM 2020 Presentation: Comparing dependency management issues across packa...
Fasten Project
 
PDF
Say No To Dependency Hell
Nicola Pedot
 
PDF
Infiltrating the Supply Chain Attack: Advanced Payload Delivery and Evasion T...
null - The Open Security Community
 
PDF
Donu’t Let Vulnerabilities Create a Hole in Your Organization
DevOps.com
 
PDF
Aliens in Your Apps!
All Things Open
 
PPTX
Is my software ecosystem healthy? It depends!
Tom Mens
 
dependency-check is ppt from owasp to test dependecies
AshishKandari9
 
Managing Security in External Software Dependencies
Tharindu Edirisinghe
 
Managing Security in External Software Dependencies
thariyarox
 
Dependency check
David Karlsen
 
Secure Software Development with 3rd Party Dependencies
thariyarox
 
Dependency-Check Ecosystem - OWASP Summit 2017
Steve Springett
 
Software Composition Analysis Deep Dive
Ulisses Albuquerque
 
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
Steve Poole
 
Geecon 2017 Anatomy of Java Vulnerabilities
Steve Poole
 
SFScon 2020 - Ivan Pashchenko - Learning from Developers How to Make Dependen...
South Tyrol Free Software Conference
 
[OWASP Poland Day] Application frameworks' vulnerabilities
OWASP
 
Tracking vulnerable JARs
David Jorm
 
BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat Security Conference
 
Stranger Danger: Your Java Attack Surface Just Got Bigger | JBCNConf 2022
Brian Vermeer
 
FOSDEM 2020 Presentation: Comparing dependency management issues across packa...
Fasten Project
 
Say No To Dependency Hell
Nicola Pedot
 
Infiltrating the Supply Chain Attack: Advanced Payload Delivery and Evasion T...
null - The Open Security Community
 
Donu’t Let Vulnerabilities Create a Hole in Your Organization
DevOps.com
 
Aliens in Your Apps!
All Things Open
 
Is my software ecosystem healthy? It depends!
Tom Mens
 
Ad

More from Vandana Verma (18)

PDF
Building security into the pipelines
Vandana Verma
 
PPTX
Applying OWASP web security testing guide (OWSTG)
Vandana Verma
 
PDF
Running an app sec program with OWASP projects_ Defcon AppSec Village
Vandana Verma
 
PDF
SARCON Talk - Vandana Verma Sehgal
Vandana Verma
 
PDF
Sacon 2020 living in the world of zero trust v1.0
Vandana Verma
 
PDF
Addo 2019 vandana_dev_secops_culturalchange
Vandana Verma
 
PDF
App Sec village DevSecOps as a culture
Vandana Verma
 
PPTX
Oscp - Journey
Vandana Verma
 
PPTX
Web sockets - Pentesting
Vandana Verma
 
PPTX
Story of http headers
Vandana Verma
 
PPTX
Security audits & compliance
Vandana Verma
 
PPTX
Basics of Server Side Template Injection
Vandana Verma
 
PPTX
SIEM Vendor Neutrality
Vandana Verma
 
PPTX
Getting started with android
Vandana Verma
 
PPTX
Importance of Penetration Testing
Vandana Verma
 
PPTX
Identity & access management
Vandana Verma
 
PPTX
Chariot generic presentation owaspwia_Infosecgirls
Vandana Verma
 
PDF
Incident response in Cloud
Vandana Verma
 
Building security into the pipelines
Vandana Verma
 
Applying OWASP web security testing guide (OWSTG)
Vandana Verma
 
Running an app sec program with OWASP projects_ Defcon AppSec Village
Vandana Verma
 
SARCON Talk - Vandana Verma Sehgal
Vandana Verma
 
Sacon 2020 living in the world of zero trust v1.0
Vandana Verma
 
Addo 2019 vandana_dev_secops_culturalchange
Vandana Verma
 
App Sec village DevSecOps as a culture
Vandana Verma
 
Oscp - Journey
Vandana Verma
 
Web sockets - Pentesting
Vandana Verma
 
Story of http headers
Vandana Verma
 
Security audits & compliance
Vandana Verma
 
Basics of Server Side Template Injection
Vandana Verma
 
SIEM Vendor Neutrality
Vandana Verma
 
Getting started with android
Vandana Verma
 
Importance of Penetration Testing
Vandana Verma
 
Identity & access management
Vandana Verma
 
Chariot generic presentation owaspwia_Infosecgirls
Vandana Verma
 
Incident response in Cloud
Vandana Verma
 
Ad

Recently uploaded (20)

PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Biography of Daniel Podor.pdf
Daniel Podor
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Biography of Daniel Podor.pdf
Daniel Podor
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 

OWASP - Dependency Check

  • 1. The open source vulnerability scanner
  • 2. Expectations. u History of Dependency Check u Importance of Dependency Check. u Why to care about the Dependencies which we use in our daily coding. u To understand what is Dependency Checker by u Supported Languages/tech. u Relation to OWASP top 10. u Reviewing How it works. u Vulnerability Data Source. u Library Identification and issues. u Evidence based identification, issues and Remediation. u Using Dependency Check. u Components of Dependency Check. u Use Cases of Dependency Check. u Enterprise Deployments. u How to read the reports. u Demo.
  • 3. History of Dependency Check u Dependency-Check is developed by a team of volunteers. The primary contributors to date have been: u Jeremy Long u Steve Springett u Will Stranathan
  • 4. Relation to OWASP top 10. u Most critical web application risks u A9 – Using components with known vulnerabilities u Prevalence: Widespread u Detectability: Difficult u Difficult for 3 reasons u Awareness u Visibility u Lack of tooling in 2012/2013
  • 5. Importance of Dependency Check u CVE-2018-2815 – JAVA SE DOS via Serialization. u CVE-2016-5000 - Apache POI Information Disclosure via External Entity Expansion (XXE) u CVE-2016-4216 - Adobe XMP Toolkit for Java Information Disclosure via External Entity Expansion (XXE) u CVE-2016-3081 - Remote code execution vulnerability in Apache Struts when dynamic method invocation is enabled u CVE-2015-8103 - Remote code execution vulnerability in Jenkins remoting; related to the Apache commons-collections u 95% of applications include open source u 67% of applications contained open source vulnerabilities u Average age of open source vulnerability identified: 1,894 days
  • 6. Patching Programs u Generally do not cover application dependencies u Lack of awareness of 3rd party or FOSS application dependencies u Patching teams cannot push patches u Patching application dependencies requires u Possible code changes u Full regression testing
  • 7. Supported Languages/tech. u Fully supported: Java & .NET u Experimental Analyzers: u CocoaPods u Swift Package Manager u Python u PHP (composer) u Node.js u Ruby
  • 9. How it works. u National Vulnerability Database (NVD) u https://nvd.nist.gov u Contains a listing of Common Vulnerability and Exposures (CVE) u Each CVE entry contains u A description of the vulnerability or exposure u A Common Vulnerability Scoring System (CVSS) score u A list of the affected platforms identified by their Common Platform Enumeration (CPE) Vulnerability Data Source.
  • 10. Steps to run u Extract the bat file obtained from link. u Go to bin. u Execute the command : Dependency.bat --format <HTML or PDF> --out “<Location for extracting report>” --scan “<location of jar/dependent files>” --project <name of report.> e.g. Dependency.bat --format HTML --out “C:UsersAdministratorDesktopSecurity Testing” --scan “C:UsersAdministratorDesktopSecurity Testing*.*” --project SecurityScannerToolCommand
  • 11. How to read the reports.
  • 12. Evidence based identification, issues and Remediation. u Identification : u Evidence is extracted from dependencies u File name, manifest, POM, package names, etc. u Evidence is grouped into Vendor, Product, and Version collections u Local copy of the NVD CVE is maintained u Lucene Index of the CPE information is created u Evidence collected is used to search the index and identify the library by CPE
  • 13. Evidence based identification, issues and Remediation. u Issues : u False Positives u Evidence extracted may cause incorrect identification u False Negatives u If key elements are not included in the dependency (e.g. jar, dll) the library will not be identified and may result in un- reported risk
  • 14. Library Identification and issues. u Identification : Reporting on known/published vulnerabilities requires the correct identification of the libraries used u Issues : u Development & Security use different identifiers u Development (GAV coordinates): u org.springframework:spring-core:3.2.0.RELEASE u Security uses Common Platform Enumeration (CPE): u cpe:/a:springsource:spring_framework:3.2.0 u cpe:/a:pivotal:spring_framework:3.2.0 u cpe:/a:pivotal_software:spring_framework:3.2.0 u No publicly available database exists to map between the two
  • 15. Dealing with False Positives u Invalid dependency identification can be resolved using a suppression file: <suppress> <notes><![CDATA[ This suppresses false positives identified on spring security. ]]></notes> <gav regex="true">org.springframework.security:spring.*</gav> <cpe>cpe:/a:mod_security:mod_security</cpe> <cpe>cpe:/a:springsource:spring_framework</cpe> <cpe>cpe:/a:vmware:springsource_spring_framework</cpe> </suppress>
  • 16. Enterprise Deployments. u Use a centralized database to maintain the local copy of the NVD u Single instance of dependency-check used to update u Scanning instances do not need to update u Use an internal Nexus instead of Maven Central u Run dependency-check within their CI u Continuous monitoring/reporting using OWASP dependency-check sonar plugin, OWASP dependency-track, or ThreadFix
  • 17. Use Cases for dependency-check u Prove the existence of the problem u Baseline test when conducting POCs with commercial solutions u OWASP dependency-check is used as the primary tool to identify known vulnerable components
  • 18. DEMO
  • 21. Getting Involved u Involvement in the development and promotion of dependency-check is actively encouraged! You do not have to be a security expert in order to contribute. How you can help: • Use the tool • Provide feedback via the mailing list or by creating github issues (both bugs and feature requests are encouraged) • The project source code is hosted on github - if you are so inclined fork it and provide push requests!
  • 22. References:- u https://www.owasp.org/index.php/OWASP_Dependency_Check u https://medium.com/@PrakhashS/checking-vulnerabilities-in-3rd-party- dependencies-using-owasp-dependency-check-plugin-in-jenkins-bedfe8de6ba8 u https://wiki.jenkins.io/display/JENKINS/OWASP+Dependency-Check+Plugin u OWASP dependency-check u http://jeremylong.github.io/DependencyCheck/ u OWASP dependency-track u https://github.com/stevespringett/dependency-track u OWASP dependency-check-sonar-plugin u https://github.com/stevespringett/dependency-check-sonar-plugin