Web application vulnerability detection method, device, system, storage medium and server

A vulnerability detection and web application technology, applied in the field of information security, can solve the problems of low detection efficiency, high cost and low accuracy, and achieve the effect of reducing manpower, improving accuracy and efficiency, and reducing costs

Active Publication Date: 2021-06-08
SECZONE TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a web application vulnerability detection method, device, system, storage medium, and server to solve the problem of low accuracy and low detection efficiency of web application vulnerability detection in a distributed microservice architecture in the prior art and high cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web application vulnerability detection method, device, system, storage medium and server
  • Web application vulnerability detection method, device, system, storage medium and server
  • Web application vulnerability detection method, device, system, storage medium and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0032] figure 1 A system architecture diagram of a web application vulnerability detection system provided by the first embodiment of the present invention is shown, and details are as follows: For convenience of description, only parts related to the embodiment of the present invention are shown.

[0033] The web application vulnerabili...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a web application vulnerability detection method, device, system, storage medium and server, comprising: the first server obtains the data sent by the second server; judges whether there is tainted data in the data sent by the second server, and the The tainted data refers to data originating from the front-end browser; if there is tainted data in the data sent by the second server, a second data tracking process is initiated, and the second data tracking process is used in the first server track the tainted data, and monitor whether the tainted data is invoked; if a calling instruction of the tainted data is monitored, then perform vulnerability detection before the tainted data is invoked. The invention can accurately locate the real source of the data where the problem occurs, thereby improving the accuracy and efficiency of web application loophole detection, and at the same time, the automatic loophole detection reduces manpower and cost.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a web application vulnerability detection method, device, system, storage medium and server. Background technique [0002] Due to the evolution of requirements and technologies, the current large-scale Internet architecture often adopts a distributed architecture. Unlike the previous SOA distributed service architecture, the existing distributed services are more detailed. Microservice applications represented by SpringCloud+Docker technology often It consists of hundreds or even thousands of microservices. These microservices are not directly exposed to the client, and because each microservice has different functions, its calling relationship is also different. [0003] It is precisely because of the particularity of this microservice architecture that traditional vulnerability detection tools cannot guarantee the vulnerability detection rate of these arch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/57
CPCG06F21/577H04L63/1433H04L63/30
Inventor 潘志祥万振华王颉李绪勤
Owner SECZONE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products