What Are The Five Programming Languages With Hidden Flaws Vulnerable To Online Hackers?

in #technology7 years ago



BlogPostImage

Image Source

Creating a bug-free software program is pretty much difficult, because of the impracticality of forecasting each and every method in which program code could possibly be executed.

But regardless of whether programmers go far above in order to avoid imperfections that could be exploited by online hackers, attackers can frequently continue to make the most of vulnerabilities in the design of the actual programming language.

Revelation at Black Hat Europe Conference


BlogPostImage

Image Source

In the recent Black Hat Europe Conference, IOActive Security Services uncovered it had recognized flaws in various main, interpreted programming languages which can be made use of by online hackers in designing an attack.

“Regarding the interpreted programming languages vulnerabilities, computer software developers might unconsciously incorporate code inside a program which can be used in ways that the developer failed to anticipate,” it writes.

“A number of these actions present a security threat to programs which were safely designed in accordance with guidelines.”

Five Programming Languages With Flaws


These are the five programming languages as well as the problems that had been discovered:

1. Perl



BlogPostImage

Image Source

Well-known for web server scripting, sysadmin tasks, network programming and automating a variety of tasks, Perl has been used since the late 1980s.

IOActivehighlights the reality that Perl possesses a function which will make an attempt to perform one of several arguments transferred as Perl program code. It identifies the practice as a “concealed feature” inside a default Perl function for dealing with typemaps.

2. Python



BlogPostImage

Image Source

Presently enjoying a spike in consumption, Python is regularly made use of by website and desktop developers, system admin or developers, and a lot more lately by data scientists and machine-learning designers.

The IOActive document learned that Python consists of undocumented methods and local environment variables that you can use to execute operating-system instructions.

Both Python’s mimetools and pydoc libraries have undocumented methods that could be exploited in this manner, which IOActivev utilized to run Linux’ identification command.

3. NodeJS



BlogPostImage

Image Source

NodeJS offers a server-side environment for executing JavaScript, the language is popular for scripting in internet browsers.

IOActive discovered that NodeJS’ built-in problem messages for its required function could possibly be exploited to ascertain whether or not a file name existed on the machine as well as to drip the initial line of data files on the system – probably a beneficial details for an attacker.

4. PHP



BlogPostImage

Image Source

The venerable server scripting language was adopted to call an operating system command, again the Linux command identification while using _exec() function and through exploiting the way in which PHP manages the labels of constants.

“For the way the PHP software has been created, this could lead to remote command execution,” say experts.

Having said that, a lot of website admins have long recognized the possible threat posed by PHP’s shell_exec() function, and way to disable it.

5. JRuby



BlogPostImage

Image Source

The Java execution of the Ruby programming language was discovered to enable remote code execution in a manner that isn’t feasible in Ruby like a base language.

By calling executable Ruby program code by using a particular function in JRuby, IOActive managed to have the function to carry out an OS command, the Linux command identification, by unpacking a file on the remote server.

The Mighty Power of Differential Fuzzer



BlogPostImage

Image Source

Exploitable imperfections in every single programming language had been discovered employing a tool known as Differential Fuzzer, which had been built to instantly locate vulnerabilities. The fuzzer operates by operating by way of a huge assortment of circumstances in every single language, calling each one of the language’s native functions with a multitude of arguments and observing the outcomes.

Sort:  

The @OriginalWorks bot has determined this post by @ruelrevales to be original material and upvoted it!

ezgif.com-resize.gif

To call @OriginalWorks, simply reply to any post with @originalworks or !originalworks in your message!

It is especially if you're utilizing it in your business.

This is such an informative piece. I commend you!

My pleasure. ;)

Upvoted and reesteemed. :)

Done the same thing to your posts, thanks. ;)

But is Differential Fuzzer legit and reliable?

Based on the from the experts in the said conference, it is.

It is time to have an upgrade on our firm's systems.

Just making sure your safety is secured.

Will have a look on them if they do exist.

Mind giving me a note hereafter your research? ;)

The importance of attending some seminars.

I agree, it is a must especially if the track that you have chosen is technology.

Coin Marketplace

STEEM 0.19
TRX 0.18
JST 0.035
BTC 91087.60
ETH 3181.87
USDT 1.00
SBD 2.78