Solved

website app software security, opinions requested

Posted on 2011-02-15
4
443 Views
Last Modified: 2013-11-29
hello

we are evaluating a software package, and need to decide if we want to run it on our IIS7 server.  the application is a frontend for our backend database suite.

the software vendor has given us a link to their sandbox and asked us to check it out.  for me, at the helpdesk, i only really care about security and not so much about functionality.  so i'm hoping you guys could check it out (it's public) and offer your suggestions that pertain to vulnerabilities, etc.

the data in the sandbox is all fake, just place holders - and anyone can create any fake info (name, address, etc - create an account for yourselves).  the idea is this front end is customer facing, and random people will be using it to search our database and create accounts for themselves to upload their own resumes, and contain their own personal information which plugs to the backend (which is SQL)

the sandbox is the URL below - i'm intentionally not typing it directly as to be fair to the software vendor - if there are huge problems we'll get them fixed, but it wouldn't be fair for future google searchers to stumble upon this (assuming any problems exist and eventually do get fixed)

if you post links pointing to certain pages that may present security issues, it would be appreciated to break them up a little just to be fair

www dot jobs on a stick dot com


0
Comment
Question by:bryon44035v3
4 Comments
 
LVL 30

Accepted Solution

by:
Brad Howe earned 500 total points
Comment Utility
Hi,

Requesting a penatration test requires strict approval planning and guidance. Asking random users in a public forum could get them sued.

What you have provide is partial disclosure and no approval from either the company owner, hosting provider etc.

If you are looking for a security assessment to be completed on your web application, it should be done properly by hiring a certified security professional.

http://jeffersonwells.de/de_en/CenterofExpertise/InformationSecurity.htm
http://www.ivizsecurity.com/application-penetration.html
http://www.redspin.com/

Cheers,
Hades666
0
 
LVL 24

Author Closing Comment

by:bryon44035v3
Comment Utility
you're absolutely right, thanks for the links
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now