From Figure 4, it is also possible to observe that
the ZAP scanner was the only one that detected
security flaws related to the use of components with
known vulnerabilities and logging and insufficient
monitoring. Moreover, this was the only scanner with
built-in capabilities to detect such security problems
on web applications. Similarly, the PT scanner was
the only one that detected security flaws directly
linked to the failed access control authentication
(Broken Access Control). All web scanners converge
on identifying security flaws related to Injection, Poor
Security Configuration, and Cross-Site Scripting.
During the study, it was also possible to find that only
two (2) of the ten (10) universities maintain their
degree of security risk from when the study was
conducted while the other universities see their
security risk level degrading.
5 CONCLUSIONS
The number of security flaws identified in this study
and the degree of vulnerability of web applications
ranging from medium to high risk demonstrates that
the web applications of Angolan universities, in
general, are not secure. It was also possible to
conclude that 70% of applications communicate
through unsafe channels due to the absence of
security certificates (and therefore without SSL/TLS)
and use JavaScript libraries with known
vulnerabilities, thus being exposed to cross-site
scripting attacks. The present study also found that all
web applications provide too much information about
their ecosystems (operating systems, server versions
and applications), which can enhance the increase in
the degree of vulnerabilities if the systems are not up-
to-date and bug-free. Moreover, this information
leakage can provide more clues for attackers to
compromise those applications and the information
they hold. Another relevant aspect of this study is
discovering the relationship between the security
flaws found with the various content management
systems (CMS) that universities use. That is, the lack
of updating of these applications, their components
and JavaScript libraries increase the risk of security
breaches and makes all dependent applications
vulnerable since this type of applications are
interconnected with the others. In some cases, they
serve as a web portal to access other resources or
applications. The usage of different types of scanners,
with varying settings of parameterisation in terms of
sensitivity, depth and aggressiveness, allowed to
identify of security flaws that another web scanner
could have ignored and consequently to obtain a false
sense of security due to the absence of certain types
of vulnerabilities that exist in the application but that
the scanner used was not able to identify. For this
reason, it is recommended to use several web
scanners simultaneously when assessing the
vulnerabilities of web applications. It is also possible
to conclude that the security flaws discovered in this
study could be avoided if the targeted educational
institutions adopted penetration testing in the
development, installation, configuration, and
maintenance of network and/or application assets.
This study listed open-source tools (framework
guides) that allow security vulnerabilities and
intrusion testing to be carried out. These tools are
pretty effective, as it can be said that if Angolan
universities regularly perform penetration tests in
their applications and or ecosystems, the security
flaws identified here would be discovered and
eliminated. Consequently, the web applications
would be safer. To the best of our knowledge, this was
the first time that a security evaluation of the web
applications of the Angola universities took place,
and the conclusions reached depict a dark scenario in
terms of web application security. Therefore, there
are essential steps that need to take place at the
Angola universities to include good application
security practices in the implementation,
configuration and deployment of these university web
applications that need to consider the appropriate
security risks and adopt measures to mitigate them.
The work described in this paper should be cyclically
repeated over time to measure the security maturity
of such web applications, allowing for the
establishment of proper secure by default
environments.
REFERENCES
Acunetix. (2020). Web Application Vulnerability Report
2020. https://www.acunetix.com/white-papers/acune
tix-web-application-vulnerability-report-2020/
Dinis, B., & Serrao, C. (2014). External footprinting
security assessments: Combining the PTES framework
with open-source tools to conduct external footprinting
security assessments. International Conference on
Information Society (i-Society 2014), 313–318.
https://doi.org/10.1109/i-Society.2014.7009066
Doshi, J., & Trivedi, B. (2015). Comparison of
vulnerability assessment and penetration testing. Int. J.
Appl. Inf. Syst, 8(6), 51–54.
Haubris, K. P., & Pauli, J. J. (2013). Improving the
efficiency and effectiveness of penetration test
automation. 2013 10th International Conference on
Information Technology: New Generations, 387–391.