Analysis of security CMS platforms by vulnerability scanners
Article Sidebar
Open full text
Issue Vol. 16 (2020)
-
Java and Kotlin code performance in selected web frameworks
Grzegorz Bujnowski, Jakub Smołka219-226
-
Blender as a tool for generating synthetic data
Rafał Sieczka, Maciej Pańczyk227-232
-
Analysis of selected methods of creating artificial intelligence on the example of a popular card game
Łukasz Gałka, Mariusz Dzieńkowski233-240
-
Comparative analysis of Kotlin coroutines with Java and Scala in parallel programming
Adrian Zieliński241-246
-
Performance testing of STL and Qt library elements in multi-threaded processing
Piotr Krasowski, Jakub Smołka247-251
-
A security analysis of authentication and authorization implemented in web applications based on the REST architecture
Tomasz Muszyński, Grzegorz Koziel252-260
-
Analysis of security CMS platforms by vulnerability scanners
Patryk Zamościński, Grzegorz Kozieł261-268
-
Analysis of the Blazor framework in client-hosted mode
Karol Kozak, Jakub Smołka269-273
-
Implementation of solutions for distributed team management in IT sector companies
Mykhailo Kuzyk, Elżbieta Miłosz274-278
-
Comparison of MySQL, MSSQL, PostgreSQL, Oracle databases performance, including virtualization
Wojciech Truskowski, Rafał Klewek, Maria Skublewska-Paszkowska279-284
-
Comparative analysis of selected object-relational mapping systems for the .NET platform
Krzysztof Drzazga, Marcin Bobel, Maria Skublewska-Paszkowska285-292
-
Analysis of the use of Java and C# languages for building a mobile application for the Android platform.
Michał Jankowski, Maria Skublewska-Paszkowska293-299
-
Performance comparison of chosen JSON parsers and a parser that employs a different reading method
Przemysław Koter300-304
-
Comparison of Objective-C and Swift on the example of a mobile game
Karolina Banach, Maria Skublewska-Paszkowska305-308
-
Comparison of REST and GraphQL web technology performance
Mateusz Mikuła, Mariusz Dzieńkowski309-316
-
The analysis of air pollution based on laser beam photo
Rafał Maksim, Anna Pawelec, Maria Skublewska-Paszkowska317-325
Main Article Content
DOI
Authors
patryk.zamoscinski@pollub.edu.pl
Abstract
Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research. For research purposes Wordpress and Joomla websites were created and investigated for security by vulnerability scanners OWASP ZAP, Vega, Detectify and Skipfish. Results were grouped by some criteria: vulnerabilities by category and vulnerabilities by threat level. Obtained results were examined in two ways: analysis of residual results, for each website scanning and analysis of aggregated results from all scanners. After that, conclusions about CMS platforms security have been drawn.
Keywords:
References
Acunetix Web Application Vulnerability Report 2019, https://cdn2.hubspot.net/hubfs/4595665/Acunetix_web_application_vulnerability_report_2019.pdf, [04.05.2020].
Meike M., Sametinger J., Wiesauer A., Security in Open Source Web Content Management Systems, IEEE Security and Privacy Magazine, 2009. DOI: https://doi.org/10.1109/MSP.2009.104
Patel S.K., Rathod V.R., Parikh S., Comparative Analysis Of Web Security In Open Source Content Management System, ISSP, 2013. DOI: https://doi.org/10.1109/ISSP.2013.6526932
Patel S.K., Rathod V.R., Parikh S., Joomla. Drupal and WordPress - A Statistical Comparison of Open Source CMS, IEEE, 2011. DOI: https://doi.org/10.1109/TISC.2011.6169111
Sagala A., Manurung E., Testing and Comparing Result Scanning Using Web Vulnerability Scanner, American Scientific Publishers, 2015. DOI: https://doi.org/10.1166/asl.2015.6598
Usage statistics of content management systems, https://w3techs.com/technologies/overview/content_management, [ 07.04.2020].
Pepper C., Tietz M., Weeks D., Open Source Development and Application Security Survey Analysis, Securosis, 2014.
WordPress, https://WordPress.org, [07.04.2020].
Joomla!, https://www.joomla.org/, [07.04.2020].
OWASP ZAP, https://www.zaproxy.org/, [21.05.2020].
Vega, https://subgraph.com/vega/, [21.05.2020].
Detectify, https://detectify.com/, [21.05.2020].
SkipfishDoc, https://code.google.com/archive/p/skipfish/wikis/SkipfishDoc.wiki, [21.05.2020].
Article Details
Abstract views: 857
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
