Identifying web application vulnerabilities with Tenable WAS
Tenable Web App Scanning (WAS) is a dynamic application security testing (DAST) solution that helps organizations identify and address vulnerabilities in their web applications and APIs. The tool can scan cloud and on-premises web applications, identifying OWASP top 10 vulnerabilities and vulnerable third-party libraries.
You can use this data for threat intelligence purposes to make informed, data-driven decisions that enhance protection and reduce risk. By centralizing and retaining relevant vulnerability information, your team can receive timely alerts for critical issues and automate reporting processes, ensuring efficient monitoring and faster response to emerging threats.
Data required
Solution
Identifying WAS assets with the most severe vulnerabilities allows your team to track compliance, report status, and prioritize remediation of the affected assets.
Run the following search. You can optimize it by adjusting the time range:
index="tenable_WAS" sourcetype="tenable:asm:assets"
| join assetId [search index="tenable_WAS" sourcetype="tenable:was:vuln"
| eval assetId=id]
| table assetId, name, description, details.cves{}, severity
| eval severityRank=case(severity=="critical", 1, severity=="high", 2, severity=="medium", 3, severity=="low", 4, 1=1, 5)
| sort severityRank
Search explanation
Splunk search | Explanation |
---|---|
sourcetype=tenable:asm:assets |
Search first by asset. |
join assetId [search index="tenable_WAS" sourcetype="tenable:was:vuln" | eval assetId=id] |
Join assets with the associated vulnerability findings. |
| table assetId, name, description, details.cves{}, severity |
Create a table to view key fields in the results. |
| eval severityRank=case(severity=="critical", 1, severity=="high", 2, severity=="medium", 3, severity=="low", 4, 1=1, 5) |
Map the severity string to a number so it can be sorted. |
| sort severityRank |
Sort by the level of severity from critical to low. |
Next steps
These resources might help you understand and implement this guidance:
- Tenable Docs: Tenable and Splunk integration guide
- Splunkbase: Tenable Add-on for Splunk