Skip to content

Qualys WAS Introduces New Check to Secure External JavaScript Libraries

Protect your web apps from supply chain attacks. New Qualys WAS check helps self-host JavaScript libraries and improve performance.

In this image I can see a box full of cookies. To the cap of the box there is some text and design...
In this image I can see a box full of cookies. To the cap of the box there is some text and design on it.

Qualys WAS Introduces New Check to Secure External JavaScript Libraries

Qualys Web Application Scanning (WAS) has introduced a new check, QID 150545, to highlight the use of external JavaScript libraries in web applications. This addition aims to address potential security risks and performance issues associated with these libraries.

External JavaScript libraries, such as jQuery, Angular.js, or React, can pose security threats if loaded from insecure sources. QID 150545 helps identify such instances, recommending self-hosting for better control and to mitigate supply chain attacks.

To ensure the integrity of JavaScript files, Sub Resource Integrity (SRI) can be employed. However, Qualys WAS detects if SRI is not in use with QID 150261. Similarly, Content Security Policy (CSP) enables developers to whitelist domains for resource loading, and Qualys WAS identifies its absence with QID 150206.

Using external JavaScript libraries can also lead to performance issues. They may load additional JavaScript from other domains, causing slower page loads due to performance impact.

QID 150545, developed by the Qualys Web Application Scanning Team, is now part of both Discovery and Vulnerability scans, separating external JavaScript libraries from QID 150176. Understanding and implementing the recommendations from this QID can significantly improve the security and performance of web applications.

Read also:

Latest