Phase2 Security Report
Phase2 Security Report
Security Report
This report was created by IBM Security AppScan Standard 9.0.3, Rules: 1957
Scan started: 4/27/2019 2:58:47 AM
Table of Contents
Introduction
General Information
Login Settings
Summary
Issue Types
Vulnerable URLs
Fix Recommendations
Security Risks
Causes
WASC Threat Classification
4/28/2019 1
Email Address Pattern Found 2
HTML Comments Sensitive Information Disclosure 2
4/28/2019 2
Introduction
This report contains the results of a web application security scan performed by IBM Security AppScan Standard.
General Information
Scan file name: Phase2
Scan started: 4/27/2019 2:58:47 AM
Test policy: Default(Modified)
Host 192.168.58.129
Operating system: Unknown
Web server: Apache
Application server: Any
Login Settings
Login method: None
4/28/2019 3
Summary
4/28/2019 4
URL Number of Issues
H http://192.168.58.129/WebGoat/attack 42
L http://192.168.58.129/ 2
L http://192.168.58.129/WebGoat/lessons/General/redirect.jsp 1
L http://192.168.58.129/doc/ 1
L http://192.168.58.129/doc/packages/ 1
L http://192.168.58.129/javascript/ 1
L http://192.168.58.129/WebGoat/javascript/DOMXSS.js 3
L http://192.168.58.129/WebGoat/javascript/clientSideFiltering.js 3
L http://192.168.58.129/WebGoat/javascript/clientSideValidation.js 3
L http://192.168.58.129/WebGoat/javascript/escape.js 3
L http://192.168.58.129/WebGoat/javascript/eval.js 3
L http://192.168.58.129/WebGoat/javascript/javascript.js 3
L http://192.168.58.129/WebGoat/javascript/lessonNav.js 3
L http://192.168.58.129/WebGoat/javascript/makeWindow.js 3
L http://192.168.58.129/WebGoat/javascript/menu_system.js 3
L http://192.168.58.129/WebGoat/javascript/sameOrigin.js 3
L http://192.168.58.129/WebGoat/javascript/toggle.js 3
L http://192.168.58.129/WebGoat/lesson_solutions/HttpOnly_files/color 3
schememapping.xml
L http://192.168.58.129/WebGoat/lesson_solutions/HttpOnly_files/them 3
edata.thmx
L http://192.168.58.129/WebGoat/lessons/Ajax/eval.jsp 3
L http://192.168.58.129/WebGoat/lessons/Ajax/sameOrigin.jsp 3
L http://192.168.58.129/WebGoat/reportBug.jsp 4
L http://192.168.58.129/WebGoat/services/WSDLScanning 3
L http://192.168.58.129/WebGoat/services/WsSqlInjection 3
L http://192.168.58.129/WebGoat/source 3
4/28/2019 5
L Config your server to use the "Content-Security-Policy" header 20
L Config your server to use the "X-Content-Type-Options" header 20
L Config your server to use the "X-XSS-Protection" header 20
L Correctly set the "autocomplete" attribute to "off" 1
L Disable HTTP TRACE support in your web server 1
L Do not accept body parameters that are sent in the query string 2
L Download the relevant security patch for your web server or web 1
application.
L Examine the link to determine whether it is indeed supposed to be 2
included in the web application
L Issue a "404 - Not Found" response status code for a forbidden 3
resource, or remove it completely
L Modify the server configuration to disable the Multiviews feature 1
L Remove business and security logic from the client side 1
L Remove e-mail addresses from the website 2
L Remove sensitive information from HTML comments 2
L Remove the Bash shell history file or restrict access to it 1
L Remove the recipient e-mail address hidden parameter 1
L Stop using hidden parameters, or verify reliability of incoming data 1
L Verify that parameter values are in their expected ranges and types. 4
Do not output debugging error messages and exceptions
4/28/2019 6
structure, which may help the attacker to map the web site
I It is possible to gather sensitive debugging information 4
I The worst case scenario for this attack depends on the context and 1
role of the cookies that are created at the client side
I It is possible to send e-mails through your web application, using 1
spoofed e-mail addresses
I N/A 2
Causes 12 TOC
4/28/2019 7
Issues Sorted by Issue Type
Issue 1 of 18 TOC
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: attack (Page)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 2 of 18 TOC
4/28/2019 8
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: station (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 3 of 18 TOC
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: field1 (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 4 of 18 TOC
4/28/2019 9
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: subject (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 5 of 18 TOC
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: field4 (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 6 of 18 TOC
4/28/2019 10
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: field6 (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 7 of 18 TOC
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: field3 (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 8 of 18 TOC
4/28/2019 11
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: field2 (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 9 of 18 TOC
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: account_number (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 10 of 18 TOC
4/28/2019 12
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: field7 (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 11 of 18 TOC
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: field5 (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 12 of 18 TOC
4/28/2019 13
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: msg (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 13 of 18 TOC
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: HelpFile (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 14 of 18 TOC
4/28/2019 14
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: Resource (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 15 of 18 TOC
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: to (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 16 of 18 TOC
4/28/2019 15
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: File (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 17 of 18 TOC
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: User (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 18 of 18 TOC
4/28/2019 16
Cross-Site Scripting
Severity: High
CVSS Score: 7.5
URL: http://192.168.58.129/WebGoat/attack
Entity: username (Parameter)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: Sanitation of hazardous characters was not performed correctly on user input
Fix: Review possible solutions for hazardous character injection
Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded
a script in the response, which will be executed when the page loads in the user's browser.
Issue 1 of 1 TOC
4/28/2019 17
Issue 1 of 1 TOC
Reasoning: The allow-access-from entity in the crossdomain.xml file was set to asterisk (meaning any
domain)
Issue 1 of 1 TOC
Reasoning: The test result seems to indicate a vulnerability because the test response contains the
output of the Unix "id" command, indicating that the command was executed successfully
on the server.
4/28/2019 18
H Stored Cross-Site Scripting 1 TOC
Issue 1 of 1 TOC
Reasoning: The test result seems to indicate a vulnerability because the Global Validation feature
found an embedded script in the response, which was probably injected by a previous test.
4/28/2019 19
M Padding Oracle On Downgraded Legacy Encryption (a.k.a. POODLE) 1 TOC
Issue 1 of 1 TOC
Reasoning: The server responded with a Handshake to AppScan's SSLv3 Client Hello with CBC cipher
suites that contain TLS_FALLBACK_SCSV
4/28/2019 20
L Apache Multiviews Attack 1 TOC
Issue 1 of 1 TOC
Reasoning: The test response indicates that the server reveals some of its pages names in the
response
Issue 1 of 1 TOC
4/28/2019 21
Autocomplete HTML Attribute Not Disabled for Password Field
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/attack
Entity: attack (Page)
Risk: It may be possible to bypass the web application's authentication mechanism
Causes: Insecure web application programming or configuration
Fix: Correctly set the "autocomplete" attribute to "off"
Reasoning: AppScan has found that a password field does not enforce the disabling of the
autocomplete feature.
Issue 1 of 1 TOC
Reasoning: AppScan requested a file which is probably not a legitimate part of the application. The
response status was 200 OK. This indicates that the test succeeded in retrieving the
content of the requested file.
4/28/2019 22
Issue 1 of 2 TOC
Reasoning: The test result seems to indicate a vulnerability because the Test Response is similar to
the Original Response, indicating that the application processed body parameters that were
submitted in the query
Issue 2 of 2 TOC
Reasoning: The test result seems to indicate a vulnerability because the Test Response is similar to
the Original Response, indicating that the application processed body parameters that were
submitted in the query
L eShoplifting 1 TOC
4/28/2019 23
Issue 1 of 1 TOC
eShoplifting
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/attack
Entity: Price (Parameter)
Risk: It is possible to steal goods or services (eShoplifting)
Causes: Parameter value manipulation was permitted by the application logic
Fix: Stop using hidden parameters, or verify reliability of incoming data
Reasoning: The test modified a price parameter, and the application accepted it and embedded it in a
returning form. This may indicate that the application is vulnerable to eShoplifting.
Issue 1 of 3 TOC
Reasoning: The test tried to detect hidden directories on the server. The 403 Forbidden response
reveals the existence of the directory, even though access is not allowed.
4/28/2019 24
Issue 2 of 3 TOC
Reasoning: The test tried to detect hidden directories on the server. The 403 Forbidden response
reveals the existence of the directory, even though access is not allowed.
Issue 3 of 3 TOC
Reasoning: The test tried to detect hidden directories on the server. The 403 Forbidden response
reveals the existence of the directory, even though access is not allowed.
Issue 1 of 20 TOC
4/28/2019 25
Missing "Content-Security-Policy" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/javascript.js
Entity: javascript.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "Content-Security-Policy" header
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 2 of 20 TOC
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 3 of 20 TOC
4/28/2019 26
Missing "Content-Security-Policy" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/services/WsSqlInjection
Entity: WsSqlInjection (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "Content-Security-Policy" header
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 4 of 20 TOC
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 5 of 20 TOC
4/28/2019 27
Missing "Content-Security-Policy" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/attack
Entity: attack (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "Content-Security-Policy" header
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 6 of 20 TOC
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 7 of 20 TOC
4/28/2019 28
Missing "Content-Security-Policy" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/makeWindow.js
Entity: makeWindow.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "Content-Security-Policy" header
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 8 of 20 TOC
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 9 of 20 TOC
4/28/2019 29
Missing "Content-Security-Policy" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/DOMXSS.js
Entity: DOMXSS.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "Content-Security-Policy" header
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 10 of 20 TOC
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 11 of 20 TOC
4/28/2019 30
Missing "Content-Security-Policy" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/sameOrigin.js
Entity: sameOrigin.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "Content-Security-Policy" header
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 12 of 20 TOC
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 13 of 20 TOC
4/28/2019 31
Missing "Content-Security-Policy" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/reportBug.jsp
Entity: reportBug.jsp (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "Content-Security-Policy" header
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 14 of 20 TOC
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 15 of 20 TOC
4/28/2019 32
Missing "Content-Security-Policy" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/lessons/Ajax/sameOrigin.jsp
Entity: sameOrigin.jsp (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "Content-Security-Policy" header
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 16 of 20 TOC
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 17 of 20 TOC
4/28/2019 33
Missing "Content-Security-Policy" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/clientSideValidation.js
Entity: clientSideValidation.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "Content-Security-Policy" header
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 18 of 20 TOC
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 19 of 20 TOC
4/28/2019 34
Missing "Content-Security-Policy" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/lesson_solutions/HttpOnly_files/colorschememapping.xml
Entity: colorschememapping.xml (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "Content-Security-Policy" header
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 20 of 20 TOC
Reasoning: AppScan detected that the Content-Security-Policy response header is missing, which
increases exposure to various cross-site injection attacks
Issue 1 of 20 TOC
4/28/2019 35
Missing "X-Content-Type-Options" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/reportBug.jsp
Entity: reportBug.jsp (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-Content-Type-Options" header
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 2 of 20 TOC
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 3 of 20 TOC
4/28/2019 36
Missing "X-Content-Type-Options" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/menu_system.js
Entity: menu_system.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-Content-Type-Options" header
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 4 of 20 TOC
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 5 of 20 TOC
4/28/2019 37
Missing "X-Content-Type-Options" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/source
Entity: source (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-Content-Type-Options" header
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 6 of 20 TOC
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 7 of 20 TOC
4/28/2019 38
Missing "X-Content-Type-Options" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/makeWindow.js
Entity: makeWindow.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-Content-Type-Options" header
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 8 of 20 TOC
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 9 of 20 TOC
4/28/2019 39
Missing "X-Content-Type-Options" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/toggle.js
Entity: toggle.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-Content-Type-Options" header
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 10 of 20 TOC
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 11 of 20 TOC
4/28/2019 40
Missing "X-Content-Type-Options" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/services/WsSqlInjection
Entity: WsSqlInjection (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-Content-Type-Options" header
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 12 of 20 TOC
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 13 of 20 TOC
4/28/2019 41
Missing "X-Content-Type-Options" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/sameOrigin.js
Entity: sameOrigin.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-Content-Type-Options" header
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 14 of 20 TOC
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 15 of 20 TOC
4/28/2019 42
Missing "X-Content-Type-Options" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/lessons/Ajax/eval.jsp
Entity: eval.jsp (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-Content-Type-Options" header
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 16 of 20 TOC
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 17 of 20 TOC
4/28/2019 43
Missing "X-Content-Type-Options" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/clientSideFiltering.js
Entity: clientSideFiltering.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-Content-Type-Options" header
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 18 of 20 TOC
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 19 of 20 TOC
4/28/2019 44
Missing "X-Content-Type-Options" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/lesson_solutions/HttpOnly_files/themedata.thmx
Entity: themedata.thmx (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-Content-Type-Options" header
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 20 of 20 TOC
Reasoning: AppScan detected that the X-Content-Type-Options response header is missing, which
increases exposure to drive-by download attacks
Issue 1 of 20 TOC
4/28/2019 45
Missing "X-XSS-Protection" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/javascript.js
Entity: javascript.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-XSS-Protection" header
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 2 of 20 TOC
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 3 of 20 TOC
4/28/2019 46
Missing "X-XSS-Protection" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/menu_system.js
Entity: menu_system.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-XSS-Protection" header
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 4 of 20 TOC
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 5 of 20 TOC
4/28/2019 47
Missing "X-XSS-Protection" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/source
Entity: source (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-XSS-Protection" header
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 6 of 20 TOC
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 7 of 20 TOC
4/28/2019 48
Missing "X-XSS-Protection" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/makeWindow.js
Entity: makeWindow.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-XSS-Protection" header
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 8 of 20 TOC
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 9 of 20 TOC
4/28/2019 49
Missing "X-XSS-Protection" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/DOMXSS.js
Entity: DOMXSS.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-XSS-Protection" header
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 10 of 20 TOC
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 11 of 20 TOC
4/28/2019 50
Missing "X-XSS-Protection" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/escape.js
Entity: escape.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-XSS-Protection" header
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 12 of 20 TOC
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 13 of 20 TOC
4/28/2019 51
Missing "X-XSS-Protection" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/services/WsSqlInjection
Entity: WsSqlInjection (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-XSS-Protection" header
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 14 of 20 TOC
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 15 of 20 TOC
4/28/2019 52
Missing "X-XSS-Protection" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/lessons/Ajax/eval.jsp
Entity: eval.jsp (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-XSS-Protection" header
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 16 of 20 TOC
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 17 of 20 TOC
4/28/2019 53
Missing "X-XSS-Protection" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/javascript/clientSideFiltering.js
Entity: clientSideFiltering.js (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-XSS-Protection" header
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 18 of 20 TOC
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 19 of 20 TOC
4/28/2019 54
Missing "X-XSS-Protection" header
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/lesson_solutions/HttpOnly_files/themedata.thmx
Entity: themedata.thmx (Page)
Risk: It is possible to gather sensitive information about the web application such as usernames,
passwords, machine name and/or sensitive file locations
It is possible to persuade a naive user to supply sensitive information such as username, password,
credit card number, social security number etc.
Causes: Insecure web application programming or configuration
Fix: Config your server to use the "X-XSS-Protection" header
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 20 of 20 TOC
Reasoning: AppScan detected that the X-XSS-Protection response header is missing, which may allow
Cross-Site Scripting attacks
Issue 1 of 1 TOC
4/28/2019 55
TRACE and TRACK HTTP Methods Enabled
Severity: Low
CVSS Score: 5.0
URL: http://192.168.58.129/WebGoat/attack
Entity: 192.168.58.129 (Page)
Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to
impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform
transactions as that user
Causes: The web server or application server are configured in an insecure way
Fix: Disable HTTP TRACE support in your web server
Reasoning: The response content type (message/http), and the echoing of the request text and
headers in the response, indicate that the TRACE/TRACK method is enabled on the
server.
4/28/2019 56
I Application Error 4 TOC
Issue 1 of 4 TOC
Application Error
Severity: Informational
CVSS Score: 0.0
URL: http://192.168.58.129/WebGoat/attack
Entity: QTY4 (Parameter)
Risk: It is possible to gather sensitive debugging information
Causes: Proper bounds checking were not performed on incoming parameter values
No validation was done in order to make sure that user input matches the data type expected
Fix: Verify that parameter values are in their expected ranges and types. Do not output debugging error
messages and exceptions
Reasoning: The application has responded with an error message, indicating an undefined state that
may expose sensitive information.
Issue 2 of 4 TOC
Application Error
Severity: Informational
CVSS Score: 0.0
URL: http://192.168.58.129/WebGoat/attack
Entity: pass2 (Parameter)
Risk: It is possible to gather sensitive debugging information
Causes: Proper bounds checking were not performed on incoming parameter values
No validation was done in order to make sure that user input matches the data type expected
Fix: Verify that parameter values are in their expected ranges and types. Do not output debugging error
messages and exceptions
Reasoning: The application has responded with an error message, indicating an undefined state that
may expose sensitive information.
4/28/2019 57
Issue 3 of 4 TOC
Application Error
Severity: Informational
CVSS Score: 0.0
URL: http://192.168.58.129/WebGoat/attack
Entity: password (Parameter)
Risk: It is possible to gather sensitive debugging information
Causes: Proper bounds checking were not performed on incoming parameter values
No validation was done in order to make sure that user input matches the data type expected
Fix: Verify that parameter values are in their expected ranges and types. Do not output debugging error
messages and exceptions
Reasoning: The application has responded with an error message, indicating an undefined state that
may expose sensitive information.
Issue 4 of 4 TOC
Application Error
Severity: Informational
CVSS Score: 0.0
URL: http://192.168.58.129/WebGoat/attack
Entity: read_result (Parameter)
Risk: It is possible to gather sensitive debugging information
Causes: Proper bounds checking were not performed on incoming parameter values
No validation was done in order to make sure that user input matches the data type expected
Fix: Verify that parameter values are in their expected ranges and types. Do not output debugging error
messages and exceptions
Reasoning: The application has responded with an error message, indicating an undefined state that
may expose sensitive information.
4/28/2019 58
Issue 1 of 1 TOC
Issue 1 of 1 TOC
Reasoning: AppScan found an e-mail address in a hidden parameter, which may be used as a
destination address for e-mails sent by the server.
4/28/2019 59
I Email Address Pattern Found 2 TOC
Issue 1 of 2 TOC
Issue 2 of 2 TOC
4/28/2019 60
Issue 1 of 2 TOC
Reasoning: AppScan discovered HTML comments containing what appears to be sensitive information.
Issue 2 of 2 TOC
Reasoning: AppScan discovered HTML comments containing what appears to be sensitive information.
Issue 1 of 2 TOC
4/28/2019 61
Link to unclassified site
Severity: Informational
CVSS Score: 0.0
URL: http://192.168.58.129/WebGoat/attack
Entity: http://www.partnet.com/ (Link)
Risk: N/A
Causes: N/A
Fix: Examine the link to determine whether it is indeed supposed to be included in the web application
Issue 2 of 2 TOC
Issue 1 of 1 TOC
4/28/2019 62
Possible Server Path Disclosure Pattern Found
Severity: Informational
CVSS Score: 0.0
URL: http://192.168.58.129/WebGoat/attack
Entity: attack (Page)
Risk: It is possible to retrieve the absolute path of the web server installation, which might help an
attacker to develop further attacks and to gain information about the file system structure of the web
application
Causes: Latest patches or hotfixes for 3rd. party products were not installed
Fix: Download the relevant security patch for your web server or web application.
Reasoning: The response contains the absolute paths and/or filenames of files on the server.
4/28/2019 63