Developer Report
Developer Report
18 June, 2019
Developer Report
Scan information
Start time 6/18/2019 11:38:38 AM
Finish time 6/18/2019 11:42:22 AM
Scan time 3 minutes, 44 seconds
Profile Default
Server information
Responsive True
Server banner GlassFish Server Open Source Edition 4.1
Server OS Unknown
Threat level
Acunetix Threat Level 3
One or more high-severity type vulnerabilities have been discovered by the
scanner. A malicious user can exploit these vulnerabilities and compromise the
backend database and/or deface your website.
Alerts distribution
Total alerts 22
found
High 4
Medium 8
Low 0
Information 10
al
Knowledge base
List of file extensions
File extensions can provide information on what technologies are being used on this website.
List of file extensions detected:
- /faces/javax.faces.resource/watermark/watermark.js
- /faces/javax.faces.resource/jsf.js
- /faces/javax.faces.resource/jquery/jquery.js
- /faces/javax.faces.resource/jquery/jquery-plugins.js
- /faces/javax.faces.resource/core.js
- /faces/javax.faces.resource/components.js
- /js/jquery.validate.js
- /js/form.validator.js
List of files with inputs
These files have at least one input (GET or POST).
Acunetix Website Audit 2
- / - 4 inputs
- /faces/pages/login.xhtml - 1 inputs
- /fonts/fontawesome-webfont.woff2 - 1 inputs
List of authentication pages
This is a list of pages that require HTTP authentication.
- /j_security_check
Alerts summary
Directory traversal
Classification
CVSS Base Score: 6.8
Broken links
Classification
CVSS Base Score: 0.0
Alert details
Directory traversal
Severity High
Type Validation
Reported by Scripting (Server_Directory_Traversal.script)
module
Description
This script is possibly vulnerable to directory traversal attacks.
Directory Traversal is a vulnerability which allows attackers to access restricted directories and execute
commands outside of the web server's root directory.
Impact
By exploiting directory traversal vulnerabilities, attackers step out of the root directory and access files in
other directories. As a result, attackers might view restricted files or execute commands, leading to a full
compromise of the Web server.
Recommendation
Your script should filter metacharacters from user input.
References
Acunetix Directory Traversal Attacks
Affected items
/css
Details
This file was found using the pattern ${dirName}/%C0%AE%C0%AE/WEB-INF/web.xml?.
Original directory: /css
Directory traversal pattern found: <web-app version="3.0" xmlns="http://java.sun.com/xml/ns/javaee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-
app_3_0.xsd">
<context-param>
<param-name>javax.faces.PROJECT_STAGE</param-name>
<param-value>Production</param-value>
</context-param>
<context-param>
<param-name>javax.faces.application.CONFIG_FILES</param-name>
<param-value>/WEB-INF/faces-config.xml</param-value>
</context-param>
<!-- <context-param>
<param-name>primefaces.THEME</param-name>
<param-value>bootstrap</param-value>
</context-param> -->
<!-- For JSF mapping -->
<!-- JSF mapping -->
<servlet>
<servlet-name>Faces Servlet</servlet-name>
<servlet-class>javax.faces.webapp.FacesServlet</servlet-class>
<load-on-startup>1</load-on-startup>
</servlet>
<!-- Map these files with JSF -->
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>/faces/*</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.jsf</url-pattern>
Acunetix Website Audit 7
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.faces</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.xhtml</url-pattern>
</servlet-mapping>
<filter>
<filter-name>PrimeFaces FileUpload Filter</filter-name>
<filter-class>
org.primefaces.webapp.filter.FileUploadFilter
</filter-class>
</filter>
<filter-mapping>
<filter-name>PrimeFaces FileUpload Filter</filter-name>
<servlet-name>Faces Servlet</servlet-name>
</filter-mapping>
<filter>
<filter-name>XSSFilter</filter-name>
<filter-class>com.f1soft.fonebank.adminweb.controllerbean.XSSFilter</filter-class>
</filter>
<filter>
<filter-name>ClickjackingPreventionFilter</filter-name>
<filter-class>com.f1soft.fonebank.adminweb.controllerbean.ClickjackingPreventionFilter</filter-
class>
</filter>
<filter-mapping>
<filter-name>XSSFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>ClickjackingPreventionFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<context-param>
<param-name>uploadDirectory</param-name>
<param-value>E:/uploaded file</param-value>
</context-param>
<context-param>
<param-
name>javax.faces.DATETIMECONVERTER_DEFAULT_TIMEZONE_IS_SYSTEM_TIMEZONE</param-name>
<param-value>true</param-value>
</context-param>
<!-- Tema do Bootstrap -->
<!-- <context-param>
<param-name>primefaces.THEME</param-name>
<param-value>bootstrap</param-value>
</context-param>-->
<session-config>
<session-timeout>
10
</session-timeout>
</session-config>
<welcome-file-list>
<welcome-file>faces/pages/login.xhtml</welcome-file>
</welcome-file-list>
<listener>
<listener-class>
com.sun.faces.config.ConfigureListener
</listener-class>
</listener>
</web-app>
Acunetix Website Audit 8
Request headers
GET /css/%C0%AE%C0%AE/WEB-INF/web.xml? HTTP/1.1
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fonts
Details
This file was found using the pattern ${dirName}/%C0%AE%C0%AE/WEB-INF/web.xml?.
Original directory: /fonts
Directory traversal pattern found: <web-app version="3.0" xmlns="http://java.sun.com/xml/ns/javaee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-
app_3_0.xsd">
<context-param>
<param-name>javax.faces.PROJECT_STAGE</param-name>
<param-value>Production</param-value>
</context-param>
<context-param>
<param-name>javax.faces.application.CONFIG_FILES</param-name>
<param-value>/WEB-INF/faces-config.xml</param-value>
</context-param>
<!-- <context-param>
<param-name>primefaces.THEME</param-name>
<param-value>bootstrap</param-value>
</context-param> -->
<!-- For JSF mapping -->
<!-- JSF mapping -->
<servlet>
<servlet-name>Faces Servlet</servlet-name>
<servlet-class>javax.faces.webapp.FacesServlet</servlet-class>
<load-on-startup>1</load-on-startup>
</servlet>
<!-- Map these files with JSF -->
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>/faces/*</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.jsf</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.faces</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.xhtml</url-pattern>
</servlet-mapping>
<filter>
<filter-name>PrimeFaces FileUpload Filter</filter-name>
<filter-class>
org.primefaces.webapp.filter.FileUploadFilter
</filter-class>
</filter>
<filter-mapping>
<filter-name>PrimeFaces FileUpload Filter</filter-name>
<servlet-name>Faces Servlet</servlet-name>
</filter-mapping>
<filter>
Acunetix Website Audit 9
<filter-name>XSSFilter</filter-name>
<filter-class>com.f1soft.fonebank.adminweb.controllerbean.XSSFilter</filter-class>
</filter>
<filter>
<filter-name>ClickjackingPreventionFilter</filter-name>
<filter-class>com.f1soft.fonebank.adminweb.controllerbean.ClickjackingPreventionFilter</filter-
class>
</filter>
<filter-mapping>
<filter-name>XSSFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>ClickjackingPreventionFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<context-param>
<param-name>uploadDirectory</param-name>
<param-value>E:/uploaded file</param-value>
</context-param>
<context-param>
<param-
name>javax.faces.DATETIMECONVERTER_DEFAULT_TIMEZONE_IS_SYSTEM_TIMEZONE</param-name>
<param-value>true</param-value>
</context-param>
<!-- Tema do Bootstrap -->
<!-- <context-param>
<param-name>primefaces.THEME</param-name>
<param-value>bootstrap</param-value>
</context-param>-->
<session-config>
<session-timeout>
10
</session-timeout>
</session-config>
<welcome-file-list>
<welcome-file>faces/pages/login.xhtml</welcome-file>
</welcome-file-list>
<listener>
<listener-class>
com.sun.faces.config.ConfigureListener
</listener-class>
</listener>
</web-app>
Request headers
GET /fonts/%C0%AE%C0%AE/WEB-INF/web.xml? HTTP/1.1
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/images
Details
This file was found using the pattern ${dirName}/%C0%AE%C0%AE/WEB-INF/web.xml?.
Original directory: /images
Directory traversal pattern found: <web-app version="3.0" xmlns="http://java.sun.com/xml/ns/javaee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-
app_3_0.xsd">
<context-param>
<param-name>javax.faces.PROJECT_STAGE</param-name>
<param-value>Production</param-value>
Acunetix Website Audit 10
</context-param>
<context-param>
<param-name>javax.faces.application.CONFIG_FILES</param-name>
<param-value>/WEB-INF/faces-config.xml</param-value>
</context-param>
<!-- <context-param>
<param-name>primefaces.THEME</param-name>
<param-value>bootstrap</param-value>
</context-param> -->
<!-- For JSF mapping -->
<!-- JSF mapping -->
<servlet>
<servlet-name>Faces Servlet</servlet-name>
<servlet-class>javax.faces.webapp.FacesServlet</servlet-class>
<load-on-startup>1</load-on-startup>
</servlet>
<!-- Map these files with JSF -->
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>/faces/*</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.jsf</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.faces</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.xhtml</url-pattern>
</servlet-mapping>
<filter>
<filter-name>PrimeFaces FileUpload Filter</filter-name>
<filter-class>
org.primefaces.webapp.filter.FileUploadFilter
</filter-class>
</filter>
<filter-mapping>
<filter-name>PrimeFaces FileUpload Filter</filter-name>
<servlet-name>Faces Servlet</servlet-name>
</filter-mapping>
<filter>
<filter-name>XSSFilter</filter-name>
<filter-class>com.f1soft.fonebank.adminweb.controllerbean.XSSFilter</filter-class>
</filter>
<filter>
<filter-name>ClickjackingPreventionFilter</filter-name>
<filter-class>com.f1soft.fonebank.adminweb.controllerbean.ClickjackingPreventionFilter</filter-
class>
</filter>
<filter-mapping>
<filter-name>XSSFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>ClickjackingPreventionFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<context-param>
<param-name>uploadDirectory</param-name>
<param-value>E:/uploaded file</param-value>
</context-param>
Acunetix Website Audit 11
<context-param>
<param-
name>javax.faces.DATETIMECONVERTER_DEFAULT_TIMEZONE_IS_SYSTEM_TIMEZONE</param-name>
<param-value>true</param-value>
</context-param>
<!-- Tema do Bootstrap -->
<!-- <context-param>
<param-name>primefaces.THEME</param-name>
<param-value>bootstrap</param-value>
</context-param>-->
<session-config>
<session-timeout>
10
</session-timeout>
</session-config>
<welcome-file-list>
<welcome-file>faces/pages/login.xhtml</welcome-file>
</welcome-file-list>
<listener>
<listener-class>
com.sun.faces.config.ConfigureListener
</listener-class>
</listener>
</web-app>
Request headers
GET /images/%C0%AE%C0%AE/WEB-INF/web.xml? HTTP/1.1
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/js
Details
This file was found using the pattern ${dirName}/%C0%AE%C0%AE/WEB-INF/web.xml?.
Original directory: /js
Directory traversal pattern found: <web-app version="3.0" xmlns="http://java.sun.com/xml/ns/javaee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-
app_3_0.xsd">
<context-param>
<param-name>javax.faces.PROJECT_STAGE</param-name>
<param-value>Production</param-value>
</context-param>
<context-param>
<param-name>javax.faces.application.CONFIG_FILES</param-name>
<param-value>/WEB-INF/faces-config.xml</param-value>
</context-param>
<!-- <context-param>
<param-name>primefaces.THEME</param-name>
<param-value>bootstrap</param-value>
</context-param> -->
<!-- For JSF mapping -->
<!-- JSF mapping -->
<servlet>
<servlet-name>Faces Servlet</servlet-name>
<servlet-class>javax.faces.webapp.FacesServlet</servlet-class>
<load-on-startup>1</load-on-startup>
</servlet>
<!-- Map these files with JSF -->
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>/faces/*</url-pattern>
</servlet-mapping>
Acunetix Website Audit 12
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.jsf</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.faces</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>Faces Servlet</servlet-name>
<url-pattern>*.xhtml</url-pattern>
</servlet-mapping>
<filter>
<filter-name>PrimeFaces FileUpload Filter</filter-name>
<filter-class>
org.primefaces.webapp.filter.FileUploadFilter
</filter-class>
</filter>
<filter-mapping>
<filter-name>PrimeFaces FileUpload Filter</filter-name>
<servlet-name>Faces Servlet</servlet-name>
</filter-mapping>
<filter>
<filter-name>XSSFilter</filter-name>
<filter-class>com.f1soft.fonebank.adminweb.controllerbean.XSSFilter</filter-class>
</filter>
<filter>
<filter-name>ClickjackingPreventionFilter</filter-name>
<filter-class>com.f1soft.fonebank.adminweb.controllerbean.ClickjackingPreventionFilter</filter-
class>
</filter>
<filter-mapping>
<filter-name>XSSFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>ClickjackingPreventionFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<context-param>
<param-name>uploadDirectory</param-name>
<param-value>E:/uploaded file</param-value>
</context-param>
<context-param>
<param-
name>javax.faces.DATETIMECONVERTER_DEFAULT_TIMEZONE_IS_SYSTEM_TIMEZONE</param-name>
<param-value>true</param-value>
</context-param>
<!-- Tema do Bootstrap -->
<!-- <context-param>
<param-name>primefaces.THEME</param-name>
<param-value>bootstrap</param-value>
</context-param>-->
<session-config>
<session-timeout>
10
</session-timeout>
</session-config>
<welcome-file-list>
<welcome-file>faces/pages/login.xhtml</welcome-file>
</welcome-file-list>
<listener>
<listener-class>
Acunetix Website Audit 13
com.sun.faces.config.ConfigureListener
</listener-class>
</listener>
</web-app>
Request headers
GET /js/%C0%AE%C0%AE/WEB-INF/web.xml? HTTP/1.1
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Acunetix Website Audit 14
Severity Medium
Type Configuration
Reported by Scripting (AJP_Audit.script)
module
Description
The Apache JServ Protocol (AJP) is a binary protocol that can proxy inbound requests from a web server
through to an application server that sits behind the web server. It's not recommended to have AJP
services publicly accessible on the internet. If AJP is misconfigured it could allow an attacker to access to
internal resources.
Impact
No impact is associated with this alert.
Recommendation
It's recommended to restrict access to this service on production systems.
References
The Apache Tomcat Connector
Affected items
Server
Details
The AJP service is running on TCP port 8009.
Acunetix Website Audit 15
Severity Medium
Type Validation
Reported by Scripting (Text_Search_Dir.script)
module
Description
This page contains an error/warning message that may disclose sensitive information. The message can
also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Impact
The error messages may disclose sensitive information. This information can be used to launch further
attacks.
Recommendation
Review the source code for this script.
References
PHP Runtime Configuration
Affected items
/bea_wls_internal/classes
Details
Pattern found: Exception report</p><p><b>message</b>Internal Server
Error</p><p><b>description</b>The server encountered an internal error that prevented it from
fulfilling this request.</p><p><b>exception</b>
<pre>java.lang.IllegalStateException</pre></p><p><b>note</b> <u>The full stack traces of the
exception and its root causes are available in the GlassFish Server Open Source Edition 4.1
logs.</u></p><hr/><h3>GlassFish
Request headers Server Open Source Edition 4.1 </h3></body></html>[/ ... (line
GET /bea_wls_internal/classes/ HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/bea_wls_internal/classes
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/css
Details
Pattern found: Exception report</p><p><b>message</b>Internal Server
Error</p><p><b>description</b>The server encountered an internal error that prevented it from
fulfilling this request.</p><p><b>exception</b>
<pre>java.lang.IllegalStateException</pre></p><p><b>note</b> <u>The full stack traces of the
exception and its root causes are available in the GlassFish Server Open Source Edition 4.1
logs.</u></p><hr/><h3>GlassFish
Request headers Server Open Source Edition 4.1 </h3></body></html>[/ ... (line
GET /css/ HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/css/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Acunetix Website Audit 16
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fonts
Details
Pattern found: Exception report</p><p><b>message</b>Internal Server
Error</p><p><b>description</b>The server encountered an internal error that prevented it from
fulfilling this request.</p><p><b>exception</b>
<pre>java.lang.IllegalStateException</pre></p><p><b>note</b> <u>The full stack traces of the
exception and its root causes are available in the GlassFish Server Open Source Edition 4.1
logs.</u></p><hr/><h3>GlassFish
Request headers Server Open Source Edition 4.1 </h3></body></html>[/ ... (line
GET /fonts/ HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/fonts/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/images
Details
Pattern found: Exception report</p><p><b>message</b>Internal Server
Error</p><p><b>description</b>The server encountered an internal error that prevented it from
fulfilling this request.</p><p><b>exception</b>
<pre>java.lang.IllegalStateException</pre></p><p><b>note</b> <u>The full stack traces of the
exception and its root causes are available in the GlassFish Server Open Source Edition 4.1
logs.</u></p><hr/><h3>GlassFish
Request headers Server Open Source Edition 4.1 </h3></body></html>[/ ... (line
GET /images/ HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/images/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/js
Details
Pattern found: Exception report</p><p><b>message</b>Internal Server
Error</p><p><b>description</b>The server encountered an internal error that prevented it from
fulfilling this request.</p><p><b>exception</b>
<pre>java.lang.IllegalStateException</pre></p><p><b>note</b> <u>The full stack traces of the
exception and its root causes are available in the GlassFish Server Open Source Edition 4.1
logs.</u></p><hr/><h3>GlassFish
Request headers Server Open Source Edition 4.1 </h3></body></html>[/ ... (line
GET /js/ HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/js/
Acunetix Website Audit 17
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Acunetix Website Audit 18
Severity Medium
Type Configuration
Reported by Slow_HTTP_DOS
module
Description
Your web server is vulnerable to Slow HTTP DoS (Denial of Service) attacks.
Slowloris and Slow HTTP POST DoS attacks rely on the fact that the HTTP protocol, by design, requires
requests to be completely received by the server before they are processed. If an HTTP request is not
complete, or if the transfer rate is very low, the server keeps its resources busy waiting for the rest of the
data. If the server keeps too many resources busy, this creates a denial of service.
Impact
A single machine can take down another machine's web server with minimal bandwidth and side effects
on unrelated services and ports.
Recommendation
Consult Web references for information about protecting your web server against this type of attack.
References
Protect Apache Against Slowloris Attack
Slowloris DOS Mitigation Guide
Slowloris HTTP DoS
Affected items
Web Server
Details
Time difference between connections: 10000 ms
Severity Medium
Type Configuration
Reported by Crawler
module
Description
User credentials are transmitted over an unencrypted channel. This information should always be
transferred via an encrypted channel (HTTPS) to avoid being intercepted by malicious users.
Impact
A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection.
Recommendation
Because user credentials are considered sensitive information, should always be transferred to the server
over an encrypted connection (HTTPS).
Affected items
/
Details
Form name: loginForm
Form action: http://192.168.1.67:8080/faces/pages/login.xhtml
Form method: POST
Form inputs:
- loginForm [Hidden]
- somefakename [Text]
- loginForm:username [Text]
- anotherfakename [Password]
- loginForm:password [Password]
- loginForm:ajax [Submit]
- javax.faces.ViewState [Hidden]
Request headers
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Broken links
Severity Informational
Type Informational
Reported by Crawler
module
Description
A broken link refers to any link that should take you to a document, image or webpage, that actually
results in an error. This page was linked from the website but it is inaccessible.
Impact
Problems navigating the site.
Recommendation
Remove the links to this file or make it accessible.
Affected items
/faces/javax.faces.resource/components.css
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as
"Not Found") > select Referrers Tab from the bottom of the Information pane.
Request headers
GET /faces/javax.faces.resource/components.css HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/faces/javax.faces.resource/components.js
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as
"Not Found") > select Referrers Tab from the bottom of the Information pane.
Request headers
GET /faces/javax.faces.resource/components.js HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/faces/javax.faces.resource/core.js
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as
"Not Found") > select Referrers Tab from the bottom of the Information pane.
Request headers
GET /faces/javax.faces.resource/core.js HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/faces/javax.faces.resource/jquery/jquery.js
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as
"Not Found") > select Referrers Tab from the bottom of the Information pane.
Request headers
GET /faces/javax.faces.resource/jquery/jquery.js HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/faces/javax.faces.resource/jquery/jquery-plugins.js
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as
"Not Found") > select Referrers Tab from the bottom of the Information pane.
Request headers
GET /faces/javax.faces.resource/jquery/jquery-plugins.js HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/faces/javax.faces.resource/jsf.js
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as
"Not Found") > select Referrers Tab from the bottom of the Information pane.
Request headers
Acunetix Website Audit 22
GET /faces/javax.faces.resource/jsf.js HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/faces/javax.faces.resource/theme.css
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as
"Not Found") > select Referrers Tab from the bottom of the Information pane.
Request headers
GET /faces/javax.faces.resource/theme.css HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/faces/javax.faces.resource/watermark/watermark.css
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as
"Not Found") > select Referrers Tab from the bottom of the Information pane.
Request headers
GET /faces/javax.faces.resource/watermark/watermark.css HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/faces/javax.faces.resource/watermark/watermark.js
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as
"Not Found") > select Referrers Tab from the bottom of the Information pane.
Request headers
GET /faces/javax.faces.resource/watermark/watermark.js HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/
Acunetix-Aspect: enabled
Acunetix Website Audit 23
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Acunetix Website Audit 24
Severity Informational
Type Informational
Reported by Scripting (Text_Search_File.script)
module
Description
A username and/or password was found in this file. This information could be sensitive.
Affected items
/css/font-awesome.min.css
Details
Pattern found: pass:before
Request headers
GET /css/font-awesome.min.css HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.67:8080/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: JSESSIONID=925e86be77cb8bf0cd49eb580889
Host: 192.168.1.67:8080
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Acunetix Website Audit 25
URL: http://192.168.1.67:8080/faces/javax.faces.resource/watermark
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/faces/javax.faces.resource/watermark/watermark.css
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/faces/javax.faces.resource/watermark/watermark.js
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/faces/javax.faces.resource/jsf.js
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/faces/javax.faces.resource/jquery
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/faces/javax.faces.resource/jquery/jquery.js
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/faces/javax.faces.resource/jquery/jquery-plugins.js
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/faces/javax.faces.resource/core.js
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/faces/javax.faces.resource/components.js
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/images/
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/css/
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/css/mainStyler.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/css/font-awesome.min.css
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/js/
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/js/jquery.validate.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/js/form.validator.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/fonts/
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/fonts/fontawesome-webfont.woff2
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name Input type
v URL encoded GET
URL: http://192.168.1.67:8080/META-INF/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/WEB-INF/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/bea_wls_internal
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/bea_wls_internal/classes/
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/j_security_check
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.67:8080/index.jsp
No vulnerabilities have been identified for this URL
No input(s) found for this URL