Pentesting Project: Security Assessment Web Application Security Test Results
Pentesting Project: Security Assessment Web Application Security Test Results
Pentesting Project: Security Assessment Web Application Security Test Results
Pentesting
Project
By:
Aaron Webb Dunne – C00247966
1|Page
Security Assessment Web Application Security Test Results
_______________________________________________
15 January – 11 February
_______________________________________________
2|Page
Security Assessment Web Application Security Test Results
Table of Contents
Contents
1 EXECUTIVE SUMMARY:........................................................................................................................................3
1.1 TARGET DESCRIPTION...................................................................................................................................................3
1.2 APPLICATION STATUS...................................................................................................................................................3
1.3 SECURITY TEST SUMMARY...........................................................................................................................................3
1.4 SUMMARY OF FINDINGS................................................................................................................................................4
2 SECURITY TEST:......................................................................................................................................................5
2.1 INTRODUCTION..............................................................................................................................................................5
2.2 OBJECTIVES AND SCOPE................................................................................................................................................5
2.3 TEST CRITERIA..............................................................................................................................................................6
2.3.1 Application(s) tested.....................................................................................................................................6
2.3.2 Dates within which testing took place..........................................................................................................6
2.4 DETAILED FINDINGS AND RECOMMENDATIONS............................................................................................................7
2.5 RANKING RISKS.............................................................................................................................................................7
2.6 DETAILED MAIN FINDINGS AND RECOMMENDATIONS MATRIX...................................................................................9
CROSS SITE SCRIPTING - REFLECTED................................................................................................................................12
OS COMMAND INJECTION..................................................................................................................................................12
CROSS SITE SCRIPTING - STORED......................................................................................................................................12
FILE INCLUSION.................................................................................................................................................................12
SQL INJECTION(BLIND).....................................................................................................................................................13
3|Page
Security Assessment Web Application Security Test Results
1 Executive Summary:
The security tests were performed against a stage environment at the request of coffehut.ie as testing against
the production environment was not permitted. As such any vulnerabilities are reported here without due
consideration as to whether they exist in the corresponding production environment.
The testing concluded that there were 1 high-risk findings, 6 medium-risk finding and 0 low-risk finding(s)
on the web site. The findings have been consolidated for this summary and additional information is contained
within the detailed report.
• system information can be seen including ip settings, software running and hardware
information
• user can be redirected to a potentially dangerous site that could download virus
4|Page
Security Assessment Web Application Security Test Results
2 Security Test:
2.1 Introduction
The intent is to assess these systems security vulnerabilities, which could lead to a compromise of confidential
information or may otherwise damage reputation.
In general, the systems tested can include public facing web applications defenses.
The types of vulnerabilities identified are wide ranging, and can be “built-in” during design, build or support
phases or can be caused by missing patch levels at the application server or operating system levels. The
testing team can also identify security issues in the configuration of firewall and other network perimeter
devices.
Once identified, the team will assess if further exploitation can safely provide any additional meaningful
information or if the extent of the vulnerability has been established. In all cases the recommendations to
identified vulnerabilities is provided so that the identified vulnerabilities can be fixed.
Assessments are usually conducted from the point of view of both an unauthorized attacker and as an
authorized malicious user who may be intent on either elevating their privileges or attacking the application for
other gain.
5|Page
Security Assessment Web Application Security Test Results
From To
6|Page
Security Assessment Web Application Security Test Results
2.4 Detailed Findings and Recommendations
The following section specifically illustrates the findings and recommendations that should be implemented to better secure and control the application. As
with all recommendations that affect computer systems and production processing, these recommendations should be tested during non-production hours
prior to their implementation. It is also prudent to have a full-system backup prior to implementing system changes.
0.0 Observation
7|Page
Security Assessment Web Application Security Test Results
Score 0–2 3–4 5-6 7-8 9 - 10
Damage Potential Trivial information about Significant information Extended or increased Full control of the Full compromise of Network
the target disclosed. about the target functional control of the application and/or the ability or Database Infrastructure.
Trivial cost associated architecture and/or application and/or underlying to view underlying network Extensive cost associated
with impact application disclosed. system. Moderate cost or database infrastructure. with impact
Limited cost associated associated with impact Large cost associated with
with impact impact
Reproducibility Very difficult to Difficult to reproduce Moderately difficult to Easy to reproduce (within 5 Very easy to reproduce (30
reproduce (more than 24 (within 24 hours) reproduce (within 2 hours) minutes) seconds or less)
hours)
Exploitability Seasoned security skills Extensive skills and tools Moderate skills and tools limited skills and tools No skill or tools required
and/or specialised tools required required required
required
Affected Users Very small limited user Small user group (100 - Moderate user group (between Large user group (between Open to the general Internet
group (under 100) 1,000) 1,000 - 5,000) 5,000 - 20,000) with no authentication or
very large group requiring
authentication (20,000++)
Discoverability Very difficult to find Difficult to find (within 24 Moderate effort required to Easily found (within 2 hour) Very easily found (within 1
(over 24 hours) hours) find (within 4 hours) hour)
8|Page
Security Assessment Web Application Security Test Results
2.6 Detailed Main Findings and Recommendations Matrix
The following matrix outlines the main findings from the testing that was conducted.
D.R.E.A.D Threat Rating (out of 10)
D R E A D Total
Damage Potential
Reproducibility
Discoverability
Affected Users
Exploitability
No Finding / Description/ Impact Recommendations for Improvement
7 7 7 6 8 7 M
6 7 6 5 5 6 M
9|Page
Security Assessment Web Application Security Test Results
D.R.E.A.D Threat Rating (out of 10)
8 6.5 M
8.5 H
7. S e s s i o n Use HTTPs
h i j a c k i n g Use HTTPOnly
8 7 8 6 7
Session management and key
Identity verification 7.5 M
10 | P a g e
Security Assessment Web Application Security Test Results
Cross Site Scripting - reflected The site is vulnerable to xss as html and javascript can
be
16 January
2022 Used to maniplate site
PHPSESSID=m1u4k1mpo8kqmg96576tv77emo
<script>alert(document.cookie)</script>
xvwa/vulnerabilities/fi/?file=index.php
24 January 2022 File inclusion local file inclusion works as an attack as index.php
is shown on the website
remote files wont work until server setting
changed
note:
if allow_url_include Is set to on this would work.
11 | P a g e
Security Assessment Web Application Security Test Results
27 January 2022
SQL injection(blind)
<a
href="redirect.php?forward=https://google.com">Open
Web Application Security Project</a>
CSRF
2 February 2022 /xvwa/vulnerabilities/csrf/?
passwd=1234&confirm=1234&submit=submit
/xvwa/vulnerabilities/csrf/?
passwd=123&confirm=123&submit=submit
so the token can be used to login into the user that was signed
in , in a private window hijacking the session
12 | P a g e