Sample Report Web
Sample Report Web
Confidential
The issues identified and proposed action plans in this report are
based on our testing. We made specific efforts to verify the
accuracy and authenticity of the information gathered only in
those cases where it was felt necessary.
SCAN DETAILS | 2
THREAT DISTRIBUTION |2
1. SQL Injection | 3
2. Reflected Cross Site Scripting |9
3. Lack of password brute force prevention | 13
4. Information leakage through HTTP response headers | 14
EXECUTIVE
SUMMARY
BACKGROUND
On Dec 1 2020, Client A engaged Cybereaon to perform a security assessment of
their Damn Vulnerable Web Application (DVWA) in an effort to ensure the
security of their customer's personal information, which is processed and stored
by the DVWA application.
APPLICATION HEALTH
HIGH
OBSERVATIONS
During the course of this engagement we observed several areas of concern
that we believe could pose a significant risk to the security of the application
and should be addressed in a timely manner. Exploiting these vulnerabilities an
attacker can retrieve any data from the database which includes sensitive
customer data or take over other user's account.
Add CAPTCHA to the login page after three failed login attempts.
01
SCAN DETAILS
Start Date 5th May, 2020
Finish Date 9th May, 2020
Scan Time 5 Days
Server Technology PHP
URL https://hack.me/101047/dvwa-107.html
Credentials User: admin Role: Administrator
Scope Black-Box
THREAT DISTRIBUTION
SEVERITY LEVEL COLOR INDICATOR CVSS CATEGORY
THREAT ANALYSIS
BY INSTANCE COUNT AND CVSS
INSTANCE COUNT
1 1 1 1
THREAT ANALYSIS
BY SEVERITY LEVEL
02
1 SQL INJECTION
Vulnerability Class
https://hack.me/101047/dvwa-107.htmlvulnerabilities/sqli/index.php
URL
id
Parameter
OBSERVATION
DVWA web application does not validate a user input which is then consumed inside
SQL queries. This allows an attacker to provide an input containing SQL statements
to modify the output in a way to retrieve desired data from the database. This
vulnerability in the application is termed as SQL injection. With this vulnerability, an
attacker can dump entire data from the database which the current database user
has privileges to access to.
EXHIBITS
03
Navigate to https://hack.me/101047/dvwa-107.html/vulnerabilities/ sqli/index.php
and search for user id 1' as shown in the below screenshot.
You have an error in your SQL syntax; check the manual that corresponds
to your MySQL server version for the right syntax to use near '\'' at line
1
This error indicates that the user input is consumed to form dynamic SQL strings.
With this knowledge, Cybereaon analysts were able to retrieve arbitrary data from
the database
04
Following payload will extract database version and the database name
Database Name
Current user
05
USER INFORMATION
Username Password
Note: Password hashes are partially masked for the security reason.
IMPACT
An attacker can dump entire data from the database that is available to the privilege of current
database user. User credentials dumped can further be misused to gain unauthorized access to
other user's account. A user only privilege account can be used to conduct this attack in order
to gain admin privilege access.
RECOMMENDATION
06
2 REFLECTED CROSS SITE SCRIPTING
Vulnerability Class
https://hack.me/101047/dvwa-107.html /vulnerabilities/xss_r
URL
name
Parameter
OBSERVATION
The DVWA web application for mobile does not perform output encoding of
special characters to prevent Cross Site Scripting vulnerabilities. In one instance
user supplied input containing special characters such as <, >, ', /, etc. is echoed
back in HTML response without any output encoding performed. This allows an
attacker to input malicious JavaScript which can steal victim's cookie, redirect
them to other malicious website, etc.
EXHIBITS
Step 1
Navigate to http://hack.me/ vulnerabilities/xss_r.
07
Navigate tohttp://hack.me/vulnerabilities/xss_r
<iframe onload="alert(document.location)">
08
A dialog box with current URL value will be shown as a result of our payload
09
IMPACT
Reflected Cross Site Scripting is relatively complex to exploit as the malicious payload has to be
send as a part of URL and user should be tricked to visit that URL. However, it has the same impact
as that of a persistent XSS. In DVWA application, XSS can be used to hijack victim's session and
thereby gaining complete access to his/her user account. Additionally, it can be used to redirect
victim to a malicious website which may contain browser exploits or a phishing page.
RECOMMENDATION
10
3 LACK OF PASSWORD BRUTE FORCE PREVENTION
Vulnerability Class
http://hack.me/login.php
URL
password
Parameter
OBSERVATION
The DVWA application does not lockout a user account or provides CAPTCHA
when 'n' failed login attempts is made. Cybereaon analysts tried with a threshold
of 15 failed login attempts during which account neither locked out or a
CAPTCHA was provided.
EXHIBITS
Step 1
Navigate to the login page of http://s28280-101047-qho.sipontum.
hack.me and provide an invald username and password.
Step 2
Repeat step 1 multiple times. You will notice that application will
neither provide any CAPTCHA to the user or will block victim user's
account.
Step 3
Use a valid password and the application will redirect you to
the account details rather than displaying an error message
indicating that the account is locked out
11
IMPACT
An attacker can use brute force attack to guess valid password for an account. In a brute force attack,
automated software is used to generate a large number of consecutive guesses as to the value of
the desired data. Another form of brute force attack known as a dictionary attack might try all the
words in a dictionary to guess the user password. Moreover, due to the failure of strong password
policy control, this vulnerability is relatively easy to exploit.
RECOMMENDATION
Password brute force attacks can be prevented by providing user with a strong CAPTCHA
value upon 3 failed attempts. Additionally, blocking IP address or temporary account
lockout can be implemented after 15 failed attempts. The later method can also be
misused by an attacker to lock multiple user accounts and thereby creating a denial of
service like situation.
References: https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks
12
4 INFORMATION LEAKAGE THROUGH HTTP RESPONSE HEADERS
Vulnerability Class
URL http://hack.me/
Not Applicable
Parameter
OBSERVATION
The web server hosting DVWA application is misconfigured due to which application
server version is exposed to end users.
EXHIBITS
Step 1
Request any web page of the application and observe the response
headers through BURP suite as shown below,.
13
IMPACT
Attacker can know the version of the PHP running on the web server by the header and
can search for the known vulnerabilities of PHP 5.4.23 for further exploitation.
There is no direct impact to business with this vulnerability but falls under security best
practices.
RECOMMENDATION
14