2022 12 27 ZAP Report
2022 12 27 ZAP Report
Site: http://archive.jmtohcs.cloud
Generated on Tue, 27 Dec 2022 08:16:53
Summary of Alerts
Alerts
Number of
Name Risk Level
Instances
Content Security Policy (CSP) Header Not Set Medium 3
Vulnerable JS Library Medium 1
Cookie No HttpOnly Flag Low 6
Cookie without SameSite Attribute Low 12
X-Content-Type-Options Header Missing Low 7
Information Disclosure - Suspicious Comments Informational 17
Alert Detail
URL http://archive.jmtohcs.cloud
Method GET
Attack
Evidence
URL http://archive.jmtohcs.cloud/login
Method GET
Attack
Evidence
URL http://archive.jmtohcs.cloud/password/reset
Method GET
Attack
Evidence
Instances 3
Ensure that your web server, application server, load balancer, etc. is configured to set the
Content-Security-Policy header, to achieve optimal browser support: "Content-Security-
Solution
Policy" for Chrome 25+, Firefox 23+ and Safari 7+, "X-Content-Security-Policy" for Firefox
4.0+ and Internet Explorer 10+, and "X-WebKit-CSP" for Chrome 14+ and Safari 6+.
https://developer.mozilla.org/en-US/docs/Web/Security/CSP
/Introducing_Content_Security_Policy
https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html
Reference http://www.w3.org/TR/CSP/
http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html
http://www.html5rocks.com/en/tutorials/security/content-security-policy/
http://caniuse.com/#feat=contentsecuritypolicy
http://content-security-policy.com/
CWE Id 693
WASC Id 15
Plugin Id 10038
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence /*! jQuery UI - v1.12.1
Instances 1
Solution Please upgrade to the latest version of jquery-ui.
https://bugs.jqueryui.com/ticket/15284
https://nvd.nist.gov/vuln/detail/CVE-2022-31160
https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9
https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327
Reference
https://nvd.nist.gov/vuln/detail/CVE-2021-41184
https://nvd.nist.gov/vuln/detail/CVE-2021-41183
https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc
https://nvd.nist.gov/vuln/detail/CVE-2021-41182
CWE Id 829
WASC Id
Plugin Id 10003
URL http://archive.jmtohcs.cloud
Method GET
Attack
Evidence Set-Cookie: XSRF-TOKEN
URL http://archive.jmtohcs.cloud/
Method GET
Attack
Evidence Set-Cookie: XSRF-TOKEN
URL http://archive.jmtohcs.cloud/login
Method GET
Attack
Evidence Set-Cookie: XSRF-TOKEN
URL http://archive.jmtohcs.cloud/password/reset
Method GET
Attack
Evidence Set-Cookie: XSRF-TOKEN
URL http://archive.jmtohcs.cloud/login
Method POST
Attack
Evidence Set-Cookie: XSRF-TOKEN
URL http://archive.jmtohcs.cloud/password/email
Method POST
Attack
Evidence Set-Cookie: XSRF-TOKEN
Instances 6
Solution Ensure that the HttpOnly flag is set for all cookies.
Reference https://owasp.org/www-community/HttpOnly
CWE Id 1004
WASC Id 13
Plugin Id 10010
URL http://archive.jmtohcs.cloud
Method GET
Attack
Evidence Set-Cookie: snipeit_session
URL http://archive.jmtohcs.cloud
Method GET
Attack
Evidence Set-Cookie: XSRF-TOKEN
URL http://archive.jmtohcs.cloud/
Method GET
Attack
Evidence Set-Cookie: snipeit_session
URL http://archive.jmtohcs.cloud/
Method GET
Attack
Evidence Set-Cookie: XSRF-TOKEN
URL http://archive.jmtohcs.cloud/login
Method GET
Attack
Evidence Set-Cookie: snipeit_session
URL http://archive.jmtohcs.cloud/login
Method GET
Attack
Evidence Set-Cookie: XSRF-TOKEN
URL http://archive.jmtohcs.cloud/password/reset
Method GET
Attack
Evidence Set-Cookie: snipeit_session
URL http://archive.jmtohcs.cloud/password/reset
Method GET
Attack
Evidence Set-Cookie: XSRF-TOKEN
URL http://archive.jmtohcs.cloud/login
Method POST
Attack
Evidence Set-Cookie: snipeit_session
URL http://archive.jmtohcs.cloud/login
Method POST
Attack
Evidence Set-Cookie: XSRF-TOKEN
URL http://archive.jmtohcs.cloud/password/email
Method POST
Attack
Evidence Set-Cookie: snipeit_session
URL http://archive.jmtohcs.cloud/password/email
Method POST
Attack
Evidence Set-Cookie: XSRF-TOKEN
Instances 12
Solution Ensure that the SameSite attribute is set to either 'lax' or ideally 'strict' for all cookies.
Reference https://tools.ietf.org/html/draft-ietf-httpbis-cookie-same-site
CWE Id 1275
WASC Id 13
Plugin Id 10054
URL http://archive.jmtohcs.cloud/css/dist/all.css?id=45dfcf96080d80030e52951ac1947e96
Method GET
Attack
Evidence
URL http://archive.jmtohcs.cloud/css/dist/blue.png
Method GET
Attack
Evidence
URL http://archive.jmtohcs.cloud/css/webfonts/fa-solid-900.woff2
Method GET
Attack
Evidence
URL http://archive.jmtohcs.cloud/favicon.ico
Method GET
Attack
Evidence
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence
URL http://archive.jmtohcs.cloud/uploads/setting-logo-vjtWfjxxpx.svg
Method GET
Attack
Evidence
URL http://archive.jmtohcs.cloud/vendor/livewire/livewire.js?id=c69d0f2801c01fcf8166
Method GET
Attack
Evidence
Instances 7
Ensure that the application/web server sets the Content-Type header appropriately, and
that it sets the X-Content-Type-Options header to 'nosniff' for all web pages.
Solution
If possible, ensure that the end user uses a standards-compliant and modern web browser
that does not perform MIME-sniffing at all, or that can be directed by the web application
/web server to not perform MIME-sniffing.
http://msdn.microsoft.com/en-us/library/ie/gg622941%28v=vs.85%29.aspx
Reference
https://owasp.org/www-community/Security_Headers
CWE Id 693
WASC Id 15
Plugin Id 10021
Informational Information Disclosure - Suspicious Comments
The response appears to contain suspicious comments which may help an attacker. Note:
Description
Matches made within script blocks or files are against the entire content not only comments.
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence admin
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence bug
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence bugs
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence DB
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence from
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence later
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence query
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence select
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence TODO
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence user
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence username
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence where
URL http://archive.jmtohcs.cloud/js/dist/all.js?id=ea971e5285bb940af1a908bbeeb6fcb8
Method GET
Attack
Evidence xxx
URL http://archive.jmtohcs.cloud/vendor/livewire/livewire.js?id=c69d0f2801c01fcf8166
Method GET
Attack
Evidence from
URL http://archive.jmtohcs.cloud/vendor/livewire/livewire.js?id=c69d0f2801c01fcf8166
Method GET
Attack
Evidence SELECT
URL http://archive.jmtohcs.cloud
Method GET
Attack
Evidence from
URL http://archive.jmtohcs.cloud/login
Method GET
Attack
Evidence from
Instances 17
Remove all comments that return information that may help an attacker and fix any
Solution
underlying problems they refer to.
Reference
CWE Id 200
WASC Id 13
Plugin Id 10027