ACS Penetration Testing Report v1
ACS Penetration Testing Report v1
MENU
VERSIONING
Version Description Staff Date
V0.1 Initial scan and report update Phi Manh Loi 10/01/2021
V0.2 Testing and report update Mai Anh 15/01/2021
V0.3 Reinitial scan and report update Phi Manh Loi 27/02/2021
V0.4 Retesting and report update Mai Anh 01/03/2021
V1.0 QA and Final report Mai Anh 06/03/2021
SCOPE
List of Applications are mentioned in the following table. Testing did not
attempt Denial of Service tests. However, Denial of Service vulnerabilities
inferred from test without active exploitation are reported in this report
The observed vulnerabilities were mitigated successfully during the retest of the
application.
No ID Vulnerability Risk Status
Level
1 H1 Use immutable string to store passwords High Closed
2 L1 Missing key location configuration Low Closed
3 H2 OTP generate function is not strong enough High Closed
Chart Title
2
1.8
1.6
1.4 2
1.2
1
0.8
1
0.6
0.4
0.2 0
0
Low Medium High
1. Injection. Injection flaws, such as SQL, NoSQL, OS, and LDAP injection,
occur when untrusted data is sent to an interpreter as part of a command or
query. The attacker’s hostile data can trick the interpreter into executing
unintended commands or accessing data without proper authorization.
2. Broken Authentication. Application functions related to authentication and
session management are often implemented incorrectly, allowing attackers
to compromise passwords, keys, or session tokens, or to exploit other
implementation flaws to assume other users’ identities temporarily or
permanently.
3. Sensitive Data Exposure. Many web applications and APIs do not properly
protect sensitive data, such as financial, healthcare, and PII. Attackers may
steal or modify such weakly protected data to conduct credit card fraud,
identity theft, or other crimes. Sensitive data may be compromised without
extra protection, such as encryption at rest or in transit, and requires special
precautions when exchanged with the browser.
4. XML External Entities (XXE). Many older or poorly configured XML
processors evaluate external entity references within XML documents.
External entities can be used to disclose internal files using the file URI
handler, internal file shares, internal port scanning, remote code execution,
and denial of service attacks.
5. Broken Access Control. Restrictions on what authenticated users are
allowed to do are often not properly enforced. Attackers can exploit these
flaws to access unauthorized functionality and/or data, such as access other
users’ accounts, view sensitive files, modify other users’ data, change access
rights, etc.
6. Security Misconfiguration. Security misconfiguration is the most
commonly seen issue. This is commonly a result of insecure default
configurations, incomplete or ad hoc configurations, open cloud storage,
misconfigured HTTP headers, and verbose error messages containing
sensitive information. Not only must all operating systems, frameworks,
libraries, and applications be securely configured, but they must be
patched/upgraded in a timely fashion.
7. Cross-Site Scripting (XSS). XSS flaws occur whenever an application
includes untrusted data in a new web page without proper validation or
escaping, or updates an existing web page with user-supplied data using a
browser API that can create HTML or JavaScript. XSS allows attackers to
execute scripts in the victim’s browser which can hijack user sessions,
deface web sites, or redirect the user to malicious sites.
8. Insecure Deserialization. Insecure deserialization often leads to remote
code execution. Even if deserialization flaws do not result in remote code
execution, they can be used to perform attacks, including replay attacks,
injection attacks, and privilege escalation attacks.
9. Using Components with Known Vulnerabilities. Components, such as
libraries, frameworks, and other software modules, run with the same
privileges as the application. If a vulnerable component is exploited, such an
attack can facilitate serious data loss or server takeover. Applications and
APIs using components with known vulnerabilities may undermine
application defenses and enable various attacks and impacts.
10.Insufficient Logging & Monitoring. Insufficient logging and monitoring,
coupled with missing or ineffective integration with incident response,
allows attackers to further attack systems, maintain persistence, pivot to
more systems, and tamper, extract, or destroy data. Most breach studies
show time to detect a breach is over 200 days, typically detected by external
parties rather than internal processes or monitoring.
11.A Denial-of-Service (DoS) attack is an attack meant to shut down a
machine or network, making it inaccessible to its intended users. DoS
attacks accomplish this by flooding the target with traffic, or sending it
information that triggers a crash.
12.Buffer overflow exploit Attackers exploit buffer overflow issues by
overwriting the memory of an application. This changes the execution path
of the program, triggering a response that damages files or exposes private
information.
13.Brute Force Attacks. A common threat web developers face is a password-
guessing attack known as a brute force attack. A brute-force attack is an
attempt to discover a password by systematically trying every possible
combination of letters, numbers, and symbols until you discover the one
correct combination that works. If your web site requires user
authentication, you are a good target for a brute-force attack.
14.Password Lockout. The most obvious way to block brute-force attacks is to
simply lock out accounts after a defined number of incorrect password
attempts. Account lockouts can last a specific duration, such as one hour, or
the accounts could remain locked until manually unlocked by an
administrator.