Sample Report
Sample Report
One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user
can exploit these vulnerabilities and compromise the backend database and/or deface your website.
Alerts distribution
Executive summary
Alert group Severity Alert count
SQL injection
Directory traversal
File inclusion
Backup files
The WS_FTP log file found vulnerability is a security issue that occurs
when log files generated by the WS_FTP server, a popular FTP
server software, are inadvertently exposed to unauthorized users. In
simpler terms, it's like a burglar finding a key to a house and being
able to enter and steal valuable items. WS_FTP server log files
contain information about the FTP server's activity, including user
logins, file transfers, and server errors. If these log files are accessible
to unauthorized users, they can be exploited to gain sensitive Medium 1
information about the server and its users. This can happen if the log
files are not stored in a secure location or if file permissions are set
improperly. To prevent this vulnerability, it is important to ensure that
WS_FTP log files are stored in a secure location and are only
accessible to authorized users. This can be done by configuring
proper file permissions and restricting access to the directory where
the log files are located. Regular security audits and testing can also
help identify and address vulnerabilities related to log files. Overall, it's
important to take appropriate measures to prevent WS_FTP log file
vulnerabilities and keep FTP servers secure.
Developer Report
Threat level
One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user
can exploit these vulnerabilities and compromise the backend database and/or deface your website.
Alerts distribution
Affected items
Web Server
Alert group Cross site scripting
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URI was set to 1<ScRiPt>Tj0s(9493)</ScRiPt>
Details
The input is reflected inside a text element.
GET /404.php?1<ScRiPt>Tj0s(9493)</ScRiPt> HTTP/1.1
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/AJAX/showxml.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
Cookie input mycookie was set to 3'"()&%<zzz><ScRiPt >Hgly(9891)
Details
</ScRiPt>
POST /AJAX/showxml.php HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: https://www.google.com/search?hl=en&q=testing
Cookie: mycookie=3'"()&%<zzz><ScRiPt%20>Hgly(9891)</ScRiPt>
Content-Length: 0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/comment.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded POST input name was set to <your name here>'"()&%
Details
<zzz><ScRiPt >lcyA(9740)</ScRiPt>
POST /comment.php HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 132
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Submit=Submit&comment=555&name=<your%20name%20here>'"()%26%25<zzz>
<ScRiPt%20>lcyA(9740)</ScRiPt>&phpaction=echo%20%24_POST[comment];
/guestbook.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded POST input name was set to anonymous user'"()&%
Details
<zzz><ScRiPt >SU7r(9732)</ScRiPt>
POST /guestbook.php HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 96
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
name=anonymous%20user'"()%26%25<zzz><ScRiPt%20>SU7r(9732)
</ScRiPt>&submit=add%20message&text=555
/guestbook.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded POST input text was set to 555'"()&%<zzz><ScRiPt
Details
>SU7r(9977)</ScRiPt>
POST /guestbook.php HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 96
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
name=anonymous%20user&submit=add%20message&text=555'"()%26%25<zzz>
<ScRiPt%20>SU7r(9977)</ScRiPt>
/hpp/
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded GET input pp was set to 12'"()&%<zzz><ScRiPt
Details
>Nyti(9095)</ScRiPt>
GET /hpp/?pp=12'"()%26%25<zzz><ScRiPt%20>Nyti(9095)</ScRiPt> HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/hpp/params.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded GET input p was set to 1'"()&%<zzz><ScRiPt
Details
>ktJB(9020)</ScRiPt>
GET /hpp/params.php?p=1'"()%26%25<zzz><ScRiPt%20>ktJB(9020)</ScRiPt>
HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/hpp/params.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded GET input pp was set to 12'"()&%<zzz><ScRiPt
Details
>xXto(9433)</ScRiPt>
GET /hpp/params.php?p=valid&pp=12'"()%26%25<zzz><ScRiPt%20>xXto(9433)
</ScRiPt> HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/listproducts.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded GET input artist was set to 1'"()&%<zzz><ScRiPt
Details
>fUJU(9650)</ScRiPt>
GET /listproducts.php?artist=1'"()%26%25<zzz><ScRiPt%20>fUJU(9650)
</ScRiPt> HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/listproducts.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded GET input cat was set to 1'"()&%<zzz><ScRiPt
Details
>FN8b(9046)</ScRiPt>
GET /listproducts.php?cat=1'"()%26%25<zzz><ScRiPt%20>FN8b(9046)</ScRiPt>
HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/search.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
POST (multipart) input searchFor was set to the'"()&%<zzz><ScRiPt
Details
>ugFU(9844)</ScRiPt>
POST /search.php?test=query HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Accept: */*
Referer: http://testphp.vulnweb.com/
Content-Length: 148
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
------------YWJkMTQzNDcw
the'"()&%<zzz><ScRiPt >ugFU(9844)</ScRiPt>
------------YWJkMTQzNDcw--
/secured/newuser.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded POST input uaddress was set to 555'"()&%<zzz>
Details
<ScRiPt >01Pf(9919)</ScRiPt>
POST /secured/newuser.php HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 220
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=555'"()%26%25<zzz><ScRiPt%20>01Pf(9919)
</ScRiPt>&ucc=4111111111111111&uemail=testing%40example.com&upass=u]H[ww6K
rA9F.x-F&upass2=u]H[ww6KrA9F.x-F&uphone=555-666-
0606&urname=pHqghUme&uuname=pHqghUme
/secured/newuser.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded POST input ucc was set to 4111111111111111'"()&%
Details
<zzz><ScRiPt >01Pf(9597)</ScRiPt>
POST /secured/newuser.php HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 220
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=555&ucc=4111111111111111'"()%26%25<zzz>
<ScRiPt%20>01Pf(9597)
</ScRiPt>&uemail=testing%40example.com&upass=u]H[ww6KrA9F.x-
F&upass2=u]H[ww6KrA9F.x-F&uphone=555-666-
0606&urname=pHqghUme&uuname=pHqghUme
/secured/newuser.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded POST input uemail was set to [email protected]'"
Details
()&%<zzz><ScRiPt >01Pf(9203)</ScRiPt>
POST /secured/newuser.php HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 220
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=555&ucc=4111111111111111&uemail=testing%40example.c
om'"()%26%25<zzz><ScRiPt%20>01Pf(9203)</ScRiPt>&upass=u]H[ww6KrA9F.x-
F&upass2=u]H[ww6KrA9F.x-F&uphone=555-666-
0606&urname=pHqghUme&uuname=pHqghUme
/secured/newuser.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded POST input uphone was set to 555-666-0606'"()&%
Details
<zzz><ScRiPt >01Pf(9871)</ScRiPt>
POST /secured/newuser.php HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 220
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=555&ucc=4111111111111111&uemail=testing%40example.c
om&upass=u]H[ww6KrA9F.x-F&upass2=u]H[ww6KrA9F.x-F&uphone=555-666-0606'"
()%26%25<zzz><ScRiPt%20>01Pf(9871)
</ScRiPt>&urname=pHqghUme&uuname=pHqghUme
/secured/newuser.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded POST input urname was set to pHqghUme'"()&%<zzz>
Details
<ScRiPt >01Pf(9064)</ScRiPt>
POST /secured/newuser.php HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 220
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=555&ucc=4111111111111111&uemail=testing%40example.c
om&upass=u]H[ww6KrA9F.x-F&upass2=u]H[ww6KrA9F.x-F&uphone=555-666-
0606&urname=pHqghUme'"()%26%25<zzz><ScRiPt%20>01Pf(9064)
</ScRiPt>&uuname=pHqghUme
/secured/newuser.php
Alert group Cross site scripting (verified)
Severity High
Cross-site Scripting (XSS) refers to client-side code injection attack
wherein an attacker can execute malicious scripts into a legitimate
Description website or web application. XSS occurs when a web application makes
use of unvalidated or unencoded user input within the output it
generates.
Apply context-dependent encoding and/or validation to user input
Recommendations
rendered on a page
Alert variants
URL encoded POST input uuname was set to pHqghUme'"()&%<zzz>
Details
<ScRiPt >01Pf(9757)</ScRiPt>
POST /secured/newuser.php HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 220
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=555&ucc=4111111111111111&uemail=testing%40example.c
om&upass=u]H[ww6KrA9F.x-F&upass2=u]H[ww6KrA9F.x-F&uphone=555-666-
0606&urname=pHqghUme&uuname=pHqghUme'"()%26%25<zzz><ScRiPt%20>01Pf(9757)
</ScRiPt>
/showimage.php
Alert group Directory traversal (verified)
Severity High
This script is possibly vulnerable to directory traversal attacks.
GET /showimage.php?file=1531486/../../xxx%5C..%5C..%5C413439&size=160
HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/showimage.php
Alert group File inclusion
Severity High
This script is possibly vulnerable to file inclusion attacks.
Description It seems that this script includes a file which name is determined using
user-supplied data. This data is not properly validated before being
passed to the include function.
Edit the source code to ensure that input is properly validated. Where is
possible, it is recommended to make a list of accepted filenames and
restrict the input to that list.
Recommendations
For PHP, the option allow_url_fopen would normally allow a
programmer to open, include or otherwise use a remote file using a URL
rather than a local file path. It is recommended to disable this option from
php.ini.
Alert variants
URL encoded GET input file was set to showimage.php
Pattern found:
<?php
header("Content-Type: image/jpeg");
$name = $_GET["file"];
// restrict urls
exit();
header("Content-Type: image/jpeg");
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group PHP allow_url_fopen enabled (verified)
Severity High
The PHP configuration directive allow_url_fopen is enabled. When
enabled, this directive allows data retrieval from remote locations (web
site or FTP server). A large number of code injection vulnerabilities
Description reported in PHP-based web applications are caused by the combination
of enabling allow_url_fopen and bad input filtering.
php.ini
Recommendations
allow_url_fopen = 'off'
.htaccess
php_flag allow_url_fopen off
Alert variants
Current setting is : allow_url_fopen = on
Details
Observed on /
/admin/create.sql
Alert group Possible database backup
Severity High
Manual confirmation is required for this alert.
Range: bytes=0-99999
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
Path Fragment input /<s>/<s>-[*].html was set to
Details 1Start463531'"392457End
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/AJAX/infoartist.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded GET input id was set to 1Start021115'"677640End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Accept: */*
Referer: http://testphp.vulnweb.com/
Cookie: mycookie=3
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/AJAX/infocateg.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded GET input id was set to 1Start882013'"169051End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Accept: */*
Referer: http://testphp.vulnweb.com/
Cookie: mycookie=3
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/AJAX/infotitle.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded POST input id was set to 1Start765121'"385116End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://testphp.vulnweb.com/
Cookie: mycookie=3
Content-Length: 32
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
id=1Start765121'"385116End
/artists.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded GET input artist was set to 1Start227726'"415005End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/listproducts.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded GET input artist was set to 1Start437204'"411370End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/listproducts.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded GET input cat was set to 1Start207412'"968828End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/Mod_Rewrite_Shop/Bu
yProduct-1/
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
Details
GET /Mod_Rewrite_Shop/BuyProduct-1/?id=1START'"END HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
User-Agent: 1'"2000
referer: 1'"3000
client-ip: 1'"4000
x-forwarded-for: 1'"5000
accept-language: 1'"6000
via: 1'"7000
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/Mod_Rewrite_Shop/Bu
yProduct-2/
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
Details
GET /Mod_Rewrite_Shop/BuyProduct-2/?id=1START'"END HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
User-Agent: 1'"2000
referer: 1'"3000
client-ip: 1'"4000
x-forwarded-for: 1'"5000
accept-language: 1'"6000
via: 1'"7000
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/Mod_Rewrite_Shop/Bu
yProduct-3/
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
Details
GET /Mod_Rewrite_Shop/BuyProduct-3/?id=1START'"END HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
User-Agent: 1'"2000
referer: 1'"3000
client-ip: 1'"4000
x-forwarded-for: 1'"5000
accept-language: 1'"6000
via: 1'"7000
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/Mod_Rewrite_Shop/Det
ails/color-printer/3/
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
Details
GET /Mod_Rewrite_Shop/Details/color-printer/3/?id=1START'"END HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
User-Agent: 1'"2000
referer: 1'"3000
client-ip: 1'"4000
x-forwarded-for: 1'"5000
accept-language: 1'"6000
via: 1'"7000
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/Mod_Rewrite_Shop/Det
ails/network-attached-
storage-dlink/1/
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
Details
GET /Mod_Rewrite_Shop/Details/network-attached-storage-dlink/1/?
id=1START'"END HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
User-Agent: 1'"2000
referer: 1'"3000
client-ip: 1'"4000
x-forwarded-for: 1'"5000
accept-language: 1'"6000
via: 1'"7000
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/Mod_Rewrite_Shop/Det
ails/web-camera-
a4tech/2/
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
Details
GET /Mod_Rewrite_Shop/Details/web-camera-a4tech/2/?id=1START'"END HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
User-Agent: 1'"2000
referer: 1'"3000
client-ip: 1'"4000
x-forwarded-for: 1'"5000
accept-language: 1'"6000
via: 1'"7000
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/product.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded GET input pic was set to 1Start914352'"611484End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/search.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
POST (multipart) input searchFor was set to 1Start609544'"738136End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Accept: */*
Referer: http://testphp.vulnweb.com/
Content-Length: 135
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
------------YWJkMTQzNDcw
1Start609544'"738136End
------------YWJkMTQzNDcw--
/search.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded GET input test was set to 1Start187637'"566108End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Accept: */*
Referer: http://testphp.vulnweb.com/
Content-Length: 109
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
------------YWJkMTQzNDcw
the
------------YWJkMTQzNDcw--
/secured/newuser.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded POST input uuname was set to
Details 1Start866597'"192117End
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 196
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=555&ucc=4111111111111111&uemail=testing%40example.c
om&upass=u]H[ww6KrA9F.x-F&upass2=u]H[ww6KrA9F.x-F&uphone=555-666-
0606&urname=pHqghUme&uuname=1Start866597'"192117End
/userinfo.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded POST input pass was set to 1Start379432'"263652End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 49
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
pass=1Start379432'"263652End&uname=pHqghUme
/userinfo.php
Alert group SQL injection (verified)
Severity High
SQL injection (SQLi) refers to an injection attack wherein an attacker can
Description execute malicious SQL statements that control a web application's
database server.
Use parameterized queries when dealing with SQL queries that contain
user input. Parameterized queries allow the database to understand
Recommendations
which parts of the SQL query should be considered as user input,
therefore solving SQL injection.
Alert variants
URL encoded POST input uname was set to 1Start823519'"541292End
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Content-Length: 57
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
pass=u]H[ww6KrA9F.x-F&uname=1Start823519'"541292End
/vendor/installed.json
Alert group Vulnerable package dependencies [high]
Severity High
One or more packages that are used in your web application are
Description affected by known vulnerabilities. Please consult the details section for
more information about each affected package.
It's recommended to update the vulnerable packages to the latest
version (if a fix exists). If a fix does not exist, you may want to suggest
Recommendations
changes that address the vulnerability to the package maintainer or
remove the package from your dependency tree.
Alert variants
List of vulnerable composer packages:
Package: phpmailer/phpmailer
Version: 6.1.8.0
CVE: CVE-2021-34551
Title: Unrestricted Upload of File with Dangerous Type
Description: PHPMailer before 6.5.0 on Windows allows remote code
execution if lang_path is untrusted data and has a UNC pathname.
CVSS V2: AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS V3: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE: CWE-434
References:
https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/3YRMWGA4VTMXFB22KIC
MB7YMFZNFV3EJ/
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/FJYSOFCUBS67J3TKR74S
D3C454N7VTYM/
Package: phpmailer/phpmailer
Version: 6.1.8.0
CVE: CVE-2021-3603
Title: Inclusion of Functionality from Untrusted Control Sphere
Description: PHPMailer 6.4.1 and earlier contain a vulnerability that can
result in untrusted code being called (if such code is injected into the
host project's scope by other means). If the $patternselect parameter to
validateAddress() is set to 'php' (the default, defined by
PHPMailer::$validator), and the global namespace contains a function
called php, it will be called in preference to the built-in validator of the
same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple
strings as validator function names.
CVSS V2: AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS V3: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE: CWE-829
References:
https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf
49b9b249a9ee36a5f7f3
https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/3YRMWGA4VTMXFB22KIC
MB7YMFZNFV3EJ/
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/FJYSOFCUBS67J3TKR74S
D3C454N7VTYM/
Package: phpmailer/phpmailer
Version: 6.1.8.0
CVE: CVE-2020-36326
Title: Deserialization of Untrusted Data
Description: PHPMailer 6.1.8 through 6.4.0 allows object injection
through Phar Deserialization via addAttachment with a UNC pathname.
NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed
a functionality problem in which UNC pathnames were always
considered unreadable by PHPMailer, even in safe contexts. As an
unintended side effect, this fix eliminated the code that blocked
addAttachment exploitation.
CVSS V2: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE: CWE-502
References:
https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba
21d0242c5950c56e4c6f9
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/KPU66INRFY5BQ3ESVPR
UXJR4DXQAFJVT/
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/3B5WDPGUFNPG4NAZ6G
4BZX43BKLAVA5B/
Package: phpunit/phpunit
Version: 5.6.2.0
CVE: CVE-2017-9841
Title: Improper Control of Generation of Code ('Code Injection')
Description: Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x
before 5.6.3 allows remote attackers to execute arbitrary PHP code via
HTTP POST data beginning with a "<?php " substring, as demonstrated
by an attack on a site with an exposed /vendor folder, i.e., external
access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
CVSS V2: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE: CWE-94
References:
https://github.com/sebastianbergmann/phpunit/pull/1956
https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0
845d23f42974a583d8f59bf5a5
http://www.securityfocus.com/bid/101798
http://www.securitytracker.com/id/1039812
https://security.gentoo.org/glsa/201711-15
http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.c
om/
https://www.oracle.com/security-alerts/cpuoct2021.html
Package: smarty/smarty
Version: 4.0.0.0
CVE: CVE-2021-21408
Title: Improper Input Validation
Description: Smarty is a template engine for PHP, facilitating the
separation of presentation (HTML/CSS) from application logic. Prior to
versions 3.1.43 and 4.0.3, template authors could run restricted static
php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive
a patch.
CVSS V2: AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE: CWE-20
References:
https://github.com/smarty-
php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664
https://github.com/smarty-php/smarty/releases/tag/v3.1.43
https://github.com/smarty-php/smarty/security/advisories/GHSA-
4h9c-v5vg-5m6m
https://github.com/smarty-php/smarty/releases/tag/v4.0.3
https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html
https://www.debian.org/security/2022/dsa-5151
https://security.gentoo.org/glsa/202209-09
https://lists.fedoraproject.org/archives/list/package-
Details
[email protected]/message/L777JIBIWJV34HS7LXPID
WASG7TT4LNI/
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/BRAJVDRGCIY5UZ2PQHK
DTT7RMKG6WJQQ/
Package: smarty/smarty
Version: 4.0.0.0
CVE: CVE-2021-29454
Title: Improper Neutralization of Special Elements in Output Used by a
Downstream Component ('Injection')
Description: Smarty is a template engine for PHP, facilitating the
separation of presentation (HTML/CSS) from application logic. Prior to
versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP
code by crafting a malicious math string. If a math string was passed
through as user provided data to the math function, external users could
run arbitrary PHP code by crafting a malicious math string. Users should
upgrade to version 3.1.42 or 4.0.2 to receive a patch.
CVSS V2: AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE: CWE-74
References:
https://github.com/smarty-
php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71
https://github.com/smarty-php/smarty/security/advisories/GHSA-
29gp-2c3m-3j6m
https://packagist.org/packages/smarty/smarty
https://github.com/smarty-php/smarty/releases/tag/v3.1.42
https://www.smarty.net/docs/en/language.function.math.tpl
https://github.com/smarty-php/smarty/releases/tag/v4.0.2
https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html
https://www.debian.org/security/2022/dsa-5151
https://security.gentoo.org/glsa/202209-09
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/L777JIBIWJV34HS7LXPID
WASG7TT4LNI/
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/BRAJVDRGCIY5UZ2PQHK
DTT7RMKG6WJQQ/
Package: smarty/smarty
Version: 4.0.0.0
CVE: CVE-2022-29221
Title: Improper Control of Generation of Code ('Code Injection')
Description: Smarty is a template engine for PHP, facilitating the
separation of presentation (HTML/CSS) from application logic. Prior to
versions 3.1.45 and 4.1.1, template authors could inject php code by
choosing a malicious {block} name or {include} file name. Sites that
cannot fully trust template authors should upgrade to versions 3.1.45 or
4.1.1 to receive a patch for this issue. There are currently no known
workarounds.
CVSS V2: AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE: CWE-94
References:
https://github.com/smarty-php/smarty/releases/tag/v3.1.45
https://github.com/smarty-php/smarty/security/advisories/GHSA-
634x-pc3q-cf4c
https://github.com/smarty-
php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccddd
https://github.com/smarty-php/smarty/releases/tag/v4.1.1
https://www.debian.org/security/2022/dsa-5151
https://lists.debian.org/debian-lts-announce/2022/05/msg00044.html
https://security.gentoo.org/glsa/202209-09
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/L777JIBIWJV34HS7LXPID
WASG7TT4LNI/
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/BRAJVDRGCIY5UZ2PQHK
DTT7RMKG6WJQQ/
Package: verot/class.upload.php
Version: 2.0.1.0
CVE: CVE-2019-19576
Title: Unrestricted Upload of File with Dangerous Type
Description: class.upload.php in verot.net class.upload before 1.0.3 and
2.x before 2.0.4, as used in the K2 extension for Joomla! and other
products, omits .phar from the set of dangerous file extensions.
CVSS V2: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE: CWE-434
References:
https://github.com/verot/class.upload.php/compare/1.0.2...1.0.3
https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a0
66117155124
https://www.verot.net/php_class_upload.htm
https://github.com/verot/class.upload.php/commit/db1b4fe50c175469697
0d8b437f07e7b94a7ebf2
https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4
https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9
c071ae5089865559174f1
https://www.verot.net
https://github.com/jra89/CVE-2019-19576
https://medium.com/@jra8908/cve-2019-19576-e9da712b779
http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-
Code-Execution.html
Package: verot/class.upload.php
Version: 2.0.1.0
CVE: CVE-2019-19634
Title: Unrestricted Upload of File with Dangerous Type
Description: class.upload.php in verot.net class.upload through 1.0.3
and 2.x through 2.0.4, as used in the K2 extension for Joomla! and other
products, omits .pht from the set of dangerous file extensions, a similar
issue to CVE-2019-19576.
CVSS V2: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE: CWE-434
References:
https://github.com/jra89/CVE-2019-19634
https://github.com/verot/class.upload.php/blob/2.0.4/src/class.upload.php
#L3068
https://medium.com/@jra8908/cve-2019-19634-arbitrary-file-upload-
in-class-upload-php-ccaf9e13875e
/Mod_Rewrite_Shop/
Alert group .htaccess file readable (verified)
Severity Medium
This directory contains an .htaccess file that is readable. This may
indicate a server misconfiguration. htaccess files are designed to be
Description parsed by web server and should not be directly accessible. These files
could contain sensitive information that could help an attacker to conduct
further attacks. It's recommended to restrict access to this file.
Restrict access to the .htaccess file by adjusting the web server
Recommendations
configuration.
Alert variants
Details
GET /Mod_Rewrite_Shop/.htaccess HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Application error messages
Severity Medium
This alert requires manual confirmation
http://testphp.vulnweb.com/showimage.php
Warning: fopen(): Filename cannot be empty in
/hj/var/www/showimage.php on line 31
http://testphp.vulnweb.com/bxss/adminPan3l/index.php
<b>Warning</b>: mysql_connect(): Access denied for user
'bxss'@'localhost' (using password: YES) in
<b>/hj/var/www//bxss/adminPan3l/index.php</b> on line
<b>2</b><br />
http://testphp.vulnweb.com/listproducts.php
You have an error in your SQL syntax
http://testphp.vulnweb.com/Connections/DB_Connection.php
Fatal error
http://testphp.vulnweb.com/Connections/DB_Connection.php
<b>Warning</b>: mysql_pconnect(): Access denied for user
'root'@'localhost' in
<b>/hj/var/www//Connections/DB_Connection.php</b> on line
<b>9</b><br />
http://testphp.vulnweb.com/secured/database_connect.php
<b>Warning</b>: mysql_connect(): The server requested
authentication method unknown to the client
[caching_sha2_password] in
<b>/hj/var/www//secured/database_connect.php</b> on line
<b>2</b><br />
http://testphp.vulnweb.com/secured/newuser.php
You have an error in your SQL syntax
http://testphp.vulnweb.com/bxss/cleanDatabase.php
<b>Warning</b>: mysql_connect(): Access denied for user
'bxss'@'localhost' (using password: YES) in
<b>/hj/var/www//bxss/cleanDatabase.php</b> on line <b>2</b>
<br />
http://testphp.vulnweb.com/pictures/path-disclosure-unix.html
<b>Warning</b>: Sablotron error on line 1: XML parser error 3:
no element found in
<b>/usr/local/etc/httpd/htdocs2/destination-
ce/destinationce/system/class/xsltTransform.class.php</b> on
line <b>70</b><br />
http://testphp.vulnweb.com/showimage.php
Details Warning: fopen(): Filename cannot be empty in
/hj/var/www/showimage.php on line 13
http://testphp.vulnweb.com/listproducts.php
<b>Warning</b>: mysql_fetch_array() expects parameter 1 to
be resource, null given in
<b>/hj/var/www//listproducts.php</b> on line <b>74</b><br />
http://testphp.vulnweb.com/bxss/vuln.php
<b>Warning</b>: mysql_connect(): Access denied for user
'bxss'@'localhost' (using password: YES) in
<b>/hj/var/www//bxss/vuln.php</b> on line <b>2</b><br />
http://testphp.vulnweb.com/bxss/database_connect.php
<b>Warning</b>: mysql_connect(): Access denied for user
'bxss'@'localhost' (using password: YES) in
<b>/hj/var/www//bxss/database_connect.php</b> on line
<b>2</b><br />
http://testphp.vulnweb.com/bxss/adminPan3l/
<b>Warning</b>: mysql_connect(): Access denied for user
'bxss'@'localhost' (using password: YES) in
<b>/hj/var/www//bxss/adminPan3l/index.php</b> on line
<b>2</b><br />
http://testphp.vulnweb.com/AJAX/infoartist.php
<b>Warning</b>: mysql_fetch_array() expects parameter 1 to
be resource, boolean given in
<b>/hj/var/www//AJAX/infoartist.php</b> on line <b>7</b><br
/>
http://testphp.vulnweb.com/AJAX/infocateg.php
<b>Warning</b>: mysql_fetch_array() expects parameter 1 to
be resource, boolean given in
<b>/hj/var/www//AJAX/infocateg.php</b> on line <b>7</b><br
/>
http://testphp.vulnweb.com/AJAX/infotitle.php
<b>Warning</b>: mysql_fetch_array() expects parameter 1 to
be resource, boolean given in
<b>/hj/var/www//AJAX/infotitle.php</b> on line <b>7</b><br />
http://testphp.vulnweb.com/secured/database_connect.php
<b>Warning</b>: mysql_connect(): Access denied for user
'wauser'@'localhost' (using password: YES) in
<b>/hj/var/www//secured/database_connect.php</b> on line
<b>2</b><br />
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/index.bak
Alert group Backup files
Severity Medium
A possible backup file was found on your web-server. These files are
Description
usually created by developers to backup their work.
Remove the file(s) if they are not required on your website. As an
additional step, it is recommended to implement a security policy within
Recommendations
your organization to disallow creation of backup files in directories
accessible from the web.
Alert variants
This file was found using the pattern ${fileName}.bak.
Original filename: index.php
Pattern found:
</head>
<body>
<div id="mainLayer" style="position:absolute; width:70
<div id="masthead">
<h1 id="siteName">SkilledScan ART</h1>
<h6 id="siteInfo">TEST and Demonstration site for Sk
<div id="globalNav">
<a href="index.php">home</a> | <a href="categories
</a> | <a href="disclaimer.php">disclaimer</a>
<a href="guestbook.php">guestbook</a>
</div>
</div>
<!-- end masthead -->
<div id="navBar">
<div id="search">
<form action="search.php" method="post">
<label>search art</label>
<input name="searchFor" type="text" size="10">
<input name="goButton" type="submit" value="go">
</form>
</div>
<div id="sectionLinks">
<ul>
<li><a href="categories.php">Browse categories</
<li><a href="artists.php">Browse artists</a></li
<li><a href="cart.php">Your cart</a></li>
<li><a href="login.php">Signup</a></li>
<li><a href="userinfo.php">Your profile</a><
<li><a href="guestbook.php">Our guestbook</a
<?PHP if (isset($_COOKIE["login"]))echo '<li
</ul>
</div>
<div class="relatedLinks">
<h3>Links</h3>
<ul>
<li><a href="http://www.SkilledScan.com">Securit
<li><a href="http://www.eclectasy.com/Fracta
</ul>
</div>
<div id="advert">
<p><img src="images/add.jpg" alt="" width="107" he
</div>
</div>
Range: bytes=0-99999
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/index.zip
Alert group Backup files
Severity Medium
A possible backup file was found on your web-server. These files are
Description
usually created by developers to backup their work.
Remove the file(s) if they are not required on your website. As an
additional step, it is recommended to implement a security policy within
Recommendations
your organization to disallow creation of backup files in directories
accessible from the web.
Alert variants
This file was found using the pattern ${fileName}.zip.
Details
Original filename: index.php
GET /index.zip HTTP/1.1
Range: bytes=0-99999
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Basic authentication over HTTP (verified)
Severity Medium
In the context of an HTTP transaction, basic access authentication is a
method for an HTTP user agent to provide a user name and password
when making a request.
Description
One or more directories are protected using Basic Authentication over an
HTTP connection. With Basic Authentication the user credentials are
sent as cleartext and because HTTPS is not used, they are vulnerable to
packet sniffing.
Recommendations Use Basic Authentication over an HTTPS connection.
Alert variants
Pages with basic authentication over HTTP:
Details
http://testphp.vulnweb.com/clearguestbook.php
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/redir.php
Alert group CRLF injection/HTTP response splitting (verified)
Severity Medium
This script is possibly vulnerable to CRLF injection attacks.
HTTP headers have the structure "Key: Value", where each line is
separated by the CRLF combination. If the user input is injected into the
value section without properly escaping/removing CRLF characters it is
possible to alter the HTTP headers structure.
Description
HTTP Response Splitting is a new application attack technique which
enables various new attacks such as web cache poisoning, cross user
defacement, hijacking pages with sensitive user information and cross-
site scripting (XSS). The attacker sends a single HTTP request that
forces the web server to form an output stream, which is then interpreted
by the target as two HTTP responses instead of one response.
You need to restrict CR(0x13) and LF(0x10) from the user input or
Recommendations properly encode the output in order to prevent the injection of custom
HTTP headers.
Alert variants
URL encoded GET input r was set to START END
Details
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Directory listings (verified)
Severity Medium
Directory listing is a web server function that displays the directory
contents when there is no index file in a specific website directory. It is
Description
dangerous to leave this function turned on for the web server because it
leads to information disclosure.
You should make sure no sensitive information is disclosed or you may
Recommendations
want to restrict directory listings from the web server configuration.
Alert variants
Folders with directory listing enabled:
http://testphp.vulnweb.com/wvstests/
http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/
http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/scripts/
http://testphp.vulnweb.com/.idea/
http://testphp.vulnweb.com/.idea/scopes/
http://testphp.vulnweb.com/Templates/
http://testphp.vulnweb.com/Flash/
Details
http://testphp.vulnweb.com/CVS/
http://testphp.vulnweb.com/Connections/
http://testphp.vulnweb.com/_mmServerScripts/
http://testphp.vulnweb.com/admin/
http://testphp.vulnweb.com/pictures/
http://testphp.vulnweb.com/vendor/
http://testphp.vulnweb.com/images/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/images/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/hpp/
Alert group HTTP parameter pollution
Severity Medium
This script is possibly vulnerable to HTTP Parameter Pollution attacks.
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group JetBrains .idea project directory
Severity Medium
The .idea directory contains a set of configuration files (.xml) for your
project. These configuration files contain information core to the project
itself, such as names and locations of its component modules, compiler
settings, etc. If you've defined a data source the file dataSources.ids
contains information for connecting to the database and credentials. The
Description
workspace.xml file stores personal settings such as placement and
positions of your windows, your VCS and History settings, and other
data pertaining to the development environment. It also contains a list of
changed files and other sensitive information. These files should not be
present on a production system.
Remove these files from production systems or restrict access to the
.idea directory. To deny access to all the .idea folders you need to add
the following lines in the appropriate context (either global config, or
vhost/directory, or from .htaccess):
<Directory ~ "\.idea">
Recommendations
Order allow,deny
</Directory>
Alert variants
workspace.xml project file found at : /.idea/workspace.xml
Pattern found:
Details
<project version="4">
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/secured/phpinfo.php
Alert group PHP allow_url_fopen enabled (verified)
Severity Medium
The PHP configuration directive allow_url_fopen is enabled. When
enabled, this directive allows data retrieval from remote locations (web
site or FTP server). A large number of code injection vulnerabilities
Description reported in PHP-based web applications are caused by the combination
of enabling allow_url_fopen and bad input filtering.
php.ini
Recommendations
allow_url_fopen = 'off'
.htaccess
php_flag allow_url_fopen off
Alert variants
This vulnerability was detected using the information from phpinfo()
page.
Details
allow_url_fopen: On
GET /secured/phpinfo.php HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/secured/phpinfo.php
Alert group PHP errors enabled (verified)
Severity Medium
Application error or warning messages may expose sensitive information
about an application's internal workings to an attacker.
Description
SkilledScan found that the PHP display_errors directive is enabled.
Adjust php.ini or .htaccess (mod_php with Apache HTTP Server) to
Recommendations
disable display_errors (refer to 'Detailed information' section).
Alert variants
This vulnerability was detected using the information from phpinfo()
page.
Details
display_errors: On
GET /secured/phpinfo.php HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group PHP errors enabled (verified)
Severity Medium
Application error or warning messages may expose sensitive information
about an application's internal workings to an attacker.
Description
SkilledScan Sensor found that the PHP display_errors directive is
enabled.
Adjust php.ini or .htaccess (mod_php with Apache HTTP Server) to
Recommendations
disable display_errors (refer to 'Detailed information' section).
Alert variants
Current setting is : display_errors = 1
Details
Observed on /
/secured/phpinfo.php
Alert group PHP open_basedir is not set (verified)
Severity Medium
The open_basedir configuration directive will limit the files that can be
opened by PHP to the specified directory-tree. When a script tries to
open a file with, for example, fopen() or gzopen(), the location of the file
is checked. When the file is outside the specified directory-tree, PHP will
Description refuse to open it. open_basedir is a good protection against remote file
inclusion vulnerabilities. For a remote attacker it is not possible to break
out of the open_basedir restrictions if he is only able to inject the name
of a file to be included. Therefore the number of files he will be able to
include with such a local file include vulnerability is limited.
You can set open_basedir from php.ini
Recommendations
php.ini
open_basedir = your_application_directory
Alert variants
This vulnerability was detected using the information from phpinfo()
page.
Details
open_basedir: no value
GET /secured/phpinfo.php HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/secured/phpinfo.php
Alert group PHP session.use_only_cookies disabled (verified)
Severity Medium
When use_only_cookies is disabled, PHP will pass the session ID via
the URL. This makes the application more vulnerable to session
hijacking attacks. Session hijacking is basically a form of identity theft
Description
wherein a hacker impersonates a legitimate user by stealing his session
ID. When the session token is transmitted in a cookie, and the request is
made on a secure channel (that is, it uses SSL), the token is secure.
You can enabled session.use_only_cookies from php.ini or .htaccess.
php.ini
Recommendations session.use_only_cookies = 'on'
.htaccess
php_flag session.use_only_cookies on
Alert variants
This vulnerability was detected using the information from phpinfo()
page.
Details
session.use_only_cookies: On
GET /secured/phpinfo.php HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group PHPinfo pages
Severity Medium
One or more phpinfo() pages were found. The phpinfo() function
exposes a large amount of information about the PHP configuration and
that of its environment. This includes information about PHP compilation
Description
options and extensions, the PHP version, server information, OS version
information, paths, master and local values of configuration options,
HTTP headers, and the PHP License.
Remove either the call to the phpinfo() function from the file(s), or the
Recommendations
file(s) itself.
Alert variants
PHPinfo pages found:
Details /secured/phpinfo.php
<title>phpinfo()</title>
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Unencrypted connection (verified)
Severity Medium
This scan target was connected to over an unencrypted connection. A
Description potential attacker can intercept and modify data sent and received from
this site.
The site should send and receive data over a secure (HTTPS)
Recommendations
connection.
Alert variants
Details
GET / HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: filelist;packages;aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/redir.php
Alert group URL redirection
Severity Medium
This script is possibly vulnerable to URL redirection attacks.
Description
URL redirection is sometimes used as a part of phishing attacks that
confuse visitors about which web site they are visiting.
Recommendations Your script should properly sanitize user input.
Alert variants
Details URL encoded GET input r was set to http://xfs.bxss.me?vulnweb.com
GET /redir.php?r=http://xfs.bxss.me%3Fvulnweb.com HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group User credentials are sent in clear text
Severity Medium
User credentials are transmitted over an unencrypted channel. This
Description information should always be transferred via an encrypted channel
(HTTPS) to avoid being intercepted by malicious users.
Because user credentials are considered sensitive information, should
Recommendations always be transferred to the server over an encrypted connection
(HTTPS).
Alert variants
Forms with credentials sent in clear text:
http://testphp.vulnweb.com/login.php
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
/vendor/installed.json
Alert group Vulnerable package dependencies [medium]
Severity Medium
One or more packages that are used in your web application are
Description affected by known vulnerabilities. Please consult the details section for
more information about each affected package.
It's recommended to update the vulnerable packages to the latest
version (if a fix exists). If a fix does not exist, you may want to suggest
Recommendations
changes that address the vulnerability to the package maintainer or
remove the package from your dependency tree.
Alert variants
List of vulnerable composer packages:
Package: smarty/smarty
Version: 4.0.0.0
CVE: CVE-2018-25047
Title: Improper Neutralization of Input During Web Page Generation
('Cross-site Scripting')
Description: In Smarty before 3.1.47 and 4.x before 4.2.1,
libs/plugins/function.mailto.php allows XSS. A web page that uses
smarty_function_mailto, and that could be parameterized using GET or
POST input parameters, could allow injection of JavaScript code by a
user.
CVSS V2:
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CWE: CWE-79
References:
https://github.com/smarty-php/smarty/releases/tag/v4.2.1
https://github.com/smarty-php/smarty/releases/tag/v3.1.47
https://bugs.gentoo.org/870100
https://github.com/smarty-php/smarty/issues/454
https://security.gentoo.org/glsa/202209-09
https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html
Package: smarty/smarty
Version: 4.0.0.0
CVE: CVE-2023-28447
Title: Improper Neutralization of Input During Web Page Generation
('Cross-site Scripting')
Description: Smarty is a template engine for PHP. In affected versions
smarty did not properly escape javascript code. An attacker could exploit
this vulnerability to execute arbitrary JavaScript code in the context of
the user's browser session. This may lead to unauthorized access to
sensitive user data, manipulation of the web application's behavior, or
unauthorized actions performed on behalf of the user. Users are advised
to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There
are no known workarounds for this vulnerability.
CVSS V2:
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE: CWE-79
References:
https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-
h7fp-4vwj
https://github.com/smarty-
php/smarty/commit/685662466f653597428966d75a661073104d713d
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/HSAUM3YHWHO4UCJXR
GRLQGPJAO3MFOZZ/
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/JBB35GLYTL6JL6EOM6BO
ZNYP47JKNNHT/
https://lists.fedoraproject.org/archives/list/package-
[email protected]/message/P7O7SKTATM6GAP45S64
QFXNLWIY5I7HP/
Package: tinymce/tinymce
Version: 5.2.0.0
CVE: CVE-2019-1010091
Title: Improper Neutralization of Input During Web Page Generation
('Cross-site Scripting')
Description: tinymce 4.7.11, 4.7.12 is affected by: CWE-79: Improper
Details Neutralization of Input During Web Page Generation. The impact is:
JavaScript code execution. The component is: Media element. The
attack vector is: The victim must paste malicious content to media
element's embed tab.
CVSS V2: AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE: CWE-79
References:
https://github.com/tinymce/tinymce/issues/4394
Package: tinymce/tinymce
Version: 5.2.0.0
CVE: CVE-2020-12648
Title: Improper Neutralization of Input During Web Page Generation
('Cross-site Scripting')
Description: A cross-site scripting (XSS) vulnerability in TinyMCE 5.2.1
and earlier allows remote attackers to inject arbitrary web script when
configured in classic editing mode.
CVSS V2: AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE: CWE-79
References:
https://labs.bishopfox.com/advisories/tinymce-version-5.2.1
Package: tinymce/tinymce
Version: 5.2.0.0
CVE: CVE-2022-23494
Title: Improper Neutralization of Input During Web Page Generation
('Cross-site Scripting')
Description: tinymce is an open source rich text editor. A cross-site
scripting (XSS) vulnerability was discovered in the alert and confirm
dialogs when these dialogs were provided with malicious HTML content.
This can occur in plugins that use the alert or confirm dialogs, such as in
the `image` plugin, which presents these dialogs when certain errors
occur. The vulnerability allowed arbitrary JavaScript execution when an
alert presented in the TinyMCE UI for the current user. This vulnerability
has been patched in TinyMCE 5.10.7 and TinyMCE 6.3.1 by ensuring
HTML sanitization was still performed after unwrapping invalid elements.
Users are advised to upgrade to either 5.10.7 or 6.3.1. Users unable to
upgrade may ensure the the `images_upload_handler` returns a valid
value as per the images_upload_handler documentation.
CVSS V2:
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE: CWE-79
References:
https://github.com/tinymce/tinymce/commit/6923d85eba6de3e08ebc9c5
a387b5abdaa21150e
https://www.tiny.cloud/docs/tinymce/6/file-image-
upload/#images_upload_handler
https://www.tiny.cloud/docs/release-notes/release-
notes5107/#securityfixes
https://github.com/tinymce/tinymce/commit/8bb2d2646d4e1a718fce61a7
75fa22e9d317b32d
https://github.com/tinymce/tinymce/security/advisories/GHSA-gg8r-
xjwq-4w92
https://www.tiny.cloud/docs/tinymce/6/6.3-release-notes/#security-
fixes
/pictures/WS_FTP.LOG
Alert group WS_FTP log file found (verified)
Severity Medium
WS_FTP is a popular FTP client. This application creates a log file
Description named WS_FTP.LOG. This file contains sensitive data such as file
source/destination and file name, date/time of upload etc.
Remove this file from your website or change its permissions to remove
Recommendations
access.
Alert variants
Pattern found:
Details
103.05.06 13:17
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Clickjacking: X-Frame-Options header
Severity Low
Clickjacking (User Interface redress attack, UI redress attack, UI
redressing) is a malicious technique of tricking a Web user into clicking
on something different from what the user perceives they are clicking on,
thus potentially revealing confidential information or taking control of
their computer while clicking on seemingly innocuous web pages.
Description The server did not return an X-Frame-Options header with the value
DENY or SAMEORIGIN, which means that this website could be at risk
of a clickjacking attack. The X-Frame-Options HTTP response header
can be used to indicate whether or not a browser should be allowed to
render a page inside a frame or iframe. Sites can use this to avoid
clickjacking attacks, by ensuring that their content is not embedded into
untrusted sites.
Configure your web server to include an X-Frame-Options header and a
Recommendations CSP header with frame-ancestors directive. Consult Web references for
more information about the possible values for this header.
Alert variants
Paths without secure XFO header:
http://testphp.vulnweb.com/
http://testphp.vulnweb.com/search.php
http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/scripts/version
.php
http://testphp.vulnweb.com/artists.php
http://testphp.vulnweb.com/bxss/adminPan3l/index.php
http://testphp.vulnweb.com/product.php
http://testphp.vulnweb.com/listproducts.php
http://testphp.vulnweb.com/cart.php
http://testphp.vulnweb.com/AJAX/index.php
http://testphp.vulnweb.com/comment.php
http://testphp.vulnweb.com/Templates/main_dynamic_template.dwt
Details
.php
http://testphp.vulnweb.com/AJAX/showxml.php
http://testphp.vulnweb.com/Mod_Rewrite_Shop/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/color-
printer/3/
http://testphp.vulnweb.com/categories.php
http://testphp.vulnweb.com/disclaimer.php
http://testphp.vulnweb.com/Connections/DB_Connection.php
http://testphp.vulnweb.com/_mmServerScripts/MMHTTPDB.php
http://testphp.vulnweb.com/guestbook.php
http://testphp.vulnweb.com/hpp/params.php
http://testphp.vulnweb.com/index.php
GET / HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: filelist;packages;aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Cookies with missing, inconsistent or contradictory properties
Alert group
(verified)
Severity Low
At least one of the following cookies properties causes the cookie to be
invalid or incompatible with either a different property of the same
Description cookie, of with the environment the cookie is being used in. Although this
is not a vulnerability in itself, it will likely lead to unexpected behavior by
the application, which in turn may cause secondary security issues.
Ensure that the cookies configuration complies with the applicable
Recommendations
standards.
Alert variants
List of cookies with missing, inconsistent or contradictory properties:
http://testphp.vulnweb.com/logout.php
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Cookies without HttpOnly flag set (verified)
Severity Low
One or more cookies don't have the HttpOnly flag set. When a cookie is
set with the HttpOnly flag, it instructs the browser that the cookie can
Description
only be accessed by the server and not by client-side scripts. This is an
important security protection for session cookies.
Recommendations If possible, you should set the HttpOnly flag for these cookies.
Alert variants
Cookies without HttpOnly flag set:
http://testphp.vulnweb.com/logout.php
Details
Set-Cookie: login=deleted; expires=Thu, 01-Jan-197
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Possible sensitive files
Severity Low
A possible sensitive file has been found. This file is not directly linked
from the website. This check looks for common sensitive resources like
Description password files, configuration files, log files, include files, statistics data,
database dumps. Each one of these files could help an attacker to learn
more about his target.
Recommendations Restrict access to this file or remove it from the website.
Alert variants
Possible sensitive files:
Details
http://testphp.vulnweb.com/hpp/test.php
Accept: ekvlqqru/hxtn
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Content Security Policy (CSP) not implemented
Severity Informational
Content Security Policy (CSP) is an added layer of security that helps to
detect and mitigate certain types of attacks, including Cross Site
Scripting (XSS) and data injection attacks.
Description
Content-Security-Policy:
default-src 'self';
http://testphp.vulnweb.com/
http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/scripts/version
.php
http://testphp.vulnweb.com/artists.php
http://testphp.vulnweb.com/bxss/adminPan3l/index.php
http://testphp.vulnweb.com/listproducts.php
http://testphp.vulnweb.com/product.php
http://testphp.vulnweb.com/AJAX/index.php
http://testphp.vulnweb.com/comment.php
http://testphp.vulnweb.com/Templates/main_dynamic_template.dwt
.php
http://testphp.vulnweb.com/Mod_Rewrite_Shop/
Details
http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/color-
printer/3/
http://testphp.vulnweb.com/categories.php
http://testphp.vulnweb.com/disclaimer.php
http://testphp.vulnweb.com/Connections/DB_Connection.php
http://testphp.vulnweb.com/_mmServerScripts/MMHTTPDB.php
http://testphp.vulnweb.com/guestbook.php
http://testphp.vulnweb.com/hpp/params.php
http://testphp.vulnweb.com/index.php
http://testphp.vulnweb.com/secured/database_connect.php
http://testphp.vulnweb.com/login.php
http://testphp.vulnweb.com/images/
GET / HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: filelist;packages;aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Email addresses
Severity Informational
One or more email addresses have been found on this website. The
majority of spam comes from email addresses harvested off the internet.
The spam-bots (also known as email harvesters and email extractors)
Description
are programs that scour the internet looking for email addresses on any
website they come across. Spambot programs look for strings like
[email protected] and then record any addresses found.
Recommendations Check references for details on how to solve this problem.
Alert variants
Emails found:
http://testphp.vulnweb.com/
[email protected]
http://testphp.vulnweb.com/search.php
[email protected]
http://testphp.vulnweb.com/artists.php
[email protected]
http://testphp.vulnweb.com/product.php
[email protected]
http://testphp.vulnweb.com/listproducts.php
[email protected]
http://testphp.vulnweb.com/cart.php
[email protected]
http://testphp.vulnweb.com/Templates/main_dynamic_template.dwt
.php
[email protected]
Details
http://testphp.vulnweb.com/categories.php
[email protected]
http://testphp.vulnweb.com/disclaimer.php
[email protected]
http://testphp.vulnweb.com/guestbook.php
[email protected]
http://testphp.vulnweb.com/index.php
[email protected]
http://testphp.vulnweb.com/login.php
[email protected]
http://testphp.vulnweb.com/signup.php
[email protected]
http://testphp.vulnweb.com/404.php
[email protected]
http://testphp.vulnweb.com/logout.php
[email protected]
GET / HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: filelist;aspectalerts;packages
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Internal IP address disclosure
Severity Informational
One or more strings matching an internal IPv4 address were found.
These IPv4 addresses may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct
Description
further attacks.
http://testphp.vulnweb.com/404.php
192.168.0.28
Details http://testphp.vulnweb.com/secured/phpinfo.php
192.168.0.5
http://testphp.vulnweb.com/pictures/ipaddresses.txt
192.168.0.26
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group No HTTP Redirection
Severity Informational
It was detected that your web application uses HTTP protocol, but
Description
doesn't automatically redirect users to HTTPS.
It's recommended to implement best practices of HTTP Redirection into
Recommendations
your web application. Consult web references for more information
Alert variants
Details
GET / HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Permissions-Policy header not implemented
Severity Informational
The Permissions-Policy header allows developers to selectively enable
Description
and disable use of various browser features and APIs.
Recommendations
Alert variants
Locations without Permissions-Policy header:
http://testphp.vulnweb.com/
http://testphp.vulnweb.com/search.php
http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/scripts/version
.php
http://testphp.vulnweb.com/artists.php
http://testphp.vulnweb.com/bxss/adminPan3l/index.php
http://testphp.vulnweb.com/product.php
http://testphp.vulnweb.com/listproducts.php
http://testphp.vulnweb.com/cart.php
http://testphp.vulnweb.com/AJAX/index.php
http://testphp.vulnweb.com/comment.php
Details http://testphp.vulnweb.com/Templates/main_dynamic_template.dwt
.php
http://testphp.vulnweb.com/AJAX/showxml.php
http://testphp.vulnweb.com/Mod_Rewrite_Shop/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/color-
printer/3/
http://testphp.vulnweb.com/categories.php
http://testphp.vulnweb.com/disclaimer.php
http://testphp.vulnweb.com/Connections/DB_Connection.php
http://testphp.vulnweb.com/_mmServerScripts/MMHTTPDB.php
http://testphp.vulnweb.com/guestbook.php
http://testphp.vulnweb.com/hpp/params.php
http://testphp.vulnweb.com/index.php
GET / HTTP/1.1
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: filelist;packages;aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group PHP Version Disclosure
Severity Informational
The web server is sending the X-Powered-By: response headers,
Description
revealing the PHP version.
Configure your web server to prevent information leakage from its HTTP
Recommendations
response.
Alert variants
Details Version detected: PHP/5.6.40-38+ubuntu20.04.1+deb.sury.org+1.
Web Server
Alert group Possible server path disclosure (Unix)
Severity Informational
One or more fully qualified path names were found. From this
information the attacker may learn the file system structure from the web
Description server. This information can be used to conduct further attacks.
http://testphp.vulnweb.com/pictures/path-disclosure-unix.html
Details >/usr/local/etc/httpd/htdocs2/destination
http://testphp.vulnweb.com/secured/phpinfo.php
:/usr/obj/usr/src/sys/GENERIC
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Possible server path disclosure (Windows)
Severity Informational
One or more fully qualified path names were been found. From this
information the attacker may learn the file system structure from the web
Description server. This information can be used to conduct further attacks.
Details http://testphp.vulnweb.com/pictures/path-disclosure-win.html
C:\Inetpub\wwwroot\comparatii.php
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Alert group Possible username or password disclosure
Severity Informational
One or more credential pairs (username+password) were found. This
information could be sensitive.
Description
This alert may be a false positive, manual confirmation is required.
Remove these file(s) from your website or change its permissions to
Recommendations
remove access.
Alert variants
Pages containing credentials:
http://testphp.vulnweb.com/pictures/credentials.txt
Details
username=test
password=something
SkilledScan-Aspect: enabled
SkilledScan-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
SkilledScan-Aspect-ScanID: 15147751696545358545
SkilledScan-Aspect-Queries: aspectalerts;routes
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: testphp.vulnweb.com
Connection: Keep-alive