Web Application (Muthoot - Com) - Pentesting - Revalidation - Report - 26-4-2023
Web Application (Muthoot - Com) - Pentesting - Revalidation - Report - 26-4-2023
Unless required by law, Muthoot Fincorp LTD shall not provide this, or any other such document (including draft deliverables)
without first obtaining the consent of Mazars, in writing, together with, where required by Mazars, procuring “Release of Liab
Mazars from such third party; and providing a “Hold-Harmless” Letter to Mazars. In no event, regardless of whether consent h
Mazars assume any responsibility to any third party to which the advice or Deliverable or draft deliverable is disclosed or othe
We have not provided any opinion, attestation, or another form of assurance with respect to our work or the information upo
based. The procedures we performed did not constitute an examination or a review in accordance with generally accepted au
attestation standards. We have not audited or otherwise verified the information supplied to us in connection with this engag
source, except as was specified in this Agreement.
1. Scope -
Perform penetration testing
https://muthooth.com
2. Our Understanding -
To identify vulnerabilities/weakness in a shared Application by performing vulnerability assessment and penetration and prov
vulnerabilities.
3. Limitation -
- Scope exclusions
• Anything not covered explicitly in the scope of work
sessment Report
Version/Build No. NA
2 Risk Rating
Severity Rating
High risk vulnerability has a high potential of impacting business operations leading to
High privileged access, customer service or SLA breach resulting in significant outage. If explo
availability of organizational inform
Low risk vulnerability has the potential of revealing the information about the device a
Low
compromise. Higher work factor would be involved for explo
22
5
22
Severity Rating
otential of impacting business operations leading to downtime or disruption and provides an attacker with
r SLA breach resulting in significant outage. If exploited, it has a direct impact on confidentiality, integrity or
availability of organizational information.
of indirectly giving access to an intruder and/or doesn’t have the features enabled for collecting evidence or
ized use for taking the legal action in case the vulnerability gets exploited. This type of vulnerability upon
itation might result in elevation of privileges or slowing down the operations.
tial of revealing the information about the device and may lead to unauthorized access to system leading to
ise. Higher work factor would be involved for exploiting this type of vulnerability.
erabilities that have been identified as a part of the web application security
2
5
Cross-Site Scripting
7
Directory listings
PhpMyAdmin Accessible
10
11
Error Logs
12
13
14
Insecure Inline Frame (iframe)
15
16
17
18
Insecure Inline Frame (iframe)
19
20
21
22
23
Insecure Inline Frame (iframe)
24
25
28
30
Input Validation
31
Observation
It was observed that the following parameter is vulnerable to
cross-site Scripting
URL: https://muthoot.com/
Parameter: query
URL: https://muthoot.com/search/
Parameter: query (post)
Library:
- jQuery JavaScript Library v1.3.1
- jQuery JavaScript Library v1.4.2
It was observed that directory listing enabled for the following
folders
URL:
https://muthoot.com/js/
https://muthoot.com/pdf/
https://muthoot.com/search/
https://muthoot.com/data/
URL: https://muthoot.com/phpmyadmin/index.php
URL: https://muthoot.com/.bash_history
URL:https://muthoot.com/error_log
URL:https://muthoot.com/
URL: https://muthoot.com/media/BlueAnthem
It was observed that web page was found to be using an Inline
Frame ("iframe") to embed a resource, such as a different web
page. The Inline Frame is configured insecurely. This
vulnerability alert is based on the origin of the embedded
resource and the iframe's sandbox attribute, which can be
used to apply security restrictions as well as exceptions to
these restrictions.
URL: https://muthoot.com/media/FincorpGoldLoan
URL: https://muthoot.com/media/GoldPoint
URL: https://muthoot.com/contactus/registeredaddresses
URL: https://muthoot.com/media/HomeLoan
It was observed that web page was found to be using an Inline
Frame ("iframe") to embed a resource, such as a different web
page. The Inline Frame is configured insecurely. This
vulnerability alert is based on the origin of the embedded
resource and the iframe's sandbox attribute, which can be
used to apply security restrictions as well as exceptions to
these restrictions.
URL: https://muthoot.com/media/RestartIndia
URL: https://muthoot.com/media/TwoWheeler
URL: https://muthoot.com/media/Women
URL: https://muthoot.com/media/goldLoan
URL: https://muthoot.com/media/zaheerKhan
It was observed that web page was found to be using an Inline
Frame ("iframe") to embed a resource, such as a different web
page. The Inline Frame is configured insecurely. This
vulnerability alert is based on the origin of the embedded
resource and the iframe's sandbox attribute, which can be
used to apply security restrictions as well as exceptions to
these restrictions.
URL: https://muthoot.com/media/vidyabalan
URL: https://muthoot.com/media/Vibhavana2019
It was observed that Secure flag was not set for the cookies for
the web application
It was observed that HttpOnly flag was not set for the cookies
Malicious JavaScript has access to all the same objects as the rest of the web page, including
access to cookies and local storage, which are often used to store session tokens. If an attacker
can obtain a user's session cookie, they can then impersonate that user.Furthermore, JavaScript
can read and make arbitrary modifications to the contents of a page being displayed to a user.
Therefore, XSS in conjunction with some clever social engineering opens up a lot of possibilities
for an attacker
Lack of support implies that no new security patches for the product will be released by the
vendor. As a result, it is likely to contain security vulnerabilities.
The attacker may be able to use these credentials as these file(s) contains full/partial source
code that contains a mysql_connect/mysql_pconnect function call that includes the MySQL
connection credentials. This information is highly sensitive and should not be found on a
production system.
These files are most likely database dumps and may contain sensitive information.
An authenticated, remote attacker can exploit this, by injecting custom SQL in place of their
own username, to inject or manipulate SQL queries in the back-end database, resulting in the
disclosure or manipulation of arbitrary data.
The use of third-party JavaScript libraries can introduce a range of DOM-based vulnerabilities,
including some that can be used to hijack user accounts like DOM-XSS.
Reference:
- https://nvd.nist.gov/vuln/detail/cve-2020-11022
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6071
A user can view a list of all files from the affected directories possibly exposing sensitive
information
Error messages may disclose sensitive information which can be used to escalate attacks
If an attacker is able to login s/he can access, modify or delete all MySQL databases.
Bash_history files may contain sensitive information that should not be disclosed to the public
An unauthenticated, remote attacker can exploit this, via a simple GET request, to disclose
potentially sensitive information.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
When a web page uses an insecurely configured iframe to embed another web page, the latter
may manipulate the former, and trick its visitors into performing unwanted actions.
Cookies could be sent over unencrypted channels. When a cookie is set with the Secure flag, it
instructs the browser that the cookie can only be accessed over secure SSL/TLS channels. This is
important security protection for session cookies.
The application fails to prevent users from connecting to it over unencrypted connections. An
attacker able to modify a legitimate user's network traffic could bypass the application's use of
SSL/TLS encryption, and use the application as a platform for attacks against its users. This
attack is performed by rewriting HTTPS links as HTTP, so that if a targeted user follows a link to
the site from an HTTP page, their browser never attempts to use an encrypted connection. The
sslstrip tool automates this process.
An attacker might use the disclosed information to harvest specific security vulnerabilities for
the version identified.
Missing X-Frame-Header leaves the web application susseptible to Click=Jacking attacks The
impact depends on the affected web application.
Web application does not validate input properly, an attacker is able to craft the input in a form
that is not expected by the rest of the application. This will lead to parts of the system receiving
unintended input, which may result in altered control flow, arbitrary control of a resource, or
arbitrary code execution.
Vulnerability Rating Recommendation
Apply context-dependent encoding and/or validation to user input rendered on a
page
High
High
High
Ensure proper restrictions are in place, or remove the file if the file is not required.
Medium
Medium
Restrict directory listings from the web server configuration.
Medium
Verify that these page(s) are disclosing error or warning messages and properly
configure the application to log errors to a file instead of displaying the error to the
user.
Medium
Configure your web server to prevent public access to the phpMyAdmin directory
by implementing access control mechanisms.
Low
Ensure proper restrictions are in place, or remove the file if the file is not required.
Low
Ensure proper restrictions are in place, or remove the file if the file is not required.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
Use the sandbox attribute to secure the iframe while applying sandbox directives to
ease security restrictions if necessary.
Low
The application should instruct web browsers to only access the application using
HTTPS. To do this, enable HTTP Strict Transport Security (HSTS) by adding a
response header with the name 'Strict-Transport-Security' and the value 'max-
age=expireTime', where expireTime is the time in seconds that browsers should
Low remember that the site should only be accessed using HTTPS. Consider adding the
'includeSubDomains' flag if appropriate.
Configure your web server to prevent information leakage from its HTTP response.
Low https://www.php.net/manual/en/function.header-remove.php
Configure your web server to include an X-Frame-Options header and a CSP header
with frame-ancestors directive. Consult Web references for more information about
the possible values for this header.
Low
Implement Input validation using both server-side code as well as client-side code.
Assume all input is malicious. Use an "accept known good" input validation strategy,
i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any
Low input that does not strictly conform to specifications or transform it into something
that does.
Vulnerability Status by
Vulnerability status POCs
Muthoot
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Comments by BakerTilly
URL: https://www.muthoot.com/old_site/xml.php
URL: https://www.muthoot.com/old_site/index.php
SQL Dump Files Disclosed via Web Server
URL: https://muthoot.com/search/sql/
phpMyAdmin 4.x < 4.9.4
URL: https://muthoot.com/phpmyadmin/doc/html/index.html
Vulnerable JavaScript libraries
URL: https://muthoot.com/js/jquery-1.4.2.min.js
URL: https://muthoot.com/js/jquery-1.3.1.min.js
Directory listings
URL: https://muthoot.com/js/
URL: https://muthoot.com/pdf/
URL: https://muthoot.com/search/
URL: https://muthoot.com/data/
Application Error Messages
PhpMyAdmin Accessible
bash history file found
Error Logs
Insecure Inline Frame (iframe)
URL: https://muthoot.com/
Insecure Inline Frame (iframe)
URL: https://muthoot.com/media/BlueAnthem
Insecure Inline Frame (iframe)
URL: https://muthoot.com/media/FincorpGoldLoan
Insecure Inline Frame (iframe)
URL: https://muthoot.com/media/GoldPoint
Insecure Inline Frame (iframe)
URL: https://muthoot.com/contactus/registeredaddresses
URL: https://muthoot.com/media/HomeLoan
Insecure Inline Frame (iframe)
URL: https://muthoot.com/media/RestartIndia
Insecure Inline Frame (iframe)
URL: https://muthoot.com/media/TwoWheeler
Insecure Inline Frame (iframe)
URL: https://muthoot.com/media/Women
Insecure Inline Frame (iframe)
URL: https://muthoot.com/media/goldLoan
Insecure Inline Frame (iframe)
URL: https://muthoot.com/media/zaheerKhan
Insecure Inline Frame (iframe)
URL: https://muthoot.com/media/vidyabalan
Insecure Inline Frame (iframe)
URL: https://muthoot.com/media/Vibhavana2019
Cookies without Secure flag set
Cookies without HttpOnly flag set
HSTS not Implemented
PHP Version Disclosure
Clickjacking: X-Frame-Options header
Input Validation
URL: https://muthoot.com/careers/apply/14
URL: https://muthoot.com/careers/applynew/14