Sample Web Application Security Assessment
Sample Web Application Security Assessment
Confidential: v1.0
Technical Report
Submitted To
Web Application Security Assessment
Table of Contents .......................................................................................................................................
Executive Summary..................................................................................................................................... 3
Scope of the Exercise............................................................................................................................... 3
Type of Test ......................................................................................................................................... 3
Overview of Results..................................................................................................................................... 4
Distribution of Vulnerabilities – Census Report ........................................................................................ 4
Census of Web Application Vulnerabilities ......................................................................................... 4
Host Details .................................................................................................................................................. 4
Vulnerabilities and Proof of Concept ......................................................................................................... 5
Vulnerability Summary ............................................................................................................................... 7
OWASP TOP 10 Vulnerabilities Status ...................................................................................................... 7
Observations ................................................................................................................................................ 8
1. Session Fixation ................................................................................................................................... 8
2. User Credentials are sent in Clear text ................................................................................................. 9
3. Clickjacking ........................................................................................................................................ 10
4. Code Value Not Validated Properly ....................................................... Error! Bookmark not defined.
5. Information Disclosure........................................................................... Error! Bookmark not defined.
6. Application Error Message ................................................................. Error! Bookmark not defined.
7. Vulnerable jQuery Version................................................................................................................ 11
8. Username Enumeration ....................................................................... Error! Bookmark not defined.
9. Content Security Policy Header Missing .......................................................................................... 11
10. Missing X-XSS Protection ................................................................................................................ 12
11. Missing X-Content-Type-Options ................................................................................................... 13
Conclusion.................................................................................................................................................. 15
Executive Summary
Scope of the Exercise
The purpose of this assessment was to discover, identify vulnerabilities and security issues
on the Web Application of with the help of the provided information. The scope limits
assessment of the web application with the identification, categorization and providing
mitigation strategies of vulnerabilities. The audit activities carried out based on OWASP
guidelines.
Type of Test
Overview of Results
Distribution of Vulnerabilities – Census Report
The following graphical representation details the current threat level based on the severity
of the vulnerabilities, business impact and ease of mitigation.
Vulnerability Overview
High, 4
Low, 6
Medium, 1
Host Details
1. https://---------------------------
Description:
The description provides a brief outline of the vulnerability, including its common identifier,
where applicable and available.
Affected Link & Parameter [Location of Vulnerability]:
The systems responsible or affected for or due to the vulnerability are listed here. If multiple
systems are involved or are affected by different instances of the same vulnerability then
they will be listed here along with the other targets. In case of web applications the affected
URL or the server configuration will be listed.
Vulnerability Summary
This section presents the analysis of vulnerabilities found on the Web Application as per
OWASP Top 10 - 2017 guidelines.
Observations
This section presents a descriptive analysis of the vulnerabilities found on the Web
Application that were obtained while performing the tests.
1. Session Fixation
Description:
Session fixation is a web attack technique. The attacker tricks the user into using a specific
session ID. After the user logs in to the web application using the provided session ID, the
attacker uses this valid session ID to gain access to the user’s account.
Affected Link & Parameter [Location of Vulnerability]:
https://--------
Business Impact:
High: Attacker who compromises this vulnerability gets the full access for the vulnerable
session without any authentication. This vulnerability occurs due to Improper Session
Management
Ease of Exploitation:
Intermediate.
Recommendation and Mitigation Strategies:
Session IDs should be validated properly, so that if same IDs or token value repeated for
different session, server should destroy all the session and ask for re-authentication
Proof of Concept:
Proof of Concept:
3. Clickjacking
Description:
The application response headers contain missing X-Frame-Field options. Which may allow
attacker to inject some other page using Iframe code.
Affected Link & Parameter [Location of Vulnerability]:
http://
Business Impact:
High: if an attacker carefully crafted combination of stylesheets, iframes, and text boxes, a
user can be led to believe they are typing in the password to their email or bank account, but
are instead typing into an invisible frame controlled by the attacker.
Ease of Exploitation:
Intermediate
Recommendation and Mitigation Strategies:
Please enable X-Frame-Options and set it to “DENY”, “SAME ORIGIN” or “ALLOW-FROM uri”.
•X-Frame-Options: DENY « won’t allow the website to be framed by anyone.
•X-Frame-Options: SAMEORIGIN « No one can frame except for sites from same origin.
•X-Frame-Options: ALLOW-FROM uri « which permits the specified 'uri' to frame this page.
(e.g., ALLOW-FROM http://www.example.com).
•https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet
How to Generate Issue:
➢ As the given application doesn’t contain X-Frame Options header
➢ Attacker can inject iframes and will miss use the application
➢ The below mentioned code is the testing code used by the attacker :
<html>
<head>
<title>Clickjack test page</title>
</head>
<body>
<p>This Website is vulnerable to clickjacking!</p>
VAPT Report – Technical Confidential Page10 of 15
Web Application Security Assessment
<iframe src="http://24exch.com/login" width="600" height="700"></iframe>
</body>
</html>
➢ The vulnerability has been exploited successfully and kindly find below pictures for
reference
Proof of Concept:
(b) Clickjacking
Proof of Concept:
Ease of Exploitation:
Intermediate.
Recommendation and Mitigation Strategies:
Mitigates Cross-Site Scripting (XSS) attacks
Set X-XSS-Protection "1; mode=block"
Proof of Concept:
Conclusion
I have conducted Web Application Security Assessment on the given Web Application of and
found the above-mentioned vulnerabilities.