0% found this document useful (0 votes)
41 views46 pages

Vulnarabilities

The document details a security assessment of the target URL https://thc.cybersapiens.in, identifying vulnerabilities related to SSL certificate trust, password field autocomplete, strict transport security, and cookie settings. Key findings include a medium risk vulnerability for an untrusted SSL certificate and several low-risk issues, such as password field autocomplete and lack of HttpOnly flags on cookies. Recommendations for remediation are provided to enhance the application's security posture.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views46 pages

Vulnarabilities

The document details a security assessment of the target URL https://thc.cybersapiens.in, identifying vulnerabilities related to SSL certificate trust, password field autocomplete, strict transport security, and cookie settings. Key findings include a medium risk vulnerability for an untrusted SSL certificate and several low-risk issues, such as password field autocomplete and lack of HttpOnly flags on cookies. Recommendations for remediation are provided to enhance the application's security posture.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

SSL CERTIFICATE

1. General Information

• Target URL: https://thc.cybersapiens.in

• Assessment Type: Manual Black Box Testing

• Assessment Date: [05/02/2025] - [End Date]

• Assessor: Sarthak Tambat

• Confidentiality: Private & Restricted

2. Executive Summary Objective:

The primary objective of this assessment was to identify security vulnerabilities


related to authentication, session management, access control, and SSL/TLS
configurations within the target application.

Scope:

• User Profile Management

• Authentication & Authorization Mechanisms

• Session Handling • SSL/TLS Security

Methodology: This assessment was conducted using manual penetration testing


techniques aligned with:

• OWASP Top 10 2023

• MITRE ATT&CK Framework

• Burp Suite Interception and Manipulation

Overall Risk Level: MEDIUM

Summary of Findings: Vulnerability SSL Certificate Not Trusted Severity: MEDIUM Status:
Confirmed

3. Methodology Testing Approach:

• Manual testing of authentication, session handling, and input validation.

• Utilizing Burp Suite to intercept, modify, and replay requests.

• Verifying SSL/TLS security using browser and SSL scanning tools.


Tools Used:

• Burp Suite (Manual Interception & Request Modification)

• Developer Tools (Console Manipulation & JavaScript Overrides)

• SSL Labs / OpenSSL (Certificate Validation)

Testing Checklist: • Authentication & Session Handling

• Authorization & Access Control

• Input Validation & Data Integrity

• SSL/TLS Security

4. Vulnerabilities Found 4.1 SSL Certificate Not Trusted

• Severity: MEDIUM

• CWE ID: CWE-295 (Improper Certificate Validation)

• OWASP Category: A03:2021 - Sensitive Data Exposure

Description: The SSL certificate presented by the server is not trusted due to missing or
unrecognized root CA certification in Burp Suite's Java trust store. The server's certificate
chain includes: • Server certificate issued to cybersapiens.in, *.cybersapiens.in by WE1 •
WE1 issued by GTS Root R4 • GTS Root R4 issued by GlobalSign Root CA • GlobalSign Root
CA issued by itself

Affected URLs: • https://thc.cybersapiens.in/

Impact: • Users may receive security warnings when accessing the website, reducing trust
and credibility. • Man-in-the-middle (MITM) attacks could be facilitated if users ignore
certificate warnings. • Data transmitted between the client and server may be susceptible to
interception if SSL/TLS is improperly configured.

Steps to Reproduce:

1. Open the target URL (https://thc.cybersapiens.in/) in a browser or Burp Suite.

2. Inspect the SSL certificate details and observe the trust warning.

3. Use SSL Labs or OpenSSL to validate the certificate chain.

4. Confirm the certificate is issued by an unrecognized authority.


Proof of Concept (PoC Screenshot/Video):
Remediation:

To mitigate this issue, the following steps are recommended: • Ensure that the SSL
certificate is issued by a publicly trusted Certificate Authority (CA). • Verify that the
complete certificate chain is correctly installed on the server. • Update and configure the
SSL/TLS settings to use industry best practices. • Run an SSL scan (e.g., SSL Labs) to verify the
security rating and fix any reported issues.

Vulnerability Classifications:

• CWE-295: Improper Certificate Validation


• CWE-326: Inadequate Encryption Strength
• CWE-327: Use of a Broken or Risky Cryptographic Algorithm

5. Conclusion The SSL Certificate Not Trusted vulnerability is classified as Medium


risk. Failure to use a trusted SSL certificate can lead to potential MITM attacks and
loss of user trust. Implementing the recommended remediations will enhance the
application's overall security posture.
Password Field with
Autocomplete Enabled
1. General Information

• Target URL: http://thc.cybersapiens.in

• Assessment Type: Manual Black Box Testing

• Assessment Date: [05/02/2025] - [End Date]

• Assessor: [Your Name]

• Confidentiality: Private & Restricted

2. Executive Summary

Objective:
The primary objective of this assessment was to identify security vulnerabilities related to
authentication, session management, and access control within the target application.

Scope:

• User Profile Management

• Authentication & Authorization Mechanisms

• Session Handling

Methodology:
This assessment was conducted using manual penetration testing techniques aligned with:

• OWASP Top 10 2023

• MITRE ATT&CK Framework

• Burp Suite Interception and Manipulation

Overall Risk Level: LOW

Summary of Findings:

Vulnerability Password Field with Autocomplete Enabled

Severity Low Status Confirmed

3. Methodology

Testing Approach:

• Manual testing of authentication, user management, and input validation.


• Utilizing Burp Suite to intercept, modify, and replay requests.

Tools Used:

• Burp Suite (Manual Interception & Request Modification)

• Developer Tools (Console Manipulation & JavaScript Overrides)

Testing Checklist:

• Authentication & Session Handling

• Authorization & Access Control

• Input Validation & Data Integrity

4. Vulnerabilities Found

4.1 Password Field with Autocomplete Enabled

• Severity: LOW

• CWE ID: CWE-200 (Information Exposure)

• OWASP Category: A03:2021 - Sensitive Data Exposure

Description:
The password field in the login and admin sections of the application has autocomplete
enabled. This allows web browsers to store passwords, making them susceptible to attacks if
an attacker gains access to the user’s computer or uses cross-site scripting (XSS)
vulnerabilities to extract stored credentials.

Affected URLs:

• https://thc.cybersapiens.in/admin/

• https://thc.cybersapiens.in/login/login.php

Impact:

• Credentials can be stored on the local machine, increasing the risk of theft in case of
malware or unauthorized access.

• Attackers exploiting XSS vulnerabilities may extract stored credentials.

• May cause compliance issues with PCI DSS requirements.

Steps to Reproduce:

1. Navigate to the login page (/login/login.php) or admin panel (/admin/).


2. Enter a test username and password in the respective fields.

3. Submit the form and check the browser prompt asking to save the credentials.

4. Open browser settings and view the saved credentials for the site.

5. If the site does not prevent credential storage, the issue is confirmed.

Proof of Concept (PoC Screenshot/Video):


Remediation:
To prevent browsers from storing credentials in HTML forms, apply the following:

• Set the autocomplete="off" attribute within the <form> tag or individual <input>
fields for passwords.

• Example fix:

<form action="/login" method="POST" autocomplete="off">

<input type="password" name="password" autocomplete="new-password">

</form>

• Note: Some modern browsers may still ignore this directive, but implementing it
helps maintain compliance.

Vulnerability Classifications:

• CWE-200: Information Exposure

5. Conclusion

The Password Field with Autocomplete Enabled vulnerability is classified as a Low risk but
still poses a security concern if combined with other attack vectors like XSS. Implementing
proper form attributes and educating users about secure credential storage will mitigate this
risk.
Strict transport security not enforced

1. General Information
• Target URL: https://thc.cybersapiens.in
• Assessment Type: Manual Black Box Testing
• Assessment Date: [05/02/2025] - [End Date]
• Assessor: [Your Name]
• Confidentiality: Private & Restricted
2. Executive Summary Objective:
The primary objective of this assessment was to identify security vulnerabilities
related to authentication, session management, access control, and transport security
within the target application.
Scope:
• User Profile Management
• Authentication & Authorization Mechanisms
• Session Handling • Secure Transport Mechanisms

Methodology:
This assessment was conducted using manual penetration testing techniques aligned
with: • OWASP Top 10 2023 • MITRE ATT&CK Framework • Burp Suite
Interception and Manipulation
Overall Risk Level: LOW
Summary of Findings: Vulnerability Strict Transport Security Not Enforced Severity Low
Status Confirmed
3. Methodology Testing Approach:
• Manual testing of authentication, user management, and input validation.
• Utilizing Burp Suite to intercept, modify, and replay requests.
Tools Used:
• Burp Suite (Manual Interception & Request Modification)
• Developer Tools (Console Manipulation & JavaScript Overrides)
Testing Checklist:
• Authentication & Session Handling
• Authorization & Access Control
• Transport Layer Security (TLS/SSL) Configuration

4. Vulnerabilities Found
4.1 Strict Transport Security Not Enforced
• Severity: LOW
• CWE ID: CWE-523 (Unprotected Transport of Credentials)
• OWASP Category: A02:2021 - Cryptographic Failures

Description: The application does not enforce HTTP Strict Transport Security (HSTS),
leaving users vulnerable to SSL stripping attacks. Attackers can downgrade HTTPS
connections to HTTP, intercepting sensitive user data.

Affected URLs:
• http://thc.cybersapiens.in
• https://thc.cybersapiens.in

Impact:
• Users may be unknowingly redirected to an unencrypted version of the site.
• Attackers can perform Man-in-the-Middle (MITM) attacks, intercepting login
credentials and session cookies.
• Data transmitted without encryption may be exposed to unauthorized third parties.
Steps to Reproduce:
1. Access the website using HTTP (http://thc.cybersapiens.in).
2. Observe that the connection does not automatically redirect to HTTPS.
3. Use Burp Suite or Wireshark to monitor network traffic.
4. Perform an SSL stripping attack using sslstrip to intercept unencrypted traffic.
5. Observe that sensitive information, such as login credentials, can be captured.
Proof of Concept (PoC Screenshot/Video):
Remediation: To enforce HTTPS and mitigate SSL stripping attacks, implement HSTS
(HTTP Strict Transport Security):

1. Add the following HTTP response header:


Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
2. Ensure that the site only serves HTTPS and does not allow HTTP connections.
3. Enable HSTS preloading by submitting the domain to the HSTS preload list:
• HSTS Preload Form
4. Update web server configurations:
• Apache:
<IfModule mod_headers.c>
Header always set Strict-Transport-Security "max-age=31536000;
includeSubDomains; preload"
</IfModule>
• Nginx:
add_header Strict-Transport-Security "max-age=31536000;
includeSubDomains; preload" always;

Vulnerability Classifications:

• CWE-523: Unprotected Transport of Credentials

5. Conclusion The Strict Transport Security Not Enforced vulnerability poses a low
risk but could be leveraged in combination with other attacks. Enforcing HSTS with
proper headers and restricting HTTP access will ensure secure communication for all
users.
Cookie without HttpOnly flag set
1. General Information

• Target URL: https://thc.cybersapiens.in


• Assessment Type: Manual Black Box Testing
• Assessment Date: [05/02/2025] - [End Date]
• Assessor: [Your Name]
• Confidentiality: Private & Restricted

2. Executive Summary Objective: The primary objective of this assessment was to


identify security vulnerabilities related to authentication, session management,
access control, and transport security within the target application.

Scope:

• User Profile Management


• Authentication & Authorization Mechanisms
• Session Handling
• Secure Transport Mechanisms
Methodology:

This assessment was conducted using manual penetration testing techniques aligned with:

• OWASP Top 10 2023


• MITRE ATT&CK Framework
• Burp Suite Interception and Manipulation
Overall Risk Level: LOW

Summary of Findings: Vulnerability Cookie without HttpOnly flag set Severity Low Status
Confirmed

3. Methodology Testing Approach: • Manual testing of authentication, user


management, and input validation. • Utilizing Burp Suite to intercept, modify, and
replay requests.

Tools Used:
• Burp Suite (Manual Interception & Request Modification)
• Developer Tools (Console Manipulation & JavaScript Overrides)
Testing Checklist:
• Authentication & Session Handling
• Authorization & Access Control
• Transport Layer Security (TLS/SSL) Configuration

4. Vulnerabilities Found

4.1 Cookie without HttpOnly flag set


• Severity: LOW
• CWE ID: CWE-16 (Configuration Issue)
• OWASP Category: A07:2021 - Identification and Authentication Failures

Description: The application issued a session cookie (PHPSESSID) without setting the
HttpOnly flag. This omission allows client-side JavaScript to access the cookie, increasing the
risk of session hijacking via Cross-Site Scripting (XSS) attacks.

Affected URLs: • https://thc.cybersapiens.in/login/login.php

Impact:
• Attackers exploiting XSS vulnerabilities can access session cookies and hijack user sessions.
• User authentication tokens can be stolen, leading to unauthorized account access.
• Exposing session cookies to client-side scripts makes them more susceptible to
exploitation.

Steps to Reproduce:

1. Log in to the application at https://thc.cybersapiens.in/login/login.php.

2. Use Developer Tools (F12 in Chrome) and go to the Application tab.

3. Expand Storage > Cookies and select https://thc.cybersapiens.in.

4. Check the PHPSESSID cookie and observe that the HttpOnly flag is not set.

5. Use Burp Suite to intercept and inspect the Set-Cookie header in the server
response.

6. Confirm that PHPSESSID does not include the HttpOnly attribute.

Proof of Concept (PoC Screenshot/Video):


Remediation: To prevent session hijacking, enforce the HttpOnly flag on session cookies by
modifying the web server or application settings:

1. Update web application code to include the HttpOnly flag:

• PHP:

session_set_cookie_params(['httponly' => true,'secure' => true,'samesite' =>'Strict']);

• Apache:

Header edit Set-Cookie ^(.*)$ $1; HttpOnly; Secure

• Nginx:

add_header Set-Cookie "path=/; HttpOnly; Secure";

2. Ensure the application properly sets session cookies with the HttpOnly attribute in all
responses.

3. Perform periodic security assessments to validate session cookie security


configurations.
Vulnerability Classifications:

• CWE-16: Configuration Issue

5. Conclusion The Cookie without the HttpOnly flag set vulnerability poses a low risk
but can be exploited in conjunction with Cross-Site Scripting (XSS) attacks to steal
session tokens. Enforcing the HttpOnly attribute on session cookies will mitigate
this risk and enhance session security.

Cross-domain script include


1. General Information

• Target URL: http://thc.cybersapiens.in


• Assessment Type: Manual Black Box Testing
• Assessment Date: [05/02/2025] - [End Date]
• Assessor: [Your Name]
• Confidentiality: Private & Restricted
2. Executive Summary Objective: The primary objective of this assessment was to
identify security vulnerabilities related to authentication, session management, and
access control within the target application.

Scope:
• User Profile Management
• Authentication & Authorization Mechanisms
• Session Handling
Methodology: This assessment was conducted using manual penetration testing techniques
aligned with:

• OWASP Top 10 2023


• MITRE ATT&CK Framework
• Burp Suite Interception and Manipulation
Overall Risk Level: INFORMATIONAL
Summary of Findings:

Vulnerability Cross-domain Script Include

Severity Informational

Status Confirmed

3. Methodology Testing Approach: • Manual testing of authentication, user


management, and input validation. • Utilizing Burp Suite to intercept, modify, and
replay requests.

Tools Used:

• Burp Suite (Manual Interception & Request Modification)


• Developer Tools (Console Inspection & JavaScript Overrides)

Testing Checklist:

• Authentication & Session Handling


• Authorization & Access Control
• Input Validation & Data Integrity

4. Vulnerabilities Found

4.1 Cross-domain Script Include • Severity: INFORMATIONAL • CWE ID: CWE-829 (Inclusion
of Functionality from Untrusted Control Sphere) • OWASP Category: A08:2021 - Software
and Data Integrity Failures

Description: The application dynamically includes a script from an external domain within its
response. The following script was identified being loaded from an external source:

• https://www.google.com/recaptcha/api.js

When an application includes a script from another domain, it executes within the security
context of the application. If an attacker compromises the external domain, they can
manipulate the script to perform malicious actions within the application.

Affected URLs: • https://thc.cybersapiens.in/login/login.php

Impact:
• If the external domain is compromised, an attacker could inject malicious scripts into the
application.
• Sensitive user actions and data could be exposed to the third-party domain.
• It introduces dependency risks where downtime or changes to the external script can
affect application functionality.
Steps to Reproduce:

1. Open the browser and navigate to https://thc.cybersapiens.in/login/login.php.


2. Open Developer Tools (F12) and navigate to the Network tab.
3. Reload the page and filter for JavaScript files.
4. Identify external script inclusions, such as https://www.google.com/recaptcha/api.js.
5. Verify that the script is being loaded dynamically in the response.

Proof of Concept (PoC Screenshot/Video):


Remediation:

• Avoid dynamically loading scripts from untrusted external domains.

• Host required scripts on the application’s own domain instead of relying on third-party
hosting.

• Use Subresource Integrity (SRI) to ensure the script has not been tampered with. Example:

<script src="https://www.google.com/recaptcha/api.js" integrity="sha384-


BASE64HASH" crossorigin="anonymous"></script>

• Regularly monitor and audit third-party scripts for security updates.

Vulnerability Classifications:

• CWE-829: Inclusion of Functionality from Untrusted Control Sphere

5. Conclusion The Cross-domain Script Include vulnerability is classified as an


Informational risk. While not an immediate security threat, it introduces a
dependency on external sources, which could be exploited if the third-party
provider is compromised. Implementing proper script integrity checks and self-
hosting critical scripts where possible will mitigate potential risks.
Cacheable HTTPS response

1. General Information

• Target URL: http://thc.cybersapiens.in


• Assessment Type: Manual Black Box Testing
• Assessment Date: [05/02/2025] - [End Date]
• Assessor: [Your Name]
• Confidentiality: Private & Restricted

2. Executive Summary Objective: The primary objective of this assessment was to


identify security vulnerabilities related to authentication, session management, and
access control within the target application.

Scope:

• User Profile Management


• Authentication & Authorization Mechanisms
• Session Handling

Methodology: This assessment was conducted using manual penetration testing techniques
aligned with:

• OWASP Top 10 2023


• MITRE ATT&CK Framework
• Burp Suite Interception and Manipulation
Overall Risk Level: INFORMATIONAL

Summary of Findings:

Vulnerability Cacheable HTTPS Response

Severity Informational

Status Confirmed

3. Methodology Testing Approach:

• Manual testing of authentication, user management, and input validation.

• Utilizing Burp Suite to intercept, modify, and replay requests.

Tools Used:

• Burp Suite (Manual Interception & Request Modification)

• Developer Tools (Console Inspection & JavaScript Overrides)

Testing Checklist:

• Authentication & Session Handling

• Authorization & Access Control

• Input Validation & Data Integrity

4. Vulnerabilities Found

4.1 Cacheable HTTPS Response

• Severity: INFORMATIONAL

• CWE ID: CWE-524 (Information Exposure Through Caching), CWE-525 (Information


Exposure Through Browser Caching)

• OWASP Category: A03:2021 - Sensitive Data Exposure

Description:
Browsers may store a local cached copy of content received from web servers unless
directed otherwise. Some browsers, including Internet Explorer, cache content accessed via
HTTPS. If sensitive information in application responses is stored in the local cache, it may be
retrieved by other users who have access to the same computer at a future time.

Affected URLs:

• https://thc.cybersapiens.in/admin/

Impact:
• Sensitive data may be retrieved by unauthorized users accessing the same computer.
• Cached responses could expose confidential information, such as user session data,
authentication details, or financial records.
Steps to Reproduce:

1. Open the browser and navigate to https://thc.cybersapiens.in/admin/.

2. Open Developer Tools (F12) and navigate to the Network tab.

3. Reload the page and inspect the HTTP response headers.

4. Check if caching headers such as Cache-Control: no-store or Pragma: no-cache are


missing.

5. If caching headers are absent, verify that content is stored locally by examining the
browser's cache storage.

Proof of Concept (PoC Screenshot/Video):


Remediation:

• Ensure the web server returns appropriate caching directives to prevent storing sensitive
content.

• Configure server settings to return the following HTTP headers in all responses containing
sensitive data:

Cache-Control: no-store

Pragma: no-cache

• Implement security policies in web development frameworks to disable caching for


sensitive pages.

• Perform regular audits to verify caching directives are correctly applied.

Vulnerability Classifications:

• CWE-524: Information Exposure Through Caching


• CWE-525: Information Exposure Through Browser Caching

5. Conclusion The Cacheable HTTPS Response vulnerability is classified as an


Informational risk. While not an immediate security threat, improperly cached
sensitive data may expose users to unauthorized access. Implementing appropriate
caching directives at the server level will mitigate this risk.

Long redirection response

1. General Information

• Target URL: http://thc.cybersapiens.in


• Assessment Type: Manual Black Box Testing
• Assessment Date: [05/02/2025] - [End Date]
• Assessor: [Your Name] • Confidentiality: Private & Restricted
2. Executive Summary Objective:
The primary objective of this assessment was to identify security vulnerabilities
related to authentication, session management, and access control within the target
application.
Scope:

• User Profile Management


• Authentication & Authorization Mechanisms
• Session Handling

Methodology:

This assessment was conducted using manual penetration testing techniques aligned with:

• OWASP Top 10 2023

• MITRE ATT&CK Framework

• Burp Suite Interception and Manipulation

Overall Risk Level: INFORMATIONAL

Summary of Findings:

Vulnerability Long Redirection Response

Severity Informational

Status Confirmed

3. Methodology Testing Approach:

• Manual testing of authentication, user management, and input validation.

• Utilizing Burp Suite to intercept, modify, and replay requests.

Tools Used:

• Burp Suite (Manual Interception & Request Modification)

• Developer Tools (Console Inspection & JavaScript Overrides)

Testing Checklist:

• Authentication & Session Handling


• Authorization & Access Control
• Input Validation & Data Integrity
4. Vulnerabilities Found

4.1 Long Redirection Response

• Severity: INFORMATIONAL
• CWE ID: CWE-698 (Execution After Redirect - EAR)
• OWASP Category: A01:2021 - Broken Access Control
Description:

The application returned a redirection response containing a "long" message body.


Ordinarily, this content is not displayed to the user, because the browser automatically
follows the redirection. Occasionally, redirection responses contain sensitive data. For
example, if the user requests a page that they are not authorized to view, then an
application might issue a redirection to a different page but also include the contents of the
prohibited page.

Affected URLs:

• https://thc.cybersapiens.in/login/

Impact:

• Unauthorized users might be able to retrieve sensitive content from redirection responses.
• Exposed data could include confidential user information, authentication details, or
restricted content.

Steps to Reproduce:

1. Open Burp Suite and enable Intercept mode.


2. Navigate to https : //thc.cybersapiens.in/login/.
3. Submit an invalid or unauthorized login request.
4. Inspect the HTTP response body for excessive content that should not be included in
a redirection response.
Proof of Concept (PoC Screenshot/Video):
PHP Version Disclosure (x-powered-by: PHP/7.4.33)

• This reveals the server's PHP version, which can be exploited if there are known vulnerabilities in that version.

reCAPTCHA Site Key (data-sitekey="6LcRAbkaAAAAAAPK-oSH_gFb98MMPhnvzHqKqKo-")

• While the site key itself is not highly sensitive, an attacker could use it for abuse, such as tricking users into solving CAPTCHAs
for another site. However, the secret key (not visible here) is required for bypassing CAPTCHA verification.

Error Message (Wrong username/password combination)

• The presence of an error message indicating incorrect login credentials may help attackers confirm whether an account exists
(username enumeration).

Cloudflare Information (CF-RAY, cf-cache-status, NEL, Report-To)

• While not highly sensitive, these headers reveal that the site is using Cloudflare for security and performance, which could help
attackers tailor their approach (e.g., bypassing WAF protections).
Remediation:

• Ensure that redirection responses do not include unnecessary or sensitive content in the
response body.

• Modify request handling logic to verify authorization before returning any sensitive
content.

• Use a proper API method for redirections that does not return body content.

• Perform regular audits to verify that redirections do not expose sensitive information.

Vulnerability Classifications:

• CWE-698: Execution After Redirect (EAR)

5. Conclusion The Long Redirection Response vulnerability is classified as an


Informational risk. While not an immediate security threat, improperly handled
redirections may expose sensitive data to unauthorized users. Implementing
proper request validation and response handling will mitigate this risk.

Frameable response (potential Clickjacking)


1. General Information

• Target URL: http://thc.cybersapiens.in

• Assessment Type: Manual Black Box Testing

• Assessment Date: [05/02/2025] - [End Date] • Assessor: [Your Name]

• Confidentiality: Private & Restricted

2. Executive Summary Objective: The primary objective of this assessment was to


identify security vulnerabilities related to authentication, session management, and
access control within the target application.

Scope:

• User Profile Management

• Authentication & Authorization Mechanisms

• Session Handling

Methodology:

This assessment was conducted using manual penetration testing techniques aligned with: •
OWASP Top 10 2023

• MITRE ATT&CK Framework

• Burp Suite Interception and Manipulation

Overall Risk Level: INFORMATIONAL

Summary of Findings:

Vulnerability Frameable Response (Potential Clickjacking)

Severity Informational

Status Confirmed

3. Methodology Testing Approach:

• Manual testing of authentication, user management, and input validation.

• Utilizing Burp Suite to intercept, modify, and replay requests.

Tools Used:
• Burp Suite (Manual Interception & Request Modification)

• Developer Tools (Console Inspection & JavaScript Overrides)

Testing Checklist:
• Authentication & Session Handling
• Authorization & Access Control
• Input Validation & Data Integrity

4. Vulnerabilities Found

4.1 Frameable Response (Potential Clickjacking) • Severity: INFORMATIONAL • CWE ID: CWE-
693 (Protection Mechanism Failure) • OWASP Category: A05:2021 - Security
Misconfiguration

Description: The application fails to set an appropriate X-Frame-Options or Content-


Security-Policy HTTP header, making it vulnerable to clickjacking attacks. This allows an
attacker to embed the target application within an iframe, potentially tricking users into
performing unintended actions.

Affected URLs:
• https://thc.cybersapiens.in/login/
• https://thc.cybersapiens.in/login/dashboard.php
• https://thc.cybersapiens.in/login/login.php

Impact:

• An attacker could load the vulnerable pages in an iframe and trick users into clicking
hidden buttons or performing sensitive actions.

• Clickjacking may lead to unintended account changes, CSRF exploitation, or data exposure.

Steps to Reproduce:
1. Open Burp Suite and enable Intercept mode.
2. Navigate to one of the affected URLs.
3. Check the HTTP response headers and verify the absence of X-Frame-Options or
Content-Security-Policy.
4. Create a simple HTML page containing an iframe embedding the vulnerable page.
5. Load the HTML page in a browser and confirm that the application is rendered inside
the iframe.
Proof of Concept (PoC Screenshot/Video):

Manual Clickjacking Test

1. Create a simple HTML file (clickjack_test.html) with the following content:

Remediation:
Open the file in a browser.

If the login page loads inside the <iframe>, it confirms the vulnerability.
Implement the X-Frame-Options HTTP header with the value DENY to block all framing.

• Alternatively, use SAMEORIGIN to allow framing only by pages from the same origin.

• Apply a Content-Security-Policy (CSP) directive such as frame-ancestors 'none'; to enforce


protection.

• Regularly audit HTTP security headers for proper implementation.

Vulnerability Classifications:

• CWE-693: Protection Mechanism Failure

5. Conclusion The Frameable Response (Potential Clickjacking) vulnerability is


classified as an Informational risk. While not an immediate security threat, it could
be exploited to trick users into performing unintended actions. Implementing
proper X-Frame-Options or CSP policies will mitigate this risk.
Path-relative style sheet import
1. General Information

• Target URL: http://thc.cybersapiens.in

• Assessment Type: Manual Black Box Testing

• Assessment Date: [05/02/2025] - [End Date]

• Assessor: [Your Name]

• Confidentiality: Private & Restricted

2. Executive Summary Objective: The primary objective of this assessment was to


identify security vulnerabilities related to authentication, session management, and
access control within the target application.

Scope:

• User Profile Management


• Authentication & Authorization Mechanisms
• Session Handling

Methodology:
This assessment was conducted using manual penetration testing techniques aligned with:
• OWASP Top 10 2023
• MITRE ATT&CK Framework
• Burp Suite Interception and Manipulation
Overall Risk Level: INFORMATIONAL

Summary of Findings:

Vulnerability Path-relative Style Sheet Import

Severity Informational

Status Confirmed

3. Methodology Testing Approach:


• Manual testing of authentication, user management, and input validation.
• Utilizing Burp Suite to intercept, modify, and replay requests.

Tools Used:

• Burp Suite (Manual Interception & Request Modification)


• Developer Tools (Console Inspection & JavaScript Overrides)
Testing Checklist:

• Authentication & Session Handling


• Authorization & Access Control
• Input Validation & Data Integrity

4. Vulnerabilities Found

4.1 Path-relative Style Sheet Import


• Severity: INFORMATIONAL
• CWE ID: CWE-16 (Configuration)
• OWASP Category: A05:2021 - Security Misconfiguration

Description: The application imports style sheets using path-relative URLs, which can lead to
CSS injection attacks. If the application tolerates superfluous path-like data, attackers can
manipulate CSS imports to execute malicious styles, read sensitive data, or hijack session-
related information.

Affected URLs:
• https://thc.cybersapiens.in/login/
• https://thc.cybersapiens.in/login/dashboard.php
• https://thc.cybersapiens.in/login/login.php

Impact:

• An attacker can manipulate CSS imports to inject arbitrary styles, affecting page rendering.
• Potential risk of CSS-based data exfiltration via crafted selectors.
• Sensitive data in the URL (e.g., session tokens, CSRF tokens) might be leaked to an
attacker’s domain.

Steps to Reproduce:

1. Open Burp Suite and enable Intercept mode.


2. Navigate to one of the affected URLs and inspect the response headers.
3. Verify that path-relative stylesheets are imported.
4. Modify the request URL by appending arbitrary data (/extra-junk/), e.g.,
/login/dashboard.php/extra-junk/.
5. Check if the CSS file request is affected and observe if it loads unintended content.
Proof of Concept (PoC Screenshot/Video):

• Sends requests to affected URLs.

• Appends arbitrary path-like data (/extra-junk/).

• Checks if the response still contains a valid CSS import.

• Identifies if an unintended response is returned.


If a page allows path-relative imports without breaking the CSS, the issue exists.
Remediation: • Avoid using path-relative URLs for CSS imports; use absolute URLs instead. •
Set the HTTP response header X-Frame-Options: deny to prevent framing in quirks mode. •
Ensure that all HTML pages specify a modern doctype (e.g., <!doctype html>) to avoid quirks
mode. • Implement the X-Content-Type-Options: nosniff header to prevent browsers from
interpreting non-CSS content as CSS. • Regularly audit and validate imported stylesheets to
ensure security.

Vulnerability Classifications:

• CWE-16: Configuration

5. Conclusion The Path-relative Style Sheet Import vulnerability is classified as an


Informational risk. While not an immediate security threat, it could be exploited to
manipulate the page’s rendering and leak sensitive information. Implementing
proper CSS import methods and security headers will mitigate this risk.

You might also like