Vulnarabilities
Vulnarabilities
1. General Information
Scope:
Summary of Findings: Vulnerability SSL Certificate Not Trusted Severity: MEDIUM Status:
Confirmed
• SSL/TLS Security
• Severity: MEDIUM
Description: The SSL certificate presented by the server is not trusted due to missing or
unrecognized root CA certification in Burp Suite's Java trust store. The server's certificate
chain includes: • Server certificate issued to cybersapiens.in, *.cybersapiens.in by WE1 •
WE1 issued by GTS Root R4 • GTS Root R4 issued by GlobalSign Root CA • GlobalSign Root
CA issued by itself
Impact: • Users may receive security warnings when accessing the website, reducing trust
and credibility. • Man-in-the-middle (MITM) attacks could be facilitated if users ignore
certificate warnings. • Data transmitted between the client and server may be susceptible to
interception if SSL/TLS is improperly configured.
Steps to Reproduce:
2. Inspect the SSL certificate details and observe the trust warning.
To mitigate this issue, the following steps are recommended: • Ensure that the SSL
certificate is issued by a publicly trusted Certificate Authority (CA). • Verify that the
complete certificate chain is correctly installed on the server. • Update and configure the
SSL/TLS settings to use industry best practices. • Run an SSL scan (e.g., SSL Labs) to verify the
security rating and fix any reported issues.
Vulnerability Classifications:
2. Executive Summary
Objective:
The primary objective of this assessment was to identify security vulnerabilities related to
authentication, session management, and access control within the target application.
Scope:
• Session Handling
Methodology:
This assessment was conducted using manual penetration testing techniques aligned with:
Summary of Findings:
3. Methodology
Testing Approach:
Tools Used:
Testing Checklist:
4. Vulnerabilities Found
• Severity: LOW
Description:
The password field in the login and admin sections of the application has autocomplete
enabled. This allows web browsers to store passwords, making them susceptible to attacks if
an attacker gains access to the user’s computer or uses cross-site scripting (XSS)
vulnerabilities to extract stored credentials.
Affected URLs:
• https://thc.cybersapiens.in/admin/
• https://thc.cybersapiens.in/login/login.php
Impact:
• Credentials can be stored on the local machine, increasing the risk of theft in case of
malware or unauthorized access.
Steps to Reproduce:
3. Submit the form and check the browser prompt asking to save the credentials.
4. Open browser settings and view the saved credentials for the site.
5. If the site does not prevent credential storage, the issue is confirmed.
• Set the autocomplete="off" attribute within the <form> tag or individual <input>
fields for passwords.
• Example fix:
</form>
• Note: Some modern browsers may still ignore this directive, but implementing it
helps maintain compliance.
Vulnerability Classifications:
5. Conclusion
The Password Field with Autocomplete Enabled vulnerability is classified as a Low risk but
still poses a security concern if combined with other attack vectors like XSS. Implementing
proper form attributes and educating users about secure credential storage will mitigate this
risk.
Strict transport security not enforced
1. General Information
• Target URL: https://thc.cybersapiens.in
• Assessment Type: Manual Black Box Testing
• Assessment Date: [05/02/2025] - [End Date]
• Assessor: [Your Name]
• Confidentiality: Private & Restricted
2. Executive Summary Objective:
The primary objective of this assessment was to identify security vulnerabilities
related to authentication, session management, access control, and transport security
within the target application.
Scope:
• User Profile Management
• Authentication & Authorization Mechanisms
• Session Handling • Secure Transport Mechanisms
Methodology:
This assessment was conducted using manual penetration testing techniques aligned
with: • OWASP Top 10 2023 • MITRE ATT&CK Framework • Burp Suite
Interception and Manipulation
Overall Risk Level: LOW
Summary of Findings: Vulnerability Strict Transport Security Not Enforced Severity Low
Status Confirmed
3. Methodology Testing Approach:
• Manual testing of authentication, user management, and input validation.
• Utilizing Burp Suite to intercept, modify, and replay requests.
Tools Used:
• Burp Suite (Manual Interception & Request Modification)
• Developer Tools (Console Manipulation & JavaScript Overrides)
Testing Checklist:
• Authentication & Session Handling
• Authorization & Access Control
• Transport Layer Security (TLS/SSL) Configuration
4. Vulnerabilities Found
4.1 Strict Transport Security Not Enforced
• Severity: LOW
• CWE ID: CWE-523 (Unprotected Transport of Credentials)
• OWASP Category: A02:2021 - Cryptographic Failures
Description: The application does not enforce HTTP Strict Transport Security (HSTS),
leaving users vulnerable to SSL stripping attacks. Attackers can downgrade HTTPS
connections to HTTP, intercepting sensitive user data.
Affected URLs:
• http://thc.cybersapiens.in
• https://thc.cybersapiens.in
Impact:
• Users may be unknowingly redirected to an unencrypted version of the site.
• Attackers can perform Man-in-the-Middle (MITM) attacks, intercepting login
credentials and session cookies.
• Data transmitted without encryption may be exposed to unauthorized third parties.
Steps to Reproduce:
1. Access the website using HTTP (http://thc.cybersapiens.in).
2. Observe that the connection does not automatically redirect to HTTPS.
3. Use Burp Suite or Wireshark to monitor network traffic.
4. Perform an SSL stripping attack using sslstrip to intercept unencrypted traffic.
5. Observe that sensitive information, such as login credentials, can be captured.
Proof of Concept (PoC Screenshot/Video):
Remediation: To enforce HTTPS and mitigate SSL stripping attacks, implement HSTS
(HTTP Strict Transport Security):
Vulnerability Classifications:
5. Conclusion The Strict Transport Security Not Enforced vulnerability poses a low
risk but could be leveraged in combination with other attacks. Enforcing HSTS with
proper headers and restricting HTTP access will ensure secure communication for all
users.
Cookie without HttpOnly flag set
1. General Information
Scope:
This assessment was conducted using manual penetration testing techniques aligned with:
Summary of Findings: Vulnerability Cookie without HttpOnly flag set Severity Low Status
Confirmed
Tools Used:
• Burp Suite (Manual Interception & Request Modification)
• Developer Tools (Console Manipulation & JavaScript Overrides)
Testing Checklist:
• Authentication & Session Handling
• Authorization & Access Control
• Transport Layer Security (TLS/SSL) Configuration
4. Vulnerabilities Found
Description: The application issued a session cookie (PHPSESSID) without setting the
HttpOnly flag. This omission allows client-side JavaScript to access the cookie, increasing the
risk of session hijacking via Cross-Site Scripting (XSS) attacks.
Impact:
• Attackers exploiting XSS vulnerabilities can access session cookies and hijack user sessions.
• User authentication tokens can be stolen, leading to unauthorized account access.
• Exposing session cookies to client-side scripts makes them more susceptible to
exploitation.
Steps to Reproduce:
4. Check the PHPSESSID cookie and observe that the HttpOnly flag is not set.
5. Use Burp Suite to intercept and inspect the Set-Cookie header in the server
response.
• PHP:
• Apache:
• Nginx:
2. Ensure the application properly sets session cookies with the HttpOnly attribute in all
responses.
5. Conclusion The Cookie without the HttpOnly flag set vulnerability poses a low risk
but can be exploited in conjunction with Cross-Site Scripting (XSS) attacks to steal
session tokens. Enforcing the HttpOnly attribute on session cookies will mitigate
this risk and enhance session security.
Scope:
• User Profile Management
• Authentication & Authorization Mechanisms
• Session Handling
Methodology: This assessment was conducted using manual penetration testing techniques
aligned with:
Severity Informational
Status Confirmed
Tools Used:
Testing Checklist:
4. Vulnerabilities Found
4.1 Cross-domain Script Include • Severity: INFORMATIONAL • CWE ID: CWE-829 (Inclusion
of Functionality from Untrusted Control Sphere) • OWASP Category: A08:2021 - Software
and Data Integrity Failures
Description: The application dynamically includes a script from an external domain within its
response. The following script was identified being loaded from an external source:
• https://www.google.com/recaptcha/api.js
When an application includes a script from another domain, it executes within the security
context of the application. If an attacker compromises the external domain, they can
manipulate the script to perform malicious actions within the application.
Impact:
• If the external domain is compromised, an attacker could inject malicious scripts into the
application.
• Sensitive user actions and data could be exposed to the third-party domain.
• It introduces dependency risks where downtime or changes to the external script can
affect application functionality.
Steps to Reproduce:
• Host required scripts on the application’s own domain instead of relying on third-party
hosting.
• Use Subresource Integrity (SRI) to ensure the script has not been tampered with. Example:
Vulnerability Classifications:
1. General Information
Scope:
Methodology: This assessment was conducted using manual penetration testing techniques
aligned with:
Summary of Findings:
Severity Informational
Status Confirmed
Tools Used:
Testing Checklist:
4. Vulnerabilities Found
• Severity: INFORMATIONAL
Description:
Browsers may store a local cached copy of content received from web servers unless
directed otherwise. Some browsers, including Internet Explorer, cache content accessed via
HTTPS. If sensitive information in application responses is stored in the local cache, it may be
retrieved by other users who have access to the same computer at a future time.
Affected URLs:
• https://thc.cybersapiens.in/admin/
Impact:
• Sensitive data may be retrieved by unauthorized users accessing the same computer.
• Cached responses could expose confidential information, such as user session data,
authentication details, or financial records.
Steps to Reproduce:
5. If caching headers are absent, verify that content is stored locally by examining the
browser's cache storage.
• Ensure the web server returns appropriate caching directives to prevent storing sensitive
content.
• Configure server settings to return the following HTTP headers in all responses containing
sensitive data:
Cache-Control: no-store
Pragma: no-cache
Vulnerability Classifications:
1. General Information
Methodology:
This assessment was conducted using manual penetration testing techniques aligned with:
Summary of Findings:
Severity Informational
Status Confirmed
Tools Used:
Testing Checklist:
• Severity: INFORMATIONAL
• CWE ID: CWE-698 (Execution After Redirect - EAR)
• OWASP Category: A01:2021 - Broken Access Control
Description:
Affected URLs:
• https://thc.cybersapiens.in/login/
Impact:
• Unauthorized users might be able to retrieve sensitive content from redirection responses.
• Exposed data could include confidential user information, authentication details, or
restricted content.
Steps to Reproduce:
• This reveals the server's PHP version, which can be exploited if there are known vulnerabilities in that version.
• While the site key itself is not highly sensitive, an attacker could use it for abuse, such as tricking users into solving CAPTCHAs
for another site. However, the secret key (not visible here) is required for bypassing CAPTCHA verification.
• The presence of an error message indicating incorrect login credentials may help attackers confirm whether an account exists
(username enumeration).
• While not highly sensitive, these headers reveal that the site is using Cloudflare for security and performance, which could help
attackers tailor their approach (e.g., bypassing WAF protections).
Remediation:
• Ensure that redirection responses do not include unnecessary or sensitive content in the
response body.
• Modify request handling logic to verify authorization before returning any sensitive
content.
• Use a proper API method for redirections that does not return body content.
• Perform regular audits to verify that redirections do not expose sensitive information.
Vulnerability Classifications:
Scope:
• Session Handling
Methodology:
This assessment was conducted using manual penetration testing techniques aligned with: •
OWASP Top 10 2023
Summary of Findings:
Severity Informational
Status Confirmed
Tools Used:
• Burp Suite (Manual Interception & Request Modification)
Testing Checklist:
• Authentication & Session Handling
• Authorization & Access Control
• Input Validation & Data Integrity
4. Vulnerabilities Found
4.1 Frameable Response (Potential Clickjacking) • Severity: INFORMATIONAL • CWE ID: CWE-
693 (Protection Mechanism Failure) • OWASP Category: A05:2021 - Security
Misconfiguration
Affected URLs:
• https://thc.cybersapiens.in/login/
• https://thc.cybersapiens.in/login/dashboard.php
• https://thc.cybersapiens.in/login/login.php
Impact:
• An attacker could load the vulnerable pages in an iframe and trick users into clicking
hidden buttons or performing sensitive actions.
• Clickjacking may lead to unintended account changes, CSRF exploitation, or data exposure.
Steps to Reproduce:
1. Open Burp Suite and enable Intercept mode.
2. Navigate to one of the affected URLs.
3. Check the HTTP response headers and verify the absence of X-Frame-Options or
Content-Security-Policy.
4. Create a simple HTML page containing an iframe embedding the vulnerable page.
5. Load the HTML page in a browser and confirm that the application is rendered inside
the iframe.
Proof of Concept (PoC Screenshot/Video):
Remediation:
Open the file in a browser.
If the login page loads inside the <iframe>, it confirms the vulnerability.
Implement the X-Frame-Options HTTP header with the value DENY to block all framing.
• Alternatively, use SAMEORIGIN to allow framing only by pages from the same origin.
Vulnerability Classifications:
Scope:
Methodology:
This assessment was conducted using manual penetration testing techniques aligned with:
• OWASP Top 10 2023
• MITRE ATT&CK Framework
• Burp Suite Interception and Manipulation
Overall Risk Level: INFORMATIONAL
Summary of Findings:
Severity Informational
Status Confirmed
Tools Used:
4. Vulnerabilities Found
Description: The application imports style sheets using path-relative URLs, which can lead to
CSS injection attacks. If the application tolerates superfluous path-like data, attackers can
manipulate CSS imports to execute malicious styles, read sensitive data, or hijack session-
related information.
Affected URLs:
• https://thc.cybersapiens.in/login/
• https://thc.cybersapiens.in/login/dashboard.php
• https://thc.cybersapiens.in/login/login.php
Impact:
• An attacker can manipulate CSS imports to inject arbitrary styles, affecting page rendering.
• Potential risk of CSS-based data exfiltration via crafted selectors.
• Sensitive data in the URL (e.g., session tokens, CSRF tokens) might be leaked to an
attacker’s domain.
Steps to Reproduce:
Vulnerability Classifications:
• CWE-16: Configuration