Web Application Penetration Testing Report of SGRH VAPT Demo Report2
Web Application Penetration Testing Report of SGRH VAPT Demo Report2
Penetration
Testing Report Of
SGRH VAPT Demo
Report For
Security Knock
Pvt. Ltd.
Project Summary
EXECUTIVE SUMMARY
AnoF Demo conducted a comprehensive security assessment of Security Knock Pvt. Ltd. in order to
determine existing vulnerabilities and establish the current level of security risk associated with the
environment and the technologies in use. This assessment harnessed penetration testing and social
engineering techniques to provide Security Knock Pvt. Ltd. management with an understanding of
the risks and security posture of their corporate environment.
Project Details
This engagement has been conducted to assess the security posture of the high-value targets
mentioned by our client Security Knock Pvt. Ltd.. We have gone through the SGRH VAPT Demo
Report Web Application Penetration Testing as per OWASP Top 10 standards.
Scope
Description
SGRH VAPT Demo Report
3
Project Involvement
4
Vulnerability Details
Vulnerabilities Classification
Sr Vulnerability Name Severity Status
5
Html Injection and XSS
Vulnerable Critical
Description
Proof Of Concept
Solution
Every input should be checked if it contains any script code or any HTML code. Usually it is
being checked, if the code contains any special script or HTML brackets
Reference Link
Vulnerable Instances
URL Paramter
https://sgrh.com/searchresult?q=
6
SQL Injection
Vulnerable Critical
Description
SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the
queries that an application makes to its database. It generally allows an attacker to view data
that they are not normally able to retrieve. This might include data belonging to other users, or
any other data that the application itself is able to access. In many cases, an attacker can
modify or delete this data, causing persistent changes to the application
Proof Of Concept
Solution
The only sure way to prevent SQL Injection attacks is input validation and parametrized queries
including prepared statements. The application code should never use the input directly. The
developer must sanitize all input, not only web form inputs such as login forms. They must
remove potential malicious code elements such as single quotes. It is also a good idea to turn
off the visibility of database errors on your production sites. Database errors can be used with
SQL Injection to gain information about your database.
Reference Link
OWASP
PortSwigger
Vulnerable Instances
URL Paramter
https://labresults.sgrh.com/Login.aspx
7
SQL Injection
Vulnerable Critical
Description
SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the
queries that an application makes to its database. It generally allows an attacker to view data
that they are not normally able to retrieve. This might include data belonging to other users, or
any other data that the application itself is able to access. In many cases, an attacker can
modify or delete this data, causing persistent changes to the application
Proof Of Concept
Solution
The only sure way to prevent SQL Injection attacks is input validation and parametrized queries
including prepared statements. The application code should never use the input directly. The
developer must sanitize all input, not only web form inputs such as login forms. They must
remove potential malicious code elements such as single quotes. It is also a good idea to turn
off the visibility of database errors on your production sites. Database errors can be used with
SQL Injection to gain information about your database.
Reference Link
Vulnerable Instances
URL Paramter
https://reachout.sgrh.com/?event_name_id=
8
Cpanel and Webmail Exposed
Vulnerable High
Description
An attacker could exploit this finding to perform BruteForce attacks against users. He can also
use it to create similar phishing pages, confusing users and more.
Proof Of Concept
Solution
Define and restrict access which IP addresses are allowed to access the administrator
Reference Link
Vulnerable Instances
URL Paramter
https://cpanel.sgrh.com/ | https://sgrh.com:2083/
https://sgrh.com:2096/src/configtest.php
9
(xss) Dom Based
Vulnerable High
Description
Proof Of Concept
Solution
Reference Link
Vulnerable Instances
URL Paramter
https://reachout.sgrh.com/
10
Service Version Disclousre
Vulnerable Medium
Description
Proof Of Concept
Solution
Hide info.php
Reference Link
Vulnerable Instances
URL Paramter
https://reachout.sgrh.com/info.php
11