Website Scanner-Https WWW - Araruama.rj - Gov.br-20250124-0351
Website Scanner-Https WWW - Araruama.rj - Gov.br-20250124-0351
 https://www.araruama.rj.gov.br/
     The Light Website Scanner didn't check for critical issues like SQLi, XSS, Command Injection, XXE, etc. Upgrade to run Deep scans with
     40+ tests and detect more vulnerabilities.
Summary
Findings
      Risk
              CVSS     CVE                Summary                                                                                    Affected software
      Level
                                          NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source
                                          Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions
                                          R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module
                                          that might allow a local attacker to corrupt NGINX worker memory, resulting in
             7.8      CVE-2022-41741     its termination or potential other impact using a specially crafted audio or               nginx 1.14.0
                                          video file. The issue affects only NGINX products that are built with the
                                          ngx_http_mp4_module, when the mp4 directive is used in the configuration
                                          file. Further, the attack is possible only if an attacker can trigger processing of
                                          a specially crafted audio or video file with the module ngx_http_mp4_module.
                                                                          1 / 11
                                      Bootstrap Cross-Site Scripting (XSS) vulnerability for data-* attributes. More
                                      details at:
                                      https://github.com/advisories/GHSA-vxmc-5x29-h64v
           6.4     CVE-2024-6485     https://nvd.nist.gov/vuln/detail/CVE-2024-6485                                          Bootstrap 3.3.0
                                      https://github.com/twbs/bootstrap
                                      https://www.herodevs.com/vulnerability-directory/cve-2024-6485
 4.3 CVE-2018-14040 In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. bootstrap 3.3.0
                                      jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products,
                                      mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If
           4.3     CVE-2019-11358                                                                                            jquery 1.10.2
                                      an unsanitized source object contained an enumerable __proto__ property, it
                                      could extend the native Object.prototype.
                                      In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing
                                      HTML containing <option> elements from untrusted sources - even after
           4.3     CVE-2020-11023    sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(),              jquery 1.10.2
                                      .append(), and others) may execute untrusted code. This problem is patched
                                      in jQuery 3.5.0.
                                      In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML
                                      from untrusted sources - even after sanitizing it - to one of jQuery's DOM
           4.3     CVE-2020-11022                                                                                            jquery 1.10.2
                                      manipulation methods (i.e. .html(), .append(), and others) may execute
                                      untrusted code. This problem is patched in jQuery 3.5.0.
                                      jQuery 1.x and 2.x are End-of-Life and no longer receiving security updates.
           N/A     N/A               More details at:                                                                        Jquery 1.10.2
                                      https://github.com/jquery/jquery.com/issues/162
 Details
  Risk description:
  The risk is that an attacker could search for an appropriate exploit (or create one himself) for any of these vulnerabilities and use it to
  attack the system.
  Recommendation:
  In order to eliminate the risk of these vulnerabilities, we recommend you check the installed software version and upgrade to the latest
  version.
Classification:
                                                                          2 / 11
     CWE : CWE-1026
     OWASP Top 10 - 2017 : A9 - Using Components with Known Vulnerabilities
     OWASP Top 10 - 2021 : A6 - Vulnerable and Outdated Components
                                                Cookie
    URL                                                       Evidence
                                                Name
                                                              The server responded with Set-Cookie header(s) that does not specify the HttpOnly
                                                              flag:
    https://www.araruama.rj.gov.br/esiclivre/   PHPSESSID     Set-Cookie: PHPSESSID=6bdeea012c3ed9eec55c4259ccba9887
Request / Response
 Details
     Risk description:
     The risk is that an attacker who injects malicious JavaScript code on the page (e.g. by using an XSS attack) can access the cookie and can
     send it to another site. In case of a session cookie, this could lead to session hijacking.
     Recommendation:
     Ensure that the HttpOnly flag is set for all cookies.
     References:
     https://owasp.org/www-community/HttpOnly
     Classification:
     CWE : CWE-1004
     OWASP Top 10 - 2017 : A6 - Security Misconfiguration
     OWASP Top 10 - 2021 : A5 - Security Misconfiguration
                                                                       Set-Cookie: PHPSESSID=6bdeea012c3ed9eec55c4259ccba9887
    https://www.araruama.rj.gov.br/esiclivre/        PHPSESSID
                                                                       Request / Response
 Details
     Risk description:
     The risk exists that an attacker will intercept the clear-text communication between the browser and the server and he will steal the cookie
     of the user. If this is a session cookie, the attacker could gain unauthorized access to the victim's web session.
     Recommendation:
     Whenever a cookie contains sensitive information or is a session token, then it should always be passed using an encrypted channel.
     Ensure that the secure flag is set for cookies containing such sensitive information.
     References:
     https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/06-
     Session_Management_Testing/02-Testing_for_Cookies_Attributes.html
     Classification:
     CWE : CWE-614
     OWASP Top 10 - 2017 : A6 - Security Misconfiguration
     OWASP Top 10 - 2021 : A5 - Security Misconfiguration
URL Evidence
 Details
                                                                         3 / 11
     Risk description:
     The risk is that lack of this header permits an attacker to force a victim user to initiate a clear-text HTTP connection to the server, thus
     opening the possibility to eavesdrop on the network traffic and extract sensitive information (e.g. session cookies).
     Recommendation:
     The Strict-Transport-Security HTTP header should be sent with each HTTPS response. The syntax is as follows:
     The parameter max-age gives the time frame for requirement of HTTPS in seconds and should be chosen quite high, e.g. several months.
     A value below 7776000 is considered as too low by this scanner check.
     The flag includeSubDomains defines that the policy applies also for sub domains of the sender of the response.
     Classification:
     CWE : CWE-693
     OWASP Top 10 - 2017 : A6 - Security Misconfiguration
     OWASP Top 10 - 2021 : A5 - Security Misconfiguration
URL Evidence
                                          Response does not include the HTTP Content-Security-Policy security header or meta tag
    https://www.araruama.rj.gov.br/
                                          Request / Response
 Details
     Risk description:
     The risk is that if the target application is vulnerable to XSS, lack of this header makes it easily exploitable by attackers.
     Recommendation:
     Configure the Content-Security-Header to be sent with each HTTP response in order to apply the specific policies needed by the
     application.
     References:
     https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html
     https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
     Classification:
     CWE : CWE-693
     OWASP Top 10 - 2017 : A6 - Security Misconfiguration
     OWASP Top 10 - 2021 : A5 - Security Misconfiguration
URL Evidence
                                      Response headers do not include the Referrer-Policy HTTP security header as well as the <meta> tag with
    https://www.araruama.rj.gov.br/   name 'referrer' is not present in the response.
                                      Request / Response
 Details
     Risk description:
     The risk is that if a user visits a web page (e.g. "http://example.com/pricing/") and clicks on a link from that page going to e.g.
     "https://www.google.com", the browser will send to Google the full originating URL in the Referer header, assuming the Referrer-Policy
     header is not set. The originating URL could be considered sensitive information and it could be used for user tracking.
     Recommendation:
     The Referrer-Policy header should be configured on the server side to avoid user tracking and inadvertent information leakage. The value
      no-referrer of this header instructs the browser to omit the Referer header entirely.
     References:
     https://developer.mozilla.org/en-US/docs/Web/Security/Referer_header:_privacy_and_security_concerns
     Classification:
     CWE : CWE-693
     OWASP Top 10 - 2017 : A6 - Security Misconfiguration
     OWASP Top 10 - 2021 : A5 - Security Misconfiguration
                                                                        4 / 11
 Missing security header: X-Content-Type-Options                                                                                     CONFIRMED
URL Evidence
 Details
     Risk description:
     The risk is that lack of this header could make possible attacks such as Cross-Site Scripting or phishing in Internet Explorer browsers.
     Recommendation:
     We recommend setting the X-Content-Type-Options header such as X-Content-Type-Options: nosniff .
     References:
     https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options
     Classification:
     CWE : CWE-693
     OWASP Top 10 - 2017 : A6 - Security Misconfiguration
     OWASP Top 10 - 2021 : A5 - Security Misconfiguration
Request / Response
 Details
     Risk description:
     The risk is that the insecurely loaded resources (HTTP) on an otherwise secure page (HTTPS) can be intercepted or manipulated by
     attackers, potentially leading to eavesdropping or content tampering.
     Recommendation:
     Ensure that all external resources the page references are loaded using HTTPS.
     Classification:
     CWE : CWE-311
     OWASP Top 10 - 2017 : A6 - Security Misconfiguration
     OWASP Top 10 - 2021 : A5 - Security Misconfiguration
                                                                        5 / 11
         jQuery 1.10.2                                         JavaScript libraries
waf Caching
 Details
     Risk description:
     The risk is that an attacker could use this information to mount specific attacks against the identified software type and version.
     Recommendation:
     We recommend you to eliminate the information which permits the identification of software platform, technology, server and operating
     system: HTTP server headers, HTML meta information, etc.
     References:
     https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/01-Information_Gathering/02-
     Fingerprint_Web_Server.html
     Classification:
     OWASP Top 10 - 2017 : A6 - Security Misconfiguration
     OWASP Top 10 - 2021 : A5 - Security Misconfiguration
Screenshot:
 Details
     Risk description:
     The risk is that this information could be used by an attacker to mount specific attacks against the server and the application.
     Recommendation:
     We recommend you to remove these files if they are not needed for business purposes.
     Classification:
     CWE : CWE-200
     OWASP Top 10 - 2017 : A6 - Security Misconfiguration
     OWASP Top 10 - 2021 : A5 - Security Misconfiguration
                                                                      6 / 11
    URL
Missing: https://www.araruama.rj.gov.br/.well-known/security.txt
 Details
     Risk description:
     There is no particular risk in not having a security.txt file for your server. However, this file is important because it offers a designated
     channel for reporting vulnerabilities and security issues.
     Recommendation:
     We recommend you to implement the security.txt file according to the standard, in order to allow researchers or users report any security
     issues they find, improving the defensive mechanisms of your server.
     References:
     https://securitytxt.org/
     Classification:
     OWASP Top 10 - 2017 : A6 - Security Misconfiguration
     OWASP Top 10 - 2021 : A5 - Security Misconfiguration
URL Evidence
Request / Response
 Details
     Risk description:
     The risk is that an attacker could use this interface to mount brute force attacks against known passwords and usernames combinations
     leaked throughout the web.
     Recommendation:
     Ensure each interface is not bypassable using common knowledge of the application or leaked credentials using occasional password
     audits.
     References:
     https://pentest-tools.com/network-vulnerability-scanning/password-auditor
     http://capec.mitre.org/data/definitions/16.html
Screenshot:
                                                                         7 / 11
 Spider results
                                                                                                                          Page     Status
    URL                                                       Method   Parameters             Page Title
                                                                                                                          Size     Code
                                                                       Query:                                             7.35
    https://www.araruama.rj.gov.br/esiclivre/                 GET                             Lei de Acesso                        200
                                                                       ref=subM                                           KB
                                                                                                                          7.35
    https://www.araruama.rj.gov.br/esiclivre/                 GET                             Lei de Acesso                        200
                                                                                                                          KB
                                                                       Query:
    https://www.araruama.rj.gov.br/monitoramento/             GET                             Página Não Encontrada       488 B    404
                                                                       ref=subM
                                                                       Query:
                                                                                              Prefeitura Municipal de
    https://www.araruama.rj.gov.br/novo/                      GET      pg=consulta_processo                               23 KB    200
                                                                                              Araruama
                                                                       ref=subM
                                                                        8 / 11
    https://www.araruama.rj.gov.br/transparencia/              GET                                                            86 B      200
                                                                     Query:
    https://www.araruama.rj.gov.br/vacina/                     GET                             Página Não Encontrada          488 B     404
                                                                     ref=subM
 Details
     Risk description:
     The table contains all the unique pages the scanner found. The duplicated URLs are not available here as scanning those is considered
     unnecessary
     Recommendation:
     We recommend to advanced users to make sure the scan properly detected most of the URLs in the application.
     References:
     All the URLs the scanner found, including duplicates (available for 90 days after the scan date)
 Website is accessible.
                                                                      9 / 11
 Nothing was found for error messages.
 Nothing was found for domain too loose set for cookies.
 Nothing was found for unsafe HTTP header Content Security Policy.
                                                                 10 / 11
    Checking for HttpOnly flag of cookie...
    Checking for Secure flag of cookie...
    Checking for mixed content between HTTP and HTTPS...
    Checking for enabled HTTP OPTIONS method...
    Checking for secure communication...
    Checking for directory listing...
    Checking for error messages...
    Checking for debug messages...
    Checking for code comments...
    Checking for Insecure Direct Object Reference...
    Checking for domain too loose set for cookies...
    Checking for internal error code...
    Checking for Server Side Request Forgery...
    Checking for Open Redirect...
    Checking for Exposed Backup Files...
    Checking for unsafe HTTP header Content Security Policy...
    Checking for OpenAPI files...
    Checking for file upload...
Scan parameters
target:           https://www.araruama.rj.gov.br/
scan_type:        Light
authentication:   False
Scan stats
Unique Injection Points Detected:           905
URLs spidered:                              49
Total number of HTTP requests:              15401
Average time until a response was
                                            11ms
received:
Total number of HTTP request errors:        412
11 / 11