Website Vulnscan Sample Report
Website Vulnscan Sample Report
http://testing1.pentest-tools.com/dvwa/
Summary
Ov erall risk lev el: Risk rat ings: Scan informat ion:
H igh High: 5 Start time: 2019-05-24 09:07:56
Medium: 3 Finish time: 2019-05-24 09:11:22
Low: 3 Scan duration: 3 min, 26 sec
Findings
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read
http_server
7.5 CVE-2017-7679 one byte past the end of a buffer when sending a malicious Content-Type N/A
2.4.25
response header.
The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24
introduced a bug in token list parsing, which allows ap_find_token() to search past
http_server
7.5 CVE-2017-7668 the end of its input string. By maliciously crafting a sequence of request headers, N/A
2.4.25
an attacker may be able to cause a segmentation fault, or to force ap_find_token()
to return an incorrect value.
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may
http_server
7.5 CVE-2017-3169 dereference a NULL pointer when third-party modules call N/A
2.4.25
ap_hook_process_connection() during an HTTP request to an HTTPS port.
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the
http_server
7.5 CVE-2017-3167 ap_get_basic_auth_pw() by third-party modules outside of the authentication N/A
2.4.25
phase may lead to authentication requirements being bypassed.
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or
prefork, code executing in less-privileged child processes or threads (including
http_server
7.2 CVE-2019-0211 scripts executed by an in-process scripting interpreter) could execute arbitrary N/A
2.4.25
code with the privileges of the parent process (usually root) by manipulating the
scoreboard. Non-Unix systems are not affected.
Details
Ris k de s c ription:
These vulnerabilities expose the affected applications to the risk of unauthorized access to confidential data and possibly to denial of service
attacks. An attacker could search for an appropriate exploit (or create one himself) for any of these vulnerabilities and use it to attack the
system.
Cross-Site Scripting
Vulne ra ble Vulne ra ble
M e thod A tta c k Ve c tor
Pa g e Pa ra me te r
/dvwa/login.ph http://testing1.pentest-tools.com/dvwa/login.php
p
username POST
POS T D a ta : username=</div><script>alert(1);</script><div>
1/8
/dvwa/vulnera http://testing1.pentest-tools.com/dvwa/vulnerabilities/brute/?Login=Login&password=ZA
bilities/brute/ username GET P&username=%27%22%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E
/dvwa/vulnera http://testing1.pentest-tools.com/dvwa/vulnerabilities/sqli/?Submit=Submit&id=%27%22
bilities/sqli/
id GET
%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E
/dvwa/vulnera http://testing1.pentest-tools.com/dvwa/vulnerabilities/xss_r/?name=%3C%2Fpre%3E%3C
bilities/xss_r/
name GET
script%3Ealert%281%29%3B%3C%2Fscript%3E%3Cpre%3E
/dvwa/vulnera http://testing1.pentest-tools.com/dvwa/vulnerabilities/xss_s/
bilities/xss_s/
txtName POST
POS T D a ta : txtName=</div><script>alert(1);</script><div>
/dvwa/vulnera http://testing1.pentest-tools.com/dvwa/vulnerabilities/xss_s/
bilities/xss_s/
mtxMessage POST
POS T D a ta : mtxMessage=</div><script>alert(1);</script><div>
Details
Ris k de s c ription:
The risk exists that a malicious actor injects JavaScript code and runs it in the context of a user's session in the application. This could potentially
lead to various effects such as stealing session cookies, calling application features on behalf of another user, exploiting browser vulnerabilities.
Successful exploitation of Cross-Site Scripting attacks requires human interaction (ex. determine the user access a special link by social
engineering).
References:
https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet
SQL Injection
Vulne ra ble
Vulne ra ble Pa g e M e thod A tta c k Ve c tor
Pa ra me te r
/dvwa/vulnerabilitie http://testing1.pentest-tools.com/dvwa/vulnerabilities/brute/?Login=Login&passw
s/brute/
username GET
ord=ZAP&username=ZAP
/dvwa/vulnerabilitie http://testing1.pentest-tools.com/dvwa/vulnerabilities/sqli/?Submit=Submit&id=Z
s/sqli/
id GET
AP%27+AND+%271%27%3D%271%27+--+
/dvwa/vulnerabilitie http://testing1.pentest-tools.com/dvwa/vulnerabilities/sqli_blind/?Submit=Submit
s/sqli_blind/
id GET
&id=ZAP%27+AND+%271%27%3D%271%27+--+
/dvwa/vulnerabilitie http://testing1.pentest-tools.com/dvwa/vulnerabilities/xss_s/
s/xss_s/
btnSign POST
POS T D a ta : btnSign=Sign Guestbook" AND "1"="1" --
Details
Ris k de s c ription:
The risk exists that an attacker gains unauthorized access to the information from the database of the application. He could extract information
such as: application usernames, passwords, client information and other application specific data.
More information about SQL injection and the way to protect against this attack can be found here:
https://www.owasp.org/index.php/SQL_Injection
https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.md
File Inclusion
2/8
Vulne ra ble Vulne ra ble
M e thod A tta c k Ve c tor
Pa g e Pa ra me te r
/dvwa/vulnerabiliti http://testing1.pentest-tools.com/dvwa/vulnerabilities/fi/?page=%2Fetc%2Fpas
es/fi/
page GET
swd
/dvwa/vulnerabiliti http://testing1.pentest-tools.com/dvwa/vulnerabilities/fi/?page=http%3A%2F%2
es/fi/
page GET
Fwww.google.com%2F
Details
Ris k de s c ription:
The risk exists that an attacker can manipulate the affected parameter in order to load or execute any locally or remote stored file.
This could lead to reading arbitrary files, code execution, Cross-Site Scripting, denial of service, sensitive information disclosure.
References:
https://www.owasp.org/index.php/Testing_for_Local_File_Inclusion
https://www.owasp.org/index.php/Testing_for_Remote_File_Inclusion
OS Command Injection
Vulne ra ble Pa g e Vulne ra ble Pa ra me te r M e thod A tta c k Ve c tor
http://testing1.pentest-tools.com/dvwa/vulnerabilities/exec/
/dvwa/vulnerabilities/exec/ ip POST
POS T D a ta : ip=ZAP&cat /etc/passwd&
Details
Ris k de s c ription:
The risk exists that an attacker uses the application to run OS commands with the privileges of the vulnerable application.
This could lead (but not limited) to Remote Code Execution, Denial of Service, Sensitive Information Disclosure, Sensitive Information Deletion.
References:
https://www.owasp.org/index.php/Command_Injection
https://www.owasp.org/index.php/OS_Command_Injection_Defense_Cheat_Sheet
Details
Ris k de s c ription:
The communication between the web browser and the server is done using the HTTP protocol, which transmits data unencrypted over the
network. Thus, an attacker who manages to intercept the communication at the network level, is able to read and modify the data transmitted
(including passwords, secret tokens, credit card information and other sensitive data).
3/8
/dvwa/login.php Admin login page/section found.
Details
Ris k de s c ription:
These files/folders usually contain sensitive information which may help attackers to mount further attacks against the server. Manual
validation is required.
/dvwa/?=PHPB8B5F2A0-3C92-11d3-A3A9- PHP reveals potentially sensitive information via certain HTTP requests that contain specific
4C7B08C10000 QUERY strings.
PHP is installed, and a test script which runs phpinfo() was found. This gives a lot of system
/dvwa/phpinfo.php
information.
Details
Ris k de s c ription:
An attacker could use these files to find information about the backend application, server software and their specific versions. This information
could be further used to mount targeted attacks against the server.
Details
Ris k de s c ription:
An attacker could use this information to mount specific attacks against the identified software type and version.
4/8
X-XSS-Protection Mitigates Cross-Site Scripting (XSS) attacks Not set
Details
Ris k de s c ription:
Because the X-Frame-Options header is not sent by the server, an attacker could embed this website into an iframe of a third party website. By
manipulating the display attributes of the iframe, the attacker could trick the user into performing mouse clicks in the application, thus
performing activities without user's consent (ex: delete user, subscribe to newsletter, etc). This is called a Clickjacking attack and it is described
in detail here:
https://www.owasp.org/index.php/Clickjacking
The X-XSS-Protection HTTP header instructs the browser to stop loading web pages when they detect reflected Cross-Site Scripting (XSS)
attacks. Lack of this header exposes application users to XSS attacks in case the web application contains such vulnerability.
The HTTP X-Content-Type-Options header is addressed to Internet Explorer browser and prevents it from reinterpreting the content of a web
page (MIME-sniffing) and thus overriding the value of the Content-Type header). Lack of this header could lead to attacks such as Cross-Site
Scripting or phishing.
Details
Ris k de s c ription:
A cookie has been set without the HttpOnly flag, which means that the cookie can be accessed by JavaScript. If a malicious script can be run on
this page then the cookie will be accessible and can be transmitted to another site. If this is a session cookie then session hijacking may be
possible.
5/8
No sensitive files found
user_token=9e16aa41c679e13f4cf884b3e2d9ebde&create_db=Crea
2 POST /dvwa/setup.php
te+%2F+Reset+Database
username=ZAP&password=ZAP&user_token=b8a349cc3852ee55dd
3 POST /dvwa/login.php
bafd475d91a33d&Login=Login
/dvwa/security.php?test=%2522%3E%3Cscript%3Eeval(win security=low&user_token=40c6007dec8ddf0d86245184ac296544&s
8 POST
dow.name)%3C/script%3E eclev_submit=Submit
security=low&user_token=080654f0ab97c8c1beab2864c6c8af90&se
27 POST /dvwa/security.php
clev_submit=Submit
6/8
7/8
Scan coverage information
Scan parameters
Website URL: http://testing1.pentest-tools.com/dvwa/
Scan type: Full_new
Authentication: False
8/8