Penetration Testing Report: Date
Penetration Testing Report: Date
Date: [Date]
Version: 0.1
By For
Table of Contents
2 Technical Details.................................................................................................................. 6
2.1 SQL Injection ……………………………………….......................................................................... 6 2.2 Cross-
site Request Forgery ………………………………………….............................................. 7 2.3 Information
Disclosure ........................................................................................................................ 8
This document contains sensitive and confidential information, it should not be shared with any other 3rd
GDPR
Disclaimers
…..etc
Change Log
Date Version Comments
This report details the scope of the engagement, detailed information about all of the findings and some
recommendations. The summary below is intended for non-technical audiences to give an idea of the overall
results of the engagement and the key findings. The second section of this report is intended for a technical
audience as it lists all of our findings in detail, along with reproduction steps, analysis and recommendations.
Based on the security assessment we carried for [platform] and based on our findings, the current risk rating is
high . The vulnerabilities discovered can be used by malicious actors to cause breaches and even gain
unauthorised access to some management pages. The methodology followed is detailed in the following
diagram:
The following charts summarize the findings grouped by severity of the threat:
Page 4 Confidential www.zSecurity.com
1 Engagement Summary
1.1 Scope
As requested the security assessment was only carried out on the following targets:
IP
Domain.com
Subdomain.domain.com
Subdomain2.domain.com
…...etc
The table below gives a key to the risk naming and colours used throughout this report to provide a clear and
concise risk scoring system.
Medium 4.0 - 6.9 Fix immediately if there are 0 medium risk vulnerabilities.
ID Risk Description
3 Low PHP version disclosure - Can help develop attacks for this specific version.
We discovered that using specially crafted requests a malicious actor can communicate with the database and
query it to retrieve stored data including data stored in the users tables.
URL https://domain.com/news/post.php
Parameter id
References https://owasp.org/www-community/attacks/SQL_Injection
Impact:
As a result of this vulnerability, a malicious actor can:
1. Query the database and get the database engine, its version and the database user.
2. Retrieve user data.
3. Retrieve hashed passwords from the users table.
Mitigation:
Refernces - https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html.
Description
URL
Parameter
References
Request
Response
Impact:
Mitigation:
Description
URL
Parameter
References
Request
Response
Impact:
Mitigation:
CRITICAL