Web Pentesting Sample Report
Web Pentesting Sample Report
1. Introduction
This report document hereby describes the proceedings and results of a Black Box security
assessment conducted against Home of Acunetix Art Web Application. The report hereby
lists the findings and corresponding best practice mitigation actions and recommendations.
2. Objective
The objective of the assessment was to assess the state of security and uncover
vulnerabilities in Home of Acunetix Art Web Application and provide with a final security
assessment report comprising vulnerabilities, remediation strategy and recommendation
guidelines to help mitigate the identified vulnerabilities and risks during the activity.
3. Scope
This section defines the scope and boundaries of the project.
Parameter Value
Starting Vector External
Target Criticality Critical
Assessment Nature Cautious & Calculated
Assessment Conspicuity Clear
Proof of Concept(s) Attached wherever possible and applicable.
3.2. Risk Calculation and Classification
Summary
Outlined is a Black Box Application Security assessment for Home of Acunetix Art Web
Application.
http://testphp.vulnweb.com
http://testphp.vulnweb.com/*
Total: 6 Vulnerabilities
3 1 2
1. SQL Injection by injecting queries in the URL GET parameter
Reference No: Risk Rating:
WEB_VUL_01 High
Tools Used:
Browser, SQL Map
Vulnerability Description:
It was observed that the application had the list of artists contributed and just by implementing SQL
queries into the GET Requests in the URL, severe information of the users could be fetched.
Vulnerability Identified by / How It Was Discovered
Manual Analysis & Automated Analysis
Vulnerable URLs / IP Address
http://testphp.vulnweb.com/artists.php?artist=1
Implications / Consequences of not Fixing the Issue
An adversary having knowledge about SQL could easily get into the database and can fetch juicy details
of all the users present inside the database by injecting SQL queries in the URL GET parameter. The
details includes cc, email, name, phone, address etc.
Suggested Countermeasures
It is recommended to implement below control for mitigating the SQLi:
• Use Stored Procedure, Not Dynamic SQL
• Use Object Relational Mapping (ORM) Framework
• Least Privilege
• Input Validation
• Character Escaping
• Use WAF (Web Application Firewall)
References
https://owasp.org/www-community/attacks/SQL_Injection
https://logz.io/blog/defend-against-sql-injections/
Proof of concept:
Manual Analysis:
Fig 1: Go to http://testphp.vulnweb.com/artists.php?artist=1 and in the URL and add ‘
Fig6: Then modify the URL with artist=-1 union select count(*),3 from
information_schema.tables where table_schema=”acuart”
Fig7: The modify the URL to union select 1,group_concat(table_name),3 from
information_schema.tables where table_schema=”acuart” LIMIT 0,9
Fig8: Then modify the URL with union select 1,group_concat(column_name),3 from
information_schema.columns where table_schema=”acuart” and table_name=”users”
Fig9: Then modify the URL into union select 1,group_concat(“NAME = “,name,”
”,”PASSWORD = “,pass,” ”,”EMAIL = ,email,” ”,”PHONE = ”,phone),3 from users
Automated Analysis:
Proof of concept:
URL #1:
URL #2:
Fig 3: And here we can see that our JavaScript code has been executed
3. Stored XSS in the Your Profile section.
Reference No: Risk Rating:
WEB_VUL_03 High
Tools Used:
Browser
Vulnerability Description:
It was observed that in the your profile area instead of normal input if we execute JS code,
then it gets stored in the server and hence it results into Stored XSS
Vulnerability Identified by / How It Was Discovered
Manual Analysis
Vulnerable URLs / IP Address
http://testphp.vulnweb.com/userinfo.php
Implications / Consequences of not Fixing the Issue
An adversary having knowledge of JavaScript will be able to steal the user’s credentials, hijack user’s
account, exfiltrate sensitive data, can access the client’s computer and even can redirect into other
pages created by the adversary. And the impact will be faced by all users visiting the compromised
page.
Suggested Countermeasures
It is recommended to:
• Filter input on arrival
• Encode data on output
• Use appropriate response headers
• Use Content Security Policy (CSP) to reduce the severity of any existing XSS
vulnerabilities
References
https://portswigger.net/web-security/cross-site-scripting
https://blog.sqreen.com/stored-xss-explained/
Proof of concept:
Fig 2: Type the Javascript code to all the field as any of them could be vulnerable to stored XSS and
then click on the Update button
Fig 3: Hence the code gets executed and it’s permanently stored in the server. Also it is found that
the name field is vulnerable to stored XSS.
• Align password length, complexity and rotation policies with NIST 800-63 B’s guidelines
in section 5.1.1 for Memorized Secrets or other modern, evidence based password
policies.
References
https://owasp.org/www-project-top-ten/2017/A2_2017-Broken_Authentication
Proof Of Concept:
Proof Of Concept:
Fig 1: Open the target URL
Fig 4: And here we’ve been redirected to the source of our redirected page link.
6. Clickjacking in Our Guestbook Page.
Reference No: Risk Rating:
WEB_VUL_06 Low
Tools Used:
Browser
Vulnerability Description:
It was observed that in the Our Guestbook section we can create iframes using HTML which
can lead to phishing attacks
Vulnerability Identified by / How It Was Discovered
Manual Analysis
Vulnerable URLs / IP Address
http://testphp.vulnweb.com/guestbook.php
Implications / Consequences of not Fixing the Issue
An adversary having knowledge of HTML can easily perform Clickjacking. Users visiting the page will
see the iframe attached and in certain scenario it might look like a legitimate form asking for username
and password. It can lead to credential stealing.
Suggested Countermeasures
It is recommended to:
• Filter input on Client-side defenses
• Use X-Frame-Options header
• Use cookies sameSite origin
• Use Content Security Policy (CSP)
References
https://auth0.com/blog/preventing-clickjacking-attacks/
Proof of Concept:
Fig 1: Open the target URL
---------------------------------------EOF---------------------------------------