Website Vulnerability Scanner Report (Light)
Website Vulnerability Scanner Report (Light)
Website fingerprinting
SQL injection
Cross-Site Scripting
https://atomwaffendivision.org/
Summary
Ov erall risk lev el: Risk rat ings: Scan informat ion:
H igh High: 1 Start time: 2021-04-12 21:36:28 UTC+03
Medium: 2 Finish time: 2021-04-12 21:36:48 UTC+03
Low: 8 Scan duration: 20 sec
Findings
In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP
object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. WordPress
7.5 CVE-2018-20148 N/A
This is caused by mishandling of serialized data at phar:// URLs in the 4.9.3
wp_get_attachment_thumb_file function in wp-includes/post.php.
WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability
WordPress
7.5 CVE-2019-17669 because URL validation does not consider the interpretation of a name as a N/A
4.9.3
series of hex characters.
WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability
WordPress
7.5 CVE-2019-17670 because Windows paths are mishandled during certain validation of relative N/A
4.9.3
URLs.
1/6
wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1
WordPress
7.5 CVE-2019-20041 mishandles the HTML5 colon named entity, allowing attackers to bypass input N/A
4.9.3
sanitization, as demonstrated by the javascript: substring.
Details
Ris k de s c ription:
These vulnerabilities expose the affected applications to the risk of unauthorized access to confidential data and possibly to denial of service
attacks. An attacker could search for an appropriate exploit (or create one himself) for any of these vulnerabilities and use it to attack the
system.
C ookie
U RL E vide nc e
Na me
Set-Cookie:
__cfduid https://atomwaffendivision.org/ __cfduid=d26710b3e4ded0913285b330683d42f781618252588; expires=Wed, 12-May-21 18:36:28
GMT; path=/; domain=.atomwaffendivision.org; HttpOnly; SameSite=Lax
Details
Ris k de s c ription:
Since the Secure flag is not set on the cookie, the browser will send it over an unencrypted channel (plain HTTP) if such a request is made.
Thus, the risk exists that an attacker will intercept the clear-text communication between the browser and the server and he will steal the cookie
of the user. If this is a session cookie, the attacker could gain unauthorized access to the victim's web session.
Set-Cookie:
__cfduid https://atomwaffendivision.org/
.atomwaffendivision.org
Details
Ris k de s c ription:
A cookie may be used in multiple subdomains belonging to the same domain. For instance, a cookie set for example.com, may be sent along
with the requests sent to dev.example.com, calendar.example.com, hostedsite.example.com. Potentially risky websites under your main domain
may access those cookies and use the victim session on the main site.
Details
Ris k de s c ription:
The HTTP Strict-Transport-Security header instructs the browser to initiate only secure (HTTPS) connections to the web server and deny any
unencrypted HTTP connection attempts. Lack of this header permits an attacker to force a victim user to initiate a clear-text HTTP connection to
2/6
the server, thus opening the possibility to eavesdrop on the network traffic and extract sensitive information (e.g. session cookies).
The parameter max-age gives the time frame for requirement of HTTPS in seconds and should be chosen quite high, e.g. several months. A
value below 7776000 is considered as too low by this scanner check.
The flag includeSubDomains defines that the policy applies also for sub domains of the sender of the response.
https://atomwaffendivision.org/ Response headers do not include the HTTP Content-Security-Policy security header
Details
Ris k de s c ription:
The Content-Security-Policy (CSP) header activates a protection mechanism implemented in web browsers which prevents exploitation of
Cross-Site Scripting vulnerabilities (XSS). If the target application is vulnerable to XSS, lack of this header makes it easily exploitable by
attackers.
https://atomwaffendivision.org/ Response headers do not include the HTTP X-Frame-Options security header
Details
Ris k de s c ription:
Because the X-Frame-Options header is not sent by the server, an attacker could embed this website into an iframe of a third party website. By
manipulating the display attributes of the iframe, the attacker could trick the user into performing mouse clicks in the application, thus
performing activities without user's consent (ex: delete user, subscribe to newsletter, etc). This is called a Clickjacking attack and it is described
in detail here:
https://owasp.org/www-community/attacks/Clickjacking
https://atomwaffendivision.org/ Response headers do not include the HTTP X-XSS-Protection security header
Details
Ris k de s c ription:
The X-XSS-Protection HTTP header instructs the browser to stop loading web pages when they detect reflected Cross-Site Scripting (XSS)
attacks. Lack of this header exposes application users to XSS attacks in case the web application contains such vulnerability.
3/6
More information about this issue:
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection
https://atomwaffendivision.org/ Response headers do not include the X-Content-Type-Options HTTP security header
Details
Ris k de s c ription:
The HTTP header X-Content-Type-Options is addressed to the Internet Explorer browser and prevents it from reinterpreting the content of a web
page (MIME-sniffing) and thus overriding the value of the Content-Type header). Lack of this header could lead to attacks such as Cross-Site
Scripting or phishing.
https://atomwaffendivision.org/ Response headers do not include the Referrer-Policy HTTP security header
Details
Ris k de s c ription:
The Referrer-Policy HTTP header controls how much referrer information the browser will send with each request originated from the current
web application.
For instance, if a user visits the web page "http://example.com/pricing/" and it clicks on a link from that page going to e.g.
"https://www.google.com", the browser will send to Google the full originating URL in the Referer header, assuming the Referrer-Policy header
is not set. The originating URL could be considered sensitive information and it could be used for user tracking.
Read more:
https://developer.mozilla.org/en-US/docs/Web/Security/Referer_header:_privacy_and_security_concerns
CloudFlare CDN
Details
Ris k de s c ription:
An attacker could use this information to mount specific attacks against the identified software type and version.
4/6
More information about this issue:
https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/01-Information_Gathering/02-
Fingerprint_Web_Server.html.
S c re e ns hot:
Details
Ris k de s c ription:
There is no particular security risk in having a robots.txt file. However, this file is often misused by website administrators to try to hide some
web pages from the users. This should not be considered a security measure because these URLs can be easily read directly from the robots.txt
file.
Website is accessible.
5/6
List of tests performed (17/ 17)
Checking for website accessibility...
Checking for Secure flag of cookie...
Checking for domain too loose set for cookies...
Checking for missing HTTP header - Strict-Transport-Security...
Checking for missing HTTP header - Content Security Policy...
Checking for missing HTTP header - X-Frame-Options...
Checking for missing HTTP header - X-XSS-Protection...
Checking for missing HTTP header - X-Content-Type-Options...
Checking for missing HTTP header - Referrer...
Checking for website technologies...
Checking for vulnerabilities of server-side software...
Checking for robots.txt file...
Checking for client access policies...
Checking for use of untrusted certificates...
Checking for directory listing...
Checking for secure communication...
Checking for HttpOnly flag of cookie...
Scan parameters
Website URL: https://atomwaffendivision.org/
Scan type: Light
Authentication: False
6/6