Developer Report: Acunetix Website Audit 23 December, 2021
Developer Report: Acunetix Website Audit 23 December, 2021
23 December, 2021
Developer Report
Scan information
Start time 23/12/2021 02:48:09
Finish time 23/12/2021 02:53:44
Scan time 5 minutes, 35 seconds
Profile Default
Server information
Responsive True
Server banner Apache
Server OS Unknown
Server technologies PHP
Threat level
Acunetix Threat Level 1
One or more low-severity type vulnerabilities have been discovered by the scanner.
Alerts distribution
Knowledge base
List of files with inputs
These files have at least one input (GET or POST).
- / - 1 inputs
List of external hosts
These hosts were linked from this website but they were not scanned because they are not listed in the list of hosts allowed.
(Configuration-> Scan Settings ->Scanning Options-> List of hosts allowed).
- www.riau.go.id
Alerts summary
Acunetix Website Audit 2
Alert details
Severity Low
Type Configuration
Reported by module Scripting (Clickjacking_X_Frame_Options.script)
Description
Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into
clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information
or taking control of their computer while clicking on seemingly innocuous web pages.
The server didn't return an X-Frame-Options header which means that this website could be at risk of a clickjacking attack. The X-
Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page inside a
frame or iframe. Sites can use this to avoid clickjacking attacks, by ensuring that their content is not embedded into other sites.
Impact
The impact depends on the affected web application.
Recommendation
Configure your web server to include an X-Frame-Options header. Consult Web references for more information about the possible
values for this header.
References
Clickjacking Protection for Java EE
Frame Buster Buster
Defending with Content Security Policy frame-ancestors directive
OWASP Clickjacking
Clickjacking
The X-Frame-Options response header
Affected items
Web Server
Details
No details are available.
Request headers
GET / HTTP/1.1
Host: riau.go.id
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0
Safari/537.21
Accept: */*
Severity Low
Type Validation
Reported by module Scripting (Track_Trace_Server_Methods.script)
Description
HTTP TRACE method is enabled on this web server. In the presence of other cross-domain vulnerabilities in web browsers, sensitive
header information could be read from any domains that support the HTTP TRACE method.
Impact
Attackers may abuse HTTP TRACE functionality to gain access to information in HTTP headers such as cookies and authentication
data.
Recommendation
Disable TRACE Method on the web server.
References
Cross-site tracing (XST)
US-CERT VU#867593
W3C - RFC 2616
Affected items
Web Server
Details
No details are available.
Request headers
TRACE /THki7hpnWr HTTP/1.1
Host: riau.go.id
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0
Safari/537.21
Accept: */*