Vulnerability Assessment
Vulnerability Assessment
Summary Report
Summary
It has been observed That the URL http://testphp.vulnweb.com/ has some
Vulnerability which are categorised as risk low, risk medium, risk high, risk
critical. Reflected cross-site scripting vulnerabilities arise when data is copied
from a request and echoed into the application's immediate response in an
unsafe way. An attacker can use the vulnerability to construct a request that, if
issued by another application user, will cause JavaScript code supplied by the
attacker to execute within the user's browser in the context of that user's
session with the application. The attacker-supplied code can perform a wide
variety of actions, such as stealing the victim's session token or login
credentials, performing arbitrary actions on the victim's behalf, and logging
their keystrokes. Users can be induced to issue the attacker's crafted request in
various ways. For example, the attacker can send a victim a link containing a
malicious URL in an email or instant message. They can submit the link to
popular web sites that allow content authoring, for example in blog comments.
And they can create an innocuous looking web site that causes anyone viewing
it to make arbitrary cross-domain requests to the vulnerable application (using
either the GET or the POST method). The security impact of cross-site scripting
vulnerabilities is dependent upon the nature of the vulnerable application, the
kinds of data and functionality that it contains, and the other applications that
belong to the same domain and organization. If the application is used only to
display non-sensitive public content, with no authentication or access control
functionality, then a cross-site scripting flaw may be considered low risk.
However, if the same application resides on a domain that can access cookies
for other more security-critical applications, then the vulnerability could be
used to attack those other applications, and so may be considered high risk.
Similarly, if the organization that owns the application is a likely target for
phishing attacks, then the vulnerability could be leveraged to lend credibility to
such attacks, by injecting Trojan functionality into the vulnerable application
and exploiting users' trust in the organization in order to capture credentials for
other applications that it owns. In many kinds of application, such as those
providing online banking functionality, cross-site scripting should always be
considered high risk.
5.The directory
http://testphp.vulnweb.com/Mod_Rewrite_Shop/.htacc
ess is listing the contents of the folder
Web application listing files and directories can present
several safety hazards. Here are a few examples:
Sensitive information disclosure: When a web
application allows directory listing, it may reveal
sensitive information such as file names, directory
structure, and even the content of files. This could
include sensitive data such as configuration files,
backups, and logs that contain sensitive information.
Vulnerable files and directories: When a web application
allows directory listing, it may reveal the presence of
files and directories that are known to be vulnerable to
attack. This could include old, unpatched versions of
software, or files that have weak permissions. Attack
surface: When a web application allows directory listing,
it increases the attack surface of the application.
Attackers can use the information revealed through
directory listing to identify and exploit vulnerabilities in
the application. Phishing: Attackers can create a fake
website to mimic the real one, and use the information
from the listing directory to make it more convincing.
Solution
There are several ways to prevent directory listing in a
web service: Use a .htaccess file: This file can be used to
configure Apache web server settings. By adding the
following line to the .htaccess file, directory listing will
be disabled: Options -Indexes Use web server's
configuration: Some web servers such as Apache have a
global configuration file where you can set the options
for directory listing. You can disable directory listing for
the entire server by adding the following line to the
configuration file: Options -Indexes Use a default index
file: By default, most web servers will display the content
of a directory if there is no index file present. You can
prevent directory listing by creating an index file such as
index.html or index.php in every directory. Use a web
application firewall: Some web application firewall has
the capability to detect and block directory listing
attempts. It's recommended to use more than one
method to prevent directory listing, since it can add an
extra layer of security.
Like wise are all other 9 medium risks.