Web Application Report
Total Page:16
File Type:pdf, Size:1020Kb
Web Application Report This report includes important security information about your web application. Security Report This report was created by IBM Security AppScan Standard 9.0.3.13, Rules: 18533 Scan started: 6/2/2020 10:39:20 AM Table of Contents Introduction General Information Login Settings Summary Issue Types Vulnerable URLs Fix Recommendations Security Risks Causes WASC Threat Classification Issues Sorted by Issue Type Cross-Site Scripting 28 Link to Non-Existing Domain Found 2 SQL Injection File Write (requires user verification) 1 Check for SRI (Subresource Integrity) support 1 Credit Card Number Pattern Found (Visa) Over Unencrypted Connection 1 Google Sitemap File Detected 1 Hidden Directory Detected 6 Missing or insecure "Content-Security-Policy" header 5 Unsafe third-party link (target="_blank") 22 Fix Recommendations Remove the non-existing domain from the web site Review possible solutions for hazardous character injection Add the attribute rel = "noopener noreferrer" to each link element with target="_blank" 6/3/2020 1 Add to each third-party script/link element support to SRI(Subresource Integrity). Config your server to use the "Content-Security-Policy" header with secure policies Issue a "404 - Not Found" response status code for a forbidden resource, or remove it completely Remove credit card numbers from your website Validate that your Google Sitemap file only contains URLs that should be publicly available and indexed Advisories Cross-Site Scripting Link to Non-Existing Domain Found SQL Injection File Write (requires user verification) Check for SRI (Subresource Integrity) support Credit Card Number Pattern Found (Visa) Over Unencrypted Connection Google Sitemap File Detected Hidden Directory Detected Missing or insecure "Content-Security-Policy" header TargetBlankLink Application Data Cookies JavaScripts Parameters Comments Visited URLs Failed Requests Filtered URLs 6/3/2020 2 Introduction This report contains the results of a web application security scan performed by IBM Security AppScan Standard. High severity issues: 31 Low severity issues: 36 Total security issues included in the report: 67 Total security issues discovered in the scan: 77 General Information Scan file name: Untitled Scan started: 6/2/2020 10:39:20 AM Test policy: ArabBankScanPolicy(Modified) Host abinv01jo2019.dev.dot.jo Port 80 Operating system: Unknown Web server: Unknown Application server: PHP Login Settings Login method: None 6/3/2020 3 Summary Issue Types 9 TOC Issue Type Number of Issues H Cross-Site Scripting 28 H Link to Non-Existing Domain Found 2 H SQL Injection File Write (requires user verification) 1 L Check for SRI (Subresource Integrity) support 1 L Credit Card Number Pattern Found (Visa) Over Unencrypted 1 Connection L Google Sitemap File Detected 1 L Hidden Directory Detected 6 L Missing or insecure "Content-Security-Policy" header 5 L Unsafe third-party link (target="_blank") 22 Vulnerable URLs 34 TOC URL Number of Issues H http://abinv01jo2019.dev.dot.jo/ 6 H http://abinv01jo2019.dev.dot.jo/ar/career-page 2 H http://abinv01jo2019.dev.dot.jo/ar/contact 2 H http://abinv01jo2019.dev.dot.jo/ar/download-file 2 H http://abinv01jo2019.dev.dot.jo/ar/downloads 3 H http://abinv01jo2019.dev.dot.jo/ar/site-map 3 H http://abinv01jo2019.dev.dot.jo/en/business-summary-1 2 H http://abinv01jo2019.dev.dot.jo/en/business-summary-2 2 H http://abinv01jo2019.dev.dot.jo/en/career-page 3 H http://abinv01jo2019.dev.dot.jo/en/company-profile 2 H http://abinv01jo2019.dev.dot.jo/en/contact 3 H http://abinv01jo2019.dev.dot.jo/en/discretionary-portfolio-managemen 2 6/3/2020 4 t H http://abinv01jo2019.dev.dot.jo/en/download-file 1 H http://abinv01jo2019.dev.dot.jo/en/downloads 4 H http://abinv01jo2019.dev.dot.jo/en/fatca-compliance 2 H http://abinv01jo2019.dev.dot.jo/en/fund-management 2 H http://abinv01jo2019.dev.dot.jo/en/legal-p 2 H http://abinv01jo2019.dev.dot.jo/en/management-profile 2 H http://abinv01jo2019.dev.dot.jo/en/non-discretionary-services 2 H http://abinv01jo2019.dev.dot.jo/en/privacy-policy 2 H http://abinv01jo2019.dev.dot.jo/en/security-statement 2 H http://abinv01jo2019.dev.dot.jo/en/sme-investment-fund 2 H http://abinv01jo2019.dev.dot.jo/en/useful-links 2 H http://abinv01jo2019.dev.dot.jo/en/wolfsberg-aml-certification 2 H http://abinv01jo2019.dev.dot.jo/minify/722eb01e9fd37c4cdd1445f4cc 1 42d56331186be0.js H http://abinv01jo2019.dev.dot.jo/minify/a03a15f5ba7e11f5c141a6455c 1 1a51a116a36282.js H http://abinv01jo2019.dev.dot.jo/minify/b4ef1e52dc8cbcdb794efd7e23 1 0c0775f56b679c.js H http://abinv01jo2019.dev.dot.jo/minify/c10eac05d180757c1cbb4410a 1 a549a10556ce780.js L http://abinv01jo2019.dev.dot.jo/assets/ 1 L http://abinv01jo2019.dev.dot.jo/css/ 1 L http://abinv01jo2019.dev.dot.jo/images/ 1 L http://abinv01jo2019.dev.dot.jo/js/ 1 L http://abinv01jo2019.dev.dot.jo/protected/ 1 L http://abinv01jo2019.dev.dot.jo/uploads/ 1 Fix Recommendations 8 TOC Remediation Task Number of Issues H Remove the non-existing domain from the web site 2 H Review possible solutions for hazardous character injection 29 L Add the attribute rel = "noopener noreferrer" to each link element with 22 target="_blank" L Add to each third-party script/link element support to 1 SRI(Subresource Integrity). L Config your server to use the "Content-Security-Policy" header with 5 secure policies L Issue a "404 - Not Found" response status code for a forbidden 6 resource, or remove it completely L Remove credit card numbers from your website 1 6/3/2020 5 L Validate that your Google Sitemap file only contains URLs that should 1 be publicly available and indexed Security Risks 6 TOC Risk Number of Issues H It may be possible to steal or manipulate customer session and 28 cookies, which might be used to impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform transactions as that user H It is possible to persuade a naive user to supply sensitive information 29 such as username, password, credit card number, social security number etc. H It is possible to run remote commands on the web server. This 1 usually means complete compromise of the server and its contents L In case the third-party server is compromised, the content/behavior of 1 the site will change L It is possible to gather sensitive information about the web application 6 such as usernames, passwords, machine name and/or sensitive file locations L It is possible to retrieve information about the site's file system 7 structure, which may help the attacker to map the web site Causes 6 TOC Cause Number of Issues H Sanitation of hazardous characters was not performed correctly on 29 user input H The web application contains a link to a non-existing domain 2 L There is no support to Subresource Integrity. 1 L Insecure web application programming or configuration 6 L The web server or application server are configured in an insecure 7 way L The rel attribute in the link element is not set to "noopener 22 noreferrer". WASC Threat Classification TOC Threat Number of Issues 6/3/2020 6 Abuse of Functionality 22 Cross-site Scripting 28 Information Leakage 13 Remote File Inclusion 1 SQL Injection 1 URL Redirector Abuse 2 6/3/2020 7 Issues Sorted by Issue Type H Cross-Site Scripting 28 TOC Issue 1 of 28 TOC Cross-Site Scripting Severity: High CVSS Score: 7.5 URL: http://abinv01jo2019.dev.dot.jo/ Entity: (Page) Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform transactions as that user Causes: Sanitation of hazardous characters was not performed correctly on user input Fix: Review possible solutions for hazardous character injection Difference: Path manipulated from: / to: /"><script>alert(331)</script> Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded a script in the response, which will be executed when the page loads in the user's browser. Raw Test Response: ... x-content-type-options: nosniff expires: Thu, 19 Nov 1981 08:52:00 GMT x-powered-by: DotJo x-xss-protection: 1; mode=block connection: close feature-policy: microphone 'none' vary: Accept-Encoding referrer-policy: strict-origin-when-cross-origin date: Wed, 03 Jun 2020 00:25:55 GMT content-type: text/html; charset=UTF-8 content-security-policy: default-src 'none'; script-src 'self' 'unsafe-inline' 'unsafe-eval' *.exchange.jo ajax.googleapis.com *.google.com *.gstatic.com; style-src 'self' 'unsafe-inline' *.exchange.jo; img-src 'self' data: *.exchange.jo; connect-src 'self'; font-src 'self'; object- src 'self'; media-src 'self'; form-action 'self'; frame-src 'self' *.google.com; child-src 'self'; worker-src 'self'; require-sri-for script 6/3/2020 8 pragma: no-cache x-robots-tag: noindex, nofollow, nosnippet, noarchive cache-control: no-store, no-cache, must-revalidate ... ... <!-- Collect the nav links, forms, and other content for toggling --> <div class="collapse navbar-collapse" id="navbar-brand-centered"> <p class="language"> <!-- <li class="language">--> <a/>عربي<"a href="/"><script>alert(331)</script>?language=ar> <!-- </li>--> ... Issue 2 of 28 TOC Cross-Site Scripting Severity: High CVSS Score: 7.5 URL: http://abinv01jo2019.dev.dot.jo/en/contact Entity: contact (Page) Risk: It may be possible to steal or manipulate customer session and cookies, which might be used to impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform transactions as that user Causes: Sanitation of hazardous characters was not performed correctly on user input Fix: Review possible solutions for hazardous character injection Difference: Path manipulated from: /en/contact to: /en/contact/"><script>alert(223)</script> Reasoning: The test result seems to indicate a vulnerability because Appscan successfully embedded a script in the response, which will be executed when the page loads in the user's browser.