Web Application Vapt Cybersapiens United LLP: Report On
Web Application Vapt Cybersapiens United LLP: Report On
Web Application Vapt Cybersapiens United LLP: Report On
Report on
poshsecure.com
Table of Contents
1. Document Attributes…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….
2. Executive Summary…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..
3. VAPT Test Graph…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….....
4. Auditing Scope…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..……
5. Methodologies and Standards….…..…..…..…..…..…..…..…..…..…..…..….....
6. VAPT project Timeframe …..…..…..….…..…..…..….…..…..…..….…..………
7. Risk Ratings and Threat level ….…….…….…….……...…….…….…….….
8. Vulnerability Summary …..……..……..……..……..……..……..……..………...
9. Observations …..……..……..……..……..……..……..……..……..……..………
10. Tools used for Assessment …..……..……..……..……..……..……..……..……
11. Conclusion …..……..……..……..……..……..……..……..……..……..……….
1. Document Attributes
Date 30-01-2022
Version 1.0
Reviewed by
2. Executive Summary
Risk Distrubusion
4. AUDITING SCOPE
Detailed list of assets is given in the below table.
The following methodologies and standards were used during the project.
- OWASP testing guide
Severity Description
Loss of business / Breach of internal data / Non-bearable financial and reputational
Critical loss / Breakdown of assets / Access and modification of critical data
Loss of customer / Exposure of internal data / Noncompliance to regulations /
High Unavailability of the services / Access to configurational changes / High financial and
reputational loss / Access and modification of internal data
Customer service affected for one day / Noncompliance with internal requirements /
Medium Bearable financial and reputational loss / Disclosure of non-public data
Internal services affected / Minor inconvenience to customers / Very minimal
Low
financial and reputation loss
8. Vulnerability Summary
9. Observations
Vulnerability No SPF & DMARC Policies
IP Address 35.190.26.15
Risk Low
Description There are no SPF & DMARC Policies set.
Impact Anyone can send emails using this vulnerability.
Proof of Concept MXtool Box – NO DMARC
(POC)
Kitterman – NO SPF
Proof of Concept
(POC)
Remediation Sanitize all the input from the user and store them in the
same way.
Video POC https://drive.google.com/file/d/1f9jz4KqA80F8nGnjipXyuoN
LnOJ37j2r/view?usp=sharing
Vulnerability Clickjacking
IP Address 35.190.26.15
Risk Low
Description Clickjacking, also known as a "UI redress attack", is when an
attacker uses multiple transparent or opaque layers to trick
a user into clicking on a button or link on another page when
they were intending to click on the top-level page. Thus, the
attacker is "hijacking" clicks meant for their page and routing
them to another page, most likely owned by another
application, domain, or both.
Impact Using a similar technique, keystrokes can also be hijacked.
With a carefully crafted combination of stylesheets, iframes,
and text boxes, a user can be led to believe they are typing
in the password to their email or bank account, but are
instead typing into an invisible frame controlled by the
attacker.
Proof of Concept
(POC)
clickjacking.
Video POC https://drive.google.com/file/d/1zzRschn_TCe1kcyM5SL5Rjt
6g34GdbhE/view?usp=sharing
Remediation Remove all the sensitive and unnecessary Meta Data from
the image before uploading publicly.
Video POC https://drive.google.com/file/d/1l16pdkezZfFDvZQkzMnV1
artIWS3Sg22/view?usp=sharing
(POC)
Cookies Example:
Proof of Concept
(POC)
Remediation You should limit the rate for contact form to avoid such kind
of issues.
WEB APPLICATION VAPT CYBERSAPIENS UNITED LLP
Client Confidential
Remediation The secure flag should be set on all cookies that are used for
transmitting sensitive data when accessing content over
HTTPS.
Video POC https://drive.google.com/file/d/1UcF3TB3JA-fcEcoFeBWb-
bBgFOV-vCUT/view?usp=sharing
Remediation Check the file & it’s extension properly on the server side.
Video POC https://drive.google.com/file/d/1jptThCHNyD6zZlxnDla3Cb
NB1ffh9PGo/view?usp=sharing
Proof of Concept
(POC)
Remediation Restrict the access to the other user’s data such that only
authorized user is permitted to view his data.
Video POC https://drive.google.com/file/d/1TZlWcpfqUjn-
jsl4sopYs0p3fr1JGOSH/view?usp=sharing
Remediation Restrict the access to the other user’s data such that only
authorized user is permitted to view his data.
Video POC https://drive.google.com/file/d/1xQm2ioQxkNZrmcOQLKR
WsTwlcflSyPCP/view?usp=sharing
Remediation Restrict the access public access to XMLRPC & to any /wp-
json.
Video POC https://drive.google.com/file/d/1DhxGL8bu8S7xqE5xXfS1b
6-wbQHA4pch/view?usp=sharing
11. Conclusion
Overall, we found the Assets tested to be well designed and to be utilizing many
solid security practices. However, few misconfigurations/vulnerabilities were
identified which are given above. We recommend to immediately fix the issue
identified to make the systems risk free and secure.