VVATP
VVATP
VVATP
Report
Confidential
Version: 1.0
The issues identified and proposed action plans in this report are
based on our testing. We made specific efforts to verify the
the tests carried out during the limited time for conducting such
this or any exploit been made available after May 9, 2020, does
policies.
REPORT ANALYSIS
TABLE OF CONTENT
EXECUTIVE SUMMARY | 1
Background
Application Health
Observations
Recommendations
SCAN DETAILS | 2
THREAT DISTRIBUTION | 2
1. SQL Injection | 3
BACKGROUND
APPLICATION HEALTH
OBSERVATIONS
that we believe could pose a significant risk to the security of the application
attacker can retrieve any data from the database which includes sensitive
customer data or take over other user's account.
Add CAPTCHA to the login page after three failed login attempts.
01
EXECUTIVE
SUMMARY
HIGH
SCAN DETAILS
URL https://hack.me/101047/dvwa-107.html
Scope Black-Box
THREAT DISTRIBUTION
INSTANCE COUNT
1111
Reflected Cross
Site Scripting
Information leakage
headers
THREAT ANALYSIS
BY SEVERITY LEVEL
force prevention
Fingerprint Web
Server
Reflected Cross
Site Scripting
02
THREAT ANALYSIS
1 SQL INJECTION
Relative Risk
Vulnerability Class
CVSS
URL
Parameter
High
8.6 (AV:N/AC:L/Au:S/C:P/I:P/A:C/E:H/RL:W/RC:C/CDP:MH/TD:H/CR:M/IR:M/AR:M)
https://hack.me/101047/dvwa-107.htmlvulnerabilities/sqli/index.php
id
OBSERVATION
DVWA web application does not validate a user input which is then consumed inside
SQL queries. This allows an attacker to provide an input containing SQL statements
to modify the output in a way to retrieve desired data from the database. This
attacker can dump entire data from the database which the current database user
EXHIBITS
03
This error indicates that the user input is consumed to form dynamic SQL strings.
With this knowledge, Cybereaon analysts were able to retrieve arbitrary data from
the database
04
You have an error in your SQL syntax; check the manual that corresponds
to your MySQL server version for the right syntax to use near '\'' at line
1
Following payload will extract database version and the database name
DATABASE INFORMATIONS:
05
Current user
Database Name
USER INFORMATION
Note: Password hashes are partially masked for the security reason.
06
An attacker can dump entire data from the database that is available to the privilege of current
database user. User credentials dumped can further be misused to gain unauthorized access to
other user's account. A user only privilege account can be used to conduct this attack in order
RECOMMENDATION
Username Password
IMPACT
Relative Risk
Vulnerability Class
CVSS
URL
Parameter
Medium
6.9 (AV:N/AC:L/Au:N/C:N/I:P/A:N/E:H/RL:W/RC:C/CDP:MH/TD:H/CR:M/IR:M/AR:M)
https://hack.me/101047/dvwa-107.html /vulnerabilities/xss_r
name
OBSERVATION
The DVWA web application for mobile does not perform output encoding of
user supplied input containing special characters such as <, >, ', /, etc. is echoed
back in HTML response without any output encoding performed. This allows an
attacker to input malicious JavaScript which can steal victim's cookie, redirect
EXHIBITS
Step 1
07
Navigate tohttp://hack.me/vulnerabilities/xss_r
08
<iframe onload="alert(document.location)">
A dialog box with current URL value will be shown as a result of our payload
09
10
IMPACT
Reflected Cross Site Scripting is relatively complex to exploit as the malicious payload has to be
send as a part of URL and user should be tricked to visit that URL. However, it has the same impact
as that of a persistent XSS. In DVWA application, XSS can be used to hijack victim's session and
thereby gaining complete access to his/her user account. Additionally, it can be used to redirect
victim to a malicious website which may contain browser exploits or a phishing page.
RECOMMENDATION
Relative Risk
Vulnerability Class
CVSS
URL
Parameter
Medium
4.9 (AV:N/AC:M/Au:S/C:P/I:P/A:N/E:POC/RL:W/RC:C/CDP:LM/TD:M/CR:M/IR:M/AR:M)
http://hack.me/login.php
password
OBSERVATION
The DVWA application does not lockout a user account or provides CAPTCHA
when 'n' failed login attempts is made. Cybereaon analysts tried with a threshold
EXHIBITS
Step 1
Step 2
Repeat step 1 multiple times. You will notice that application will
neither provide any CAPTCHA to the user or will block victim user's
account.
Step 3
11
12
IMPACT
An attacker can use brute force attack to guess valid password for an account. In a brute force attack,
automated software is used to generate a large number of consecutive guesses as to the value of
the desired data. Another form of brute force attack known as a dictionary attack might try all the
words in a dictionary to guess the user password. Moreover, due to the failure of strong password
Password brute force attacks can be prevented by providing user with a strong CAPTCHA
lockout can be implemented after 15 failed attempts. The later method can also be
misused by an attacker to lock multiple user accounts and thereby creating a denial of
References: https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks
RECOMMENDATION
Relative Risk
Vulnerability Class
CVSS
URL
Parameter
Low
1.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:W/RC:C/CDP:N/TD:L/CR:M/IR:M/AR:M)
http://hack.me/
Not Applicable
OBSERVATION
The web server hosting DVWA application is misconfigured due to which application
EXHIBITS
Step 1
Request any web page of the application and observe the response
13
14
IMPACT
Attacker can know the version of the PHP running on the web server by the header and
can search for the known vulnerabilities of PHP 5.4.23 for further exploitation.
There is no direct impact to business with this vulnerability but falls under security best
practices.
RECOMMENDATION