1. Trang chủ
  2. » Giáo Dục - Đào Tạo

Thực hành an toàn ứng dụng web và cơ sở dữ liệu

68 12 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 68
Dung lượng 443,47 KB

Nội dung

DANH SÁCH SINH VIÊN Phạm Trường Giang Nguyễn Huy Tùng Đào Xuân Hiệu Nguyễn Thành Tâm B18DCAT063 B18DCAT223 B18DCAT091 B18DCAT207 DANH SÁCH WEBSITE http://portswigger-labs.net I Overview - BurpSuite Professional Version - Setup - Details Summary The table below shows the numbers of issues identified in different categories Issues are classified according to severity as High, Medium, Low or Information This reflects the likely impact of each issue for a typical organization Issues are also classified according to confidence as Certain, Firm or Tentative This reflects the inherent reliability of the technique that was used to identify the issue Confidence Certain Firm Tentative Total High 0 Medium 0 0 Low 1 1 Severit y Informatio n The chart below shows the aggregated numbers of issues identified in each category Solid colored bars represent issues with a confidence level of Certain, and the bars fade as the confidence level falls High Severity Medium Low a b c d e Contents Flash cross-domain policy Vulnerable JavaScript dependency Unencrypted communications Frameable response (potential Clickjacking) Robots.txt file a Flash cross-domain policy  Summary  Issue detail The application publishes a Flash cross-domain policy which allows access from any domain Allowing access from all domains means that any domain can perform two-way interaction with this application Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk  Issue background The Flash cross-domain policy controls whether Flash client components running on other domains can perform two-way interaction with the domain that publishes the policy If another domain is allowed by the policy, then that domain can potentially attack users of the application If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application that allows access Any domains that are allowed by the Flash cross-domain policy should be reviewed to determine whether it is appropriate for the application to fully trust both their intentions and security posture  Issue remediation Any inappropriate entries in the Flash cross-domain policy file should be removed Vulnerability classifications • CWE-942: Overly Permissive Cross-domain Whitelist  Request  GET /crossdomain.xml HTTP/1.1 Host: portswigger-labs.net Accept-Encoding: gzip, deflate Accept: */* Accept-Language: en User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Connection: close  Response HTTP/1.1 200 OK Date: Thu, 14 Oct 2021 09:00:07 GMT Server: Apache/2.4.41 (Ubuntu) Upgrade: h2,h2c Connection: Upgrade, close Last-Modified: Fri, 29 May 2020 10:53:20 GMT ETag: "53-5a6c740e3873e-gzip" Accept-Ranges: bytes Vary: Accept-Encoding Content-Length: 83 Content-Type: application/xml b Vulnerable JavaScript dependency  Summary  Issue detail We observed a vulnerable JavaScript library We detected jquery version 2.2.0, which has the following vulnerabilities: • • CVE-2015-9251: 3rd party CORS request may execute CVE-2019-11358: jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ) because of Object.prototype pollution • CVE-2020-11022: Regex in its jQuery.htmlPrefilter sometimes may introduce XSS • CVE-2020-11023: Regex in its jQuery.htmlPrefilter sometimes may introduce XSS  Issue background The use of third-party JavaScript libraries can introduce a range of DOM-based vulnerabilities, including some that can be used to hijack user accounts like DOM-XSS Common JavaScript libraries typically enjoy the benefit of being heavily audited This may mean that bugs are quickly identified and patched upstream, resulting in a steady stream of security updates that need to be applied Although it may be tempting to ignore updates, using a library with missing security patches can make your website exceptionally easy to exploit Therefore, it's important to ensure that any available security updates are applied promptly Some library vulnerabilities expose every application that imports the library, but others only affect applications that use certain library features Accurately identifying which library vulnerabilities apply to your website can be difficult, so we recommend applying all available security updates regardless  Issue remediation Develop a patch-management strategy to ensure that security updates are promptly applied to all third-party libraries in your application Also, consider reducing your attack surface by removing any libraries that are no longer in use  Vulnerability classifications • CWE-1104: Use of Unmaintained Third Party Components • A9: Using Components with Known Vulnerabilities  Request GET /index_files/jquery-2.js HTTP/1.1 Host: portswigger-labs.net Upgrade-Insecure-Requests: Accept-Encoding: gzip, deflate Accept: */* Accept-Language: en-US,en-GB;q=0.9,en;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Connection: close Cache-Control: max-age=0  Response HTTP/1.1 200 OK Date: Thu, 14 Oct 2021 08:59:38 GMT Server: Apache/2.4.41 (Ubuntu) Upgrade: h2,h2c Connection: Upgrade, close Last-Modified: Fri, 29 May 2020 10:53:20 GMT ETag: "14e59-5a6c740e3a67e-gzip" Accept-Ranges: bytes Vary: Accept-Encoding Content-Length: 85593 Content-Type: application/javascript /*! jQuery v2.2.0 | (c) jQuery Foundation | jquery.org/license */ !function(a,b){"object"==typeof module&&"object"==typeof module.exports? module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("j [SNIP] c Unencrypted communications  Summary  Issue description The application allows users to connect to it over unencrypted connections An attacker suitably positioned to view a legitimate user's network traffic could record and monitor their interactions with the application and obtain any information the user supplies Furthermore, an attacker able to modify traffic could use the application as a platform for attacks against its users and third-party websites Unencrypted connections have been exploited by ISPs and governments to track users, and to inject adverts and malicious JavaScript Due to these concerns, web browser vendors are planning to visually flag unencrypted connections as hazardous To exploit this vulnerability, an attacker must be suitably positioned to eavesdrop on the victim's network traffic This scenario typically occurs when a client communicates with the server over an insecure connection such as public Wi-Fi, or a corporate or home network that is shared with a compromised computer Common defenses such as switched networks are not sufficient to prevent this An attacker situated in the user's ISP or the application's hosting infrastructure could also perform this attack Note that an advanced adversary could potentially target any connection made over the Internet's core infrastructure Please note that using a mixture of encrypted and unencrypted communications is an ineffective defense against active attackers, because they can easily remove references to encrypted resources when these references are transmitted over an unencrypted connection  Issue remediation Applications should use transport-level encryption (SSL/TLS) to protect all communications passing between the client and the server The Strict-Transport-Security HTTP header should be used to ensure that clients refuse to access the server over an insecure connection  References or when a Refresh directive is issued), but this behavior should not be relied upon to protect the originating URL from disclosure Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application  Issue remediation Applications should never transmit any sensitive information within the URL query string In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties If placing sensitive information in the URL is unavoidable, consider using the Referer-Policy HTTP header to reduce the chance of it being disclosed to third parties References • Referer Policy  Vulnerability classifications • CWE-200: Information Exposure  Request  GET /?txfts">alert(1)a3v2u=1 HTTP/1.1 Host: e-space.vn Accept-Encoding: gzip, deflate Accept: */* Accept-Language: en-US,en-GB;q=0.9,en;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Connection: close Cache-Control: max-age=0  Response HTTP/1.1 200 OK Date: Thu, 14 Oct 2021 09:20:57 GMT Server: Apache/2.4.18 (Ubuntu) Set-Cookie: PHPFRONTSESSID=s80miosr681q7829vudq3c3ft3; path=/; HttpOnly Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Set-Cookie: _csrf=538bb034f683169e44b290afc496e9c8fa84c54fcf3470b1abfff538f2d6e80da %3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A %22X-Lh-8onnErw4jy5juIglCfeYsrPzvkU%22%3B%7D; path=/; HttpOnly Vary: Accept-Encoding Content-Length: 67087 Connection: close Content-Type: text/html; charset=UTF-8

Ngày đăng: 04/12/2021, 07:39

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w