Security Assessment for http://yehg.net


Summary
Site: http://yehg.net
Methodology used:PortSwigger
Number Of Tests:69
Number Of Flaws:20
Date:
(mm/dd/yyyy)
6-23-2008
Penetration Tester:d0ubl3_h3lix


 Problems Identified  

Flaw 1. Hidden & default content  — Refer to Test 2

Flaw 2. Data entry points  — Refer to Test 4

Flaw 3. Account recovery function  — Refer to Test 9

Flaw 4. Impersonation function  — Refer to Test 11

Flaw 5. Fail-open conditions  — Refer to Test 14

Flaw 6. Multi-stage mechanisms  — Refer to Test 15

Flaw 7. Tokens predictability  — Refer to Test 17

Flaw 8. Disclosure of tokens in logs  — Refer to Test 19

Flaw 9. Session termination  — Refer to Test 21

Flaw 10. SQL injection  — Refer to Test 29

Flaw 11. HTTP header injection  — Refer to Test 32

Flaw 12. Arbitrary redirection  — Refer to Test 33

Flaw 13. SOAP injection  — Refer to Test 41

Flaw 14. LDAP injection  — Refer to Test 42

Flaw 15. Logic attack surface  — Refer to Test 44

Flaw 16. Transmission of data via client  — Refer to Test 45

Flaw 17. Dangerous HTTP methods  — Refer to Test 57

Flaw 18. Sensitive data in URL parameters  — Refer to Test 66

Flaw 19. Forms with autocomplete enabled  — Refer to Test 67

Flaw 20. Information leakage  — Refer to Test 68

 Results Detailed  

† Recon and analysis †

Test 1. Map visible content
Vulnerable? NO

Test 2. Discover hidden & default content
Vulnerable? YES

Test 3. Test for debug parameters
Vulnerable? NO
Result/Note:
Result/Note may be
---------------------------

* Notes for this test.
* Fixes for this test.
* Findings for this test. - can contain attack/response strings

?admin=1
?str="><script>alert(0)//</script><!---

Test 4. Identify data entry points
Vulnerable? YES

Test 5. Identify the technologies used
Vulnerable? NO

Test 6. Test password quality rules
Vulnerable? NO

† Test handling of access Authentication †

Test 7. Test for username enumeration
Vulnerable? NO

Test 8. Test resilience to password guessing
Vulnerable? NO

Test 9. Test any account recovery function
Vulnerable? YES

Test 10. Test any `remember me` function
Vulnerable? NO

Test 11. Test any impersonation function
Vulnerable? YES

Test 12. Test username uniqueness
Vulnerable? NO

Test 13. Check for unsafe distribution of credentials
Vulnerable? NO

Test 14. Test for fail-open conditions
Vulnerable? YES

Test 15. Test any multi-stage mechanisms
Vulnerable? YES

† Test handling of access Session handling †

Test 16. Test tokens for meaning
Vulnerable? NO

Test 17. Test tokens for predictability
Vulnerable? YES

Test 18. Check for insecure transmission of tokens
Vulnerable? NO

Test 19. Check for disclosure of tokens in logs
Vulnerable? YES

Test 20. Check mapping of tokens to sessions
Vulnerable? NO

Test 21. Check session termination
Vulnerable? YES

Test 22. Check for session fixation
Vulnerable? NO

Test 23. Check for cross-site request forgery
Vulnerable? NO

Test 24. Check cookie scope
Vulnerable? NO

† Test handling of access Access controls †

Test 25. Understand the access control requirements
Vulnerable? NO

Test 26. Test effectiveness of controls, using multiple accounts if possible
Vulnerable? NO

Test 27. Test for insecure access control methods (request parameters, Referer header, etc)
Vulnerable? NO

† Test handling of input †

Test 28. Fuzz all request parameters
Vulnerable? NO

Test 29. Test for SQL injection
Vulnerable? YES

Test 30. Identify all reflected data
Vulnerable? NO

Test 31. Test for reflected XSS
Vulnerable? NO

Test 32. Test for HTTP header injection
Vulnerable? YES

Test 33. Test for arbitrary redirection
Vulnerable? YES

Test 34. Test for stored attacks
Vulnerable? NO

Test 35. Test for OS command injection
Vulnerable? NO

Test 36. Test for path traversal
Vulnerable? NO

Test 37. Test for script injection
Vulnerable? NO

Test 38. Test for file inclusion
Vulnerable? NO

Test 39. Test for SMTP injection
Vulnerable? NO

Test 40. Test for native software flaws (buffer overflow, integer bugs, format strings)
Vulnerable? NO

Test 41. Test for SOAP injection
Vulnerable? YES

Test 42. Test for LDAP injection
Vulnerable? YES

Test 43. Test for XPath injection
Vulnerable? NO

† Test application logic †

Test 44. Identify the logic attack surface
Vulnerable? YES

Test 45. Test transmission of data via the client
Vulnerable? YES

Test 46. Test for reliance on client-side input validation
Vulnerable? NO

Test 47. Test any thick-client components (Java, ActiveX, Flash)
Vulnerable? NO

Test 48. Test multi-stage processes for logic flaws
Vulnerable? NO

Test 49. Test handling of incomplete input
Vulnerable? NO

Test 50. Test trust boundaries
Vulnerable? NO

Test 51. Test transaction logic
Vulnerable? NO

† Assess application hosting †

Test 52. Test segregation in shared infrastructures
Vulnerable? NO

Test 53. Test segregation between ASP-hosted applications
Vulnerable? NO

Test 54. Test for web server vulnerabilities
Vulnerable? NO

Test 55. Default credentials
Vulnerable? NO

Test 56. Default content
Vulnerable? NO

Test 57. Dangerous HTTP methods
Vulnerable? YES

Test 58. Proxy functionality
Vulnerable? NO

Test 59. Virtual hosting mis-configuration
Vulnerable? NO

Test 60. Bugs in web server software
Vulnerable? NO

† Miscellaneous tests †

Test 61. Check for DOM-based attacks
Vulnerable? NO

Test 62. Check for frame injection
Vulnerable? NO

Test 63. Check for local privacy vulnerabilities
Vulnerable? NO

Test 64. Persistent cookies
Vulnerable? NO

Test 65. Caching
Vulnerable? NO

Test 66. Sensitive data in URL parameters
Vulnerable? YES

Test 67. Forms with autocomplete enabled
Vulnerable? YES

Test 68. Follow up any information leakage
Vulnerable? YES

Test 69. Check for weak SSL ciphers
Vulnerable? NO


Generated by YEHG.Net Report Generator