Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Content

Table of Contents
maxLevel6
minLevel1
include
outlinefalse
indent
excludeContent
typelist
printablefalse
class

Overview

Page Properties
idoverview

Date

2022-09-14

Release

Release 2022-04

TestType

automatic

TestTopic

Penetration Test

Tester

SecurityOne

Standard

Background: Open Web Application Security Project (OWASP)

Status

Status
colourGreen
titleFIXED

Result Summary

Vulnerabilities

Page Properties

Critical

0

High

1

Medium

0

Low

3

We don't have a way to export this macro.

OWASP Top 10

Detailed Results

Vulnerability

Risk

Impact

Status

Broken Authorization

High

This allows a low privilege attacker to perform actions that a higher privilege user would normally have access to.

🧑‍🏭

Default Passwords Hardcoded

Low

In a default implementation of an openIMIS environment, an attacker with access with these passwords can potentially access confidential information.

(tick)

GraphQL introspection enabled

Low

An attacker can map out the API’s schema and gather information related to its configuration. This could lead to further attacks and potential loss of sensitive information.

Cookie Without SECURE flag

Low

To exploit this vulnerability, an attacker must be suitably positioned to eavesdrop on the victim's network traffic. Note that an advanced adversary could potentially target any connection made over the Internet's core infrastructure.

Remediation

All errors were fixed ((tick) ) or rejected as not applicable (⛔ ). No instances in countries were affected.

Report

View file
nameopenIMIS - External Penetration Test Report-1.pdf

PDF
nameopenIMIS - External Penetration Test Report-1.pdf