2022-09 Penetration Test
Content
Overview
Date | 2022-09-14 |
---|---|
Status | FIXED |
Release | |
TestType | automatic |
TestTopic | Penetration Test |
Context | |
Tester | |
Standard |
Result Summary
Vulnerabilities
Risk | Count |
---|---|
Critical | 0 |
High | 1 |
Medium | 0 |
Low | 3 |
OWASP Top 10
A01 | YES | |
---|---|---|
A02 | NO | |
A03 | NO | |
A04 | YES | |
A05 | YES | |
A06 | NO | |
A07 | NO | |
A08 | NO | |
A09 | NO | |
A10 | NO |
Methodology
SecurityONE based the findings and recommendations presented in this report on manual and automatic web application vulnerability scanning and penetration testing against the web application.
Automatic web application scanning:
SecurityONE has used several commercial tools to analyze the target environment and identify potential vulnerabilities. Automatic scanning software identifies application-level vulnerabilities.Web application manual testing:
Using the information generated by the automated testing software, SecurityONE also used manual testing techniques to identify and try to exploit additional vulnerabilities in the targeted application and to eliminate false positives caused by the automated scanning process. The assessment was conducted in accordance with best practices in the industry, defined by such methodologies as ISECOM's Open-Source Security Testing Methodology Manual (OSSTMM) and the Open Web Application Security Project (OWASP).
Detailed Results
Vulnerability | Risk | Impact | Status |
---|---|---|---|
Broken Authorization | High | This allows a low privilege attacker to perform actions that a higher privilege user would normally have access to. |
|
Default Passwords Hardcoded | Low | In a default implementation of an openIMIS environment, an attacker with access with these passwords can potentially access confidential information. |
|
GraphQL introspection enabled | Low | An attacker can map out the API’s schema and gather information related to its configuration. This could lead to further attacks and potential loss of sensitive information. |
|
Cookie Without SECURE flag | Low | To exploit this vulnerability, an attacker must be suitably positioned to eavesdrop on the victim's network traffic. Note that an advanced adversary could potentially target any connection made over the Internet's core infrastructure. |
|
Remediation
All errors were fixed ( ) or rejected as not applicable ( ). No instances in countries were affected.
Report
Did you encounter a problem or do you have a suggestion?
Please contact our Service Desk
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. https://creativecommons.org/licenses/by-sa/4.0/