Website Vulnerability Scanner Report (Light)
Website Vulnerability Scanner Report (Light)
Website fingerprinting
SQL injection
Cross-Site Scripting
https://berita.kedirikab.go.id
Summary
Ov erall risk lev el: Risk rat ings: Scan informat ion:
M edium High: 0 Start time: 2020-12-10 11:59:00 UTC+02
Medium: 1 Finish time: 2020-12-10 11:59:34 UTC+02
Low: 2 Scan duration: 34 sec
Findings
ci_session Secure
Details
Ris k de s c ription:
Since the Secure flag is not set on the cookie, the browser will send it over an unencrypted channel (plain HTTP) if such a request is made.
Thus, the risk exists that an attacker will intercept the clear-text communication between the browser and the server and he will steal the cookie
of the user. If this is a session cookie, the attacker could gain unauthorized access to the victim's web session.
1/4
Server software and technology found
Details
Ris k de s c ription:
An attacker could use this information to mount specific attacks against the identified software type and version.
S c re e ns hot:
2/4
Details
Ris k de s c ription:
Because the X-Frame-Options header is not sent by the server, an attacker could embed this website into an iframe of a third party website. By
manipulating the display attributes of the iframe, the attacker could trick the user into performing mouse clicks in the application, thus
performing activities without user's consent (ex: delete user, subscribe to newsletter, etc). This is called a Clickjacking attack and it is described
in detail here:
https://owasp.org/www-community/attacks/Clickjacking
The X-XSS-Protection HTTP header instructs the browser to stop loading web pages when they detect reflected Cross-Site Scripting (XSS)
attacks. Lack of this header exposes application users to XSS attacks in case the web application contains such vulnerability.
The HTTP Strict-Transport-Security header instructs the browser not to load the website via plain HTTP connection but always use HTTPS. Lack of
this header exposes the application users to the risk of data theft or unauthorized modification in case the attacker implements a man-in-the-
middle attack and intercepts the communication between the user and the server.
The HTTP X-Content-Type-Options header is addressed to Internet Explorer browser and prevents it from reinterpreting the content of a web
page (MIME-sniffing) and thus overriding the value of the Content-Type header). Lack of this header could lead to attacks such as Cross-Site
Scripting or phishing.
Communication is secure
3/4
Checking robots.txt file...
Checking client access policies...
Checking for directory listing (quick scan)...
Checking for password auto-complete (quick scan)...
Checking for clear-text submission of passwords (quick scan)...
Scan parameters
Website URL: https://berita.kedirikab.go.id
Scan type: Light
Authentication: False
4/4