0% found this document useful (0 votes)
101 views4 pages

Website Vulnerability Scanner Report (Light)

The website vulnerability scanner report found medium overall risk with 1 medium and 2 low risks. Specifically, it found insecure HTTP cookies that were missing the secure flag, revealing server software and technology information, and missing HTTP security headers that could enable clickjacking and cross-site scripting attacks. The report provides details and recommendations to address each issue.

Uploaded by

MasBa Nice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views4 pages

Website Vulnerability Scanner Report (Light)

The website vulnerability scanner report found medium overall risk with 1 medium and 2 low risks. Specifically, it found insecure HTTP cookies that were missing the secure flag, revealing server software and technology information, and missing HTTP security headers that could enable clickjacking and cross-site scripting attacks. The report provides details and recommendations to address each issue.

Uploaded by

MasBa Nice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Website Vulnerability Scanner Report (Light)

Get a PRO Account to unlock the FULL capabilities of this scanner

See wh at th e FULL scan n er can d o

Perform in-depth website scanning and discover high risk vulnerabilities.

Testi n g areas Li gh t scan Fu l l scan

Website fingerprinting  

Version-based vulnerability detection  

Common configuration issues  

SQL injection  

Cross-Site Scripting  

Local/Remote File Inclusion  

Remote command execution  


Discovery of sensitive files  

 https://berita.kedirikab.go.id

Summary

Ov erall risk lev el: Risk rat ings: Scan informat ion:
M edium High: 0 Start time: 2020-12-10 11:59:00 UTC+02
Medium: 1 Finish time: 2020-12-10 11:59:34 UTC+02
Low: 2 Scan duration: 34 sec

Info: 7 Tests performed: 10/10

Scan status: Finished

Findings

 Insecure HTTP cookies


C ookie Na me Fla g s mis s ing

ci_session Secure

 Details

Ris k de s c ription:
Since the Secure flag is not set on the cookie, the browser will send it over an unencrypted channel (plain HTTP) if such a request is made.
Thus, the risk exists that an attacker will intercept the clear-text communication between the browser and the server and he will steal the cookie
of the user. If this is a session cookie, the attacker could gain unauthorized access to the victim's web session.

Re c omme nda tion:


We recommend reconfiguring the web server in order to set the flag(s) Secure to all sensitive cookies.

More information about this issue:


https://blog.dareboost.com/en/2016/12/secure-cookies-secure-httponly-flags/.

1/4
 Server software and technology found

S oftwa re / Ve rs ion C a te g ory

Nginx Web Servers

CodeIgniter Web Frameworks

Plesk Hosting Panels

Font Awesome Font Scripts

Lightbox JavaScript Frameworks

YouTube Video Players

jQuery 3.2.1 JavaScript Frameworks

 Details

Ris k de s c ription:
An attacker could use this information to mount specific attacks against the identified software type and version.

Re c omme nda tion:


We recommend you to eliminate the information which permit the identification of software platform, technology, server and operating system:
HTTP server headers, HTML meta information, etc.

More information about this issue:


https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/01-Information_Gathering/02-
Fingerprint_Web_Server.html.

S c re e ns hot:

 Missing HTTP security headers


H T T P S e c urity H e a de r H e a de r Role S ta tus

X-Frame-Options Protects against Clickjacking attacks Not set

X-XSS-Protection Mitigates Cross-Site Scripting (XSS) attacks Not set

Strict-Transport-Security Protects against man-in-the-middle attacks Not set

X-Content-Type-Options Prevents possible phishing or XSS attacks Not set

2/4
 Details

Ris k de s c ription:
Because the X-Frame-Options header is not sent by the server, an attacker could embed this website into an iframe of a third party website. By
manipulating the display attributes of the iframe, the attacker could trick the user into performing mouse clicks in the application, thus
performing activities without user's consent (ex: delete user, subscribe to newsletter, etc). This is called a Clickjacking attack and it is described
in detail here:
https://owasp.org/www-community/attacks/Clickjacking

The X-XSS-Protection HTTP header instructs the browser to stop loading web pages when they detect reflected Cross-Site Scripting (XSS)
attacks. Lack of this header exposes application users to XSS attacks in case the web application contains such vulnerability.

The HTTP Strict-Transport-Security header instructs the browser not to load the website via plain HTTP connection but always use HTTPS. Lack of
this header exposes the application users to the risk of data theft or unauthorized modification in case the attacker implements a man-in-the-
middle attack and intercepts the communication between the user and the server.

The HTTP X-Content-Type-Options header is addressed to Internet Explorer browser and prevents it from reinterpreting the content of a web
page (MIME-sniffing) and thus overriding the value of the Content-Type header). Lack of this header could lead to attacks such as Cross-Site
Scripting or phishing.

Re c omme nda tion:


We recommend you to add the X-Frame-Options HTTP response header to every page that you want to be protected against Clickjacking
attacks.
More information about this issue:
https://cheatsheetseries.owasp.org/cheatsheets/Clickjacking_Defense_Cheat_Sheet.html

We recommend setting the X-XSS-Protection header to "X-XSS-Protection: 1; mode=block".


More information about this issue:
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection

We recommend setting the Strict-Transport-Security header.


More information about this issue:
https://www.owasp.org/index.php/HTTP_Strict_Transport_Security_Cheat_Sheet

We recommend setting the X-Content-Type-Options header to "X-Content-Type-Options: nosniff".


More information about this issue:
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options

 No vulnerabilities found for server-side software

 Communication is secure

 Robots.txt file not found

 No security issue found regarding client access policies

 Directory listing not found (quick scan)

 No password input found (auto-complete test)

 No password input found (clear-text submission test)

Scan coverage information

List of tests performed (10/ 10)


 Fingerprinting the server software and technology...
 Checking for vulnerabilities of server-side software...
 Analyzing the security of HTTP cookies...
 Analyzing HTTP security headers...
 Checking for secure communication...

3/4
 Checking robots.txt file...
 Checking client access policies...
 Checking for directory listing (quick scan)...
 Checking for password auto-complete (quick scan)...
 Checking for clear-text submission of passwords (quick scan)...

Scan parameters
Website URL: https://berita.kedirikab.go.id
Scan type: Light
Authentication: False

4/4

You might also like