Professional Documents
Culture Documents
VERSION 1.0
Blue Team GNU assessed and reviewed The Business Value of Data Platform application at
ICT from an application security perspective. The primary objective of this assessment was to
determine vulnerabilities in the application weighted by risk.
As a result, the primary focus of the assessment was on detection of both technical as well as
logical types of
issues which may pose high risk to the application.
Because of risks associated with these findings, Blue Team GNU recommends that the
vulnerabilities be fixed across the entire application.
Although Blue Team GNU makes every effort to identify as many vulnerabilities and
weaknesses accurately as possible, because of time-limited testing and nature of security
assessments, it is possible that not all vulnerabilities, weaknesses or instances are identified. As
a result, it is strongly recommended that the development team look at the findings to
understand root cause and apply proper fixes across the entire application consistently. The
development team should also continue best practices of secure software development by
implementing security controls across the entire application.
Finding#1
Step 4 - Note that Burp Collaborator received request from the server
Finding#2
Name:- Brute Force Attack - Xmlrpc
Exploitability:- Easy
Target:-xmlrpc
Finding:-A brute force attack is a hacking method that uses trial and error to crack passwords,
login credentials, and encryption keys. It is a simple yet reliable tactic for gaining unauthorized
access to individual accounts and organizations’ systems and networks.
Risk:-The hacker tries multiple usernames and passwords, often using a computer to test a wide
range of combinations, until they find the correct login information.
Step 1:- look for “wp.getUserBlogs” method using xmlrpc and craft the request as follows
Findings#3
Name:-Cross-Site Scripting
Severity:-High
Exploitability:-Easy
Target:- Multiple
Finding:- Because of lack of proper encoding of output data/values, XSS attack is possible. This
can lead to numerous client-side attacks including attempts to hijack session or steal sensitive
client-side data.
Risk:- Attacker can exploit XSS vulnerability by injecting client-side script in order to launch
numerous client-side attacks and also attempt to hijack session or steal sensitive client-side
data if such information is accessible from client-side script.
Step 1 - Break the context for reflected input in response and craft the malicious request as
follows
Finding#4
Step 1 - Login with valid credentials and add points for discount on product
Step 2 - Note the value of parameter of “wps-cart-points”..
Finding#6