Web Application Report

This report includes important security information about your Web Application.

Security Report
This report was created by IBM Rational AppScan 7.9.0.3 03-02-2011 15:23:20

03-02-2011 15:23:20 © Copyright IBM Corp. 2000, 2009. All Rights Reserved.

1/13

Report Information Web Application Report Scan Name: grievance.NET Content This report contains the following sections: • • • • • Executive Summary Detailed Security Issues Remediation Tasks Application Data Application URLs 03-02-2011 15:23:20 2/13 . IIS6 Application Server ASP.nic.nic.in Operating System Win32 Web Server IIS.in-scores-L2-19-jan-2011 Scanned Host(s) Host grievance.

and to perform transactions as that user It might be possible to escalate user privileges and gain administrative permissions over the web application • Vulnerable URLs 32% of the URLs had test results that included security issues. password and credit card numbers are passed unencrypted 3/13 03-02-2011 15:23:21 . To explore which issues included these risks. Security Issue Possible Causes Following are the most common causes for the security issues found in the application. allowing the hacker to view or alter user records. machine name and/or sensitive file locations It is possible to steal or manipulate customer session and cookies. please refer to the 'Detailed Security Issues' section in this report. To explore which issues included these causes. which might be used to impersonate a legitimate user. The causes below are those that repeated in the maximal number of issues. • • • • It may be possible to steal user login information such as usernames and passwords that are sent unencrypted It is possible to gather sensitive debugging information It is possible to gather sensitive information about the web application such as usernames. Vulnerable URLs (32%) Not vulnerable URLs (68%) Scanned URLs 102 URLs were scanned by AppScan. • Insecure web application programming or configuration • Sensitive input fields such as usernames. passwords. please refer to the 'Detailed Security Issues' section in this report.Executive Summary Test Policy • Application-Only Security Risks Following are the security risks that appeared most often in the application.

aspx (5) http://grievance.in/scores/Registration.nic.in/scores/ (7) http://grievance. which may contain sensitive debugging information.aspx (5) http://grievance.in/ Total High 7 7 Medium 0 0 Low 18 18 Informational 4 4 Total 29 29 03-02-2011 15:23:21 4/13 .in/scores/Default.in/scores/SebiContents.in/scores/WaitFormNetUsers.aspx (3) Security Issues per Host Hosts http://grievance.nic.nic.nic.aspx (6) http://grievance.• • • Proper bounds checking were not performed on incoming parameter values No validation was done in order to make sure that user input matches the data type expected Exceptions and error messages. are presented to users URLs with the Most Security Issues (number issues) • • • • • http://grievance.nic.nic.

distributed by Threat Class. Authentication: Brute Force Authentication: Insufficient Authentication Authorization: Credential/Session Prediction Authorization: Insufficient Authorization Authorization: Insufficient Session Expiration Authorization: Session Fixation Client-side Attacks: Content Spoofing Client-side Attacks: Cross-site Scripting Command Execution: Buffer Overflow Command Execution: Format String Attack Command Execution: LDAP Injection Command Execution: OS Commanding Command Execution: SQL Injection Command Execution: SSI Injection Command Execution: XPath Injection Information Disclosure: Directory Indexing Information Disclosure: Information Leakage Information Disclosure: Path Traversal Information Disclosure: Predictable Resource Location Logical Attacks: Abuse of Functionality Logical Attacks: Denial of Service Application Privacy Tests Application Quality Tests 0 1 2 3 4 5 6 7 8 03-02-2011 15:23:21 5/13 .Security Issue Distribution per Threat Class The following is a list of the security issues.

Application-related Security Issues can usually be fixed by application developers. 0% Infrastructure and Platform Security Issues (0 out of a total 29 issues). 03-02-2011 15:23:21 6/13 .Security Issue Cause Distribution 100% Application-related Security Issues (29 out of a total of 29 issues). Infrastructure and Platform Security Issues can usually be fixed by system and network administrators as these security issues result from misconfiguration of. as they result from defects in the application code. or defects in 3rd party products.

Do not output debugging error messages and exceptions Variant 1 of 32 [ID=11039] The following changes were applied to the original request: • Cleared the value of parameter 'ctl00$SebiCPH$Registration1$DDLState' Validation In Response: • HTTP/1.1 500 Internal Server Error 03-02-2011 15:23:21 7/13 .NET_SessionId' Validation In Response: N/A Reasoning: This test consists of four requests: valid login.in/scores/ Total of 1 security issues in this URL [1 of 1] Authentication Bypass Using SQL Injection Severity: Test Type: Vulnerable URL: Remediation Tasks: High Application http://grievance.in/scores/Registration. invalid login.aspx (Parameter = ctl00 $SebiCPH$Registration1$DDLState) Verify that parameter values are in their expected ranges and types. AppScan establishes that the SQL injection succeeded. and another invalid login. If the responses to the two invalid logins are the same. SQL attack.Detailed Security Issues Vulnerable URL: http://grievance.in/scores/Registration.in/scores/ (Parameter = ctl00$LoginC$txtpwd) Filter out hazardous characters from user input Variant 1 of 2 [ID=3892] The following changes were applied to the original request: • Removed parameter 'ctl00$LoginC$txt_hidden' • Set parameter 'ctl00$LoginC$txtpwd's value to 'A%27+OR+%277659%27%3D%277659' • Removed HTTP header 'Cookie=ASP.nic.nic.nic. and the injected SQL response looks like the first (valid) request. Vulnerable URL: http://grievance.nic.aspx Total of 1 security issues in this URL [1 of 1] Application Error Severity: Test Type: Vulnerable URL: Remediation Tasks: High Application http://grievance.

Vulnerable URL: http://grievance. indicating an undefined state that may expose sensitive information.axd Total of 1 security issues in this URL [1 of 1] Application Error Severity: Test Type: Vulnerable URL: Remediation Tasks: High Application http://grievance. indicating an undefined state that may expose sensitive information.aspx (Parameter = tested) Verify that parameter values are in their expected ranges and types.nic.nic.aspx Total of 2 security issues in this URL [1 of 2] Application Error Severity: Test Type: Vulnerable URL: Remediation Tasks: High Application http://grievance. 03-02-2011 15:23:21 8/13 .in/scores/ScriptResource.Reasoning: The application has responded with an error message. Do not output debugging error messages and exceptions Variant 1 of 9 [ID=25305] The following changes were applied to the original request: • Cleared the value of parameter 'tested' Validation In Response: • HTTP/1. Vulnerable URL: http://grievance.axd (Parameter = d) Verify that parameter values are in their expected ranges and types.in/scores/ScriptResource.in/scores/WaitFormNetUsers. Do not output debugging error messages and exceptions Variant 1 of 18 [ID=1298] The following changes were applied to the original request: • Cleared the value of parameter 'd' Validation In Response: • <span><H1>Server Error in '/scores' Application.1 500 Internal Server Error Reasoning: The application has responded with an error message.in/scores/WaitFormNetUsers. indicating an undefined state that may expose sensitive information.nic.nic.<hr width=100% size=1 Server color=silver></H1> Reasoning: The application has responded with an error message.

nic.in/scores/imgnew.axd (Parameter = d) Verify that parameter values are in their expected ranges and types.[2 of 2] Application Error Severity: Test Type: Vulnerable URL: Remediation Tasks: High Application http://grievance. Vulnerable URL: http://grievance.in/scores/WaitFormNetUsers. Vulnerable URL: http://grievance.nic.nic.in/scores/WebResource.aspx Total of 1 security issues in this URL 03-02-2011 15:23:22 9/13 .<hr width=100% size=1 Server color=silver></H1> Reasoning: The application has responded with an error message.axd Total of 1 security issues in this URL [1 of 1] Application Error Severity: Test Type: Vulnerable URL: Remediation Tasks: High Application http://grievance. Do not output debugging error messages and exceptions Variant 1 of 9 [ID=25152] The following changes were applied to the original request: • Cleared the value of parameter 'CSession' Validation In Response: • HTTP/1. Do not output debugging error messages and exceptions Variant 1 of 18 [ID=987] The following changes were applied to the original request: • Cleared the value of parameter 'd' Validation In Response: • <span><H1>Server Error in '/scores' Application.aspx (Parameter = CSession) Verify that parameter values are in their expected ranges and types.nic.1 500 Internal Server Error Reasoning: The application has responded with an error message.in/scores/WebResource. indicating an undefined state that may expose sensitive information. indicating an undefined state that may expose sensitive information.

in/scores/imgnew.1 500 Internal Server Error Reasoning: The application has responded with an error message. Test Screenshot: 03-02-2011 15:23:22 10/13 .nic. Do not output debugging error messages and exceptions Variant 1 of 18 [ID=2948] The following changes were applied to the original request: • Cleared the value of parameter 'CaptchaText' Validation In Response: • HTTP/1.aspx (Parameter = CaptchaText) Verify that parameter values are in their expected ranges and types.[1 of 1] Application Error Severity: Test Type: Vulnerable URL: Remediation Tasks: High Application http://grievance. indicating an undefined state that may expose sensitive information.

in/scores/Registration.nic.nic.aspx (1) Verify that parameter values are in their expected ranges and types.aspx (1) Authentication Bypass Using SQL Injection Verify that parameter values are in their expected ranges and types.nic.nic. Do not output debugging error messages and exceptions (High) Parameter: d Application Error 03-02-2011 15:23:22 11/13 .in/scores/ScriptResource.axd (1) Application Error Verify that parameter values are in their expected ranges and types.axd (1) Application Error Verify that parameter values are in their expected ranges and types. Do not output debugging error messages and exceptions (High) Parameter: ctl00$SebiCPH$Registration1 $DDLState http://grievance. Do not output debugging error messages and exceptions (High) Parameter: CSession Parameter: tested http://grievance.in/scores/ (1) Filter out hazardous characters from user input (High) Parameter: ctl00$LoginC$txtpwd http://grievance.in/scores/WebResource.in/scores/WaitFormNetUsers. Do not output debugging error messages and exceptions (High) Parameter: d Application Error http://grievance.Remediation Tasks Addressed Remediation Tasks Addressed Security Issues http://grievance.nic.

Do not output debugging error messages and exceptions (High) Parameter: CaptchaText Application Error 03-02-2011 15:23:22 12/13 .http://grievance.in/scores/imgnew.nic.aspx (1) Verify that parameter values are in their expected ranges and types.

in/scores/Registration.nic.js http://grievance.in/scores/WaitFormNetUsers.js http://grievance.in/App_Themes/T2/ http://grievance.aspx http://grievance.nic.nic.in/scores/JS/ajxcompat.nic.nic.nic.nic.Application Data Application URLs • • • • • • • • • • • • • • • • • • • • • • • • • http://grievance.nic.in/scores/JS/md5.js http://grievance.nic.axd http://grievance.in/scores/ http://grievance.in/scores/App_Themes/T2/ http://grievance.nic.nic.in/scores/App_Themes/T2/img/ 03-02-2011 15:23:22 13/13 .aspx http://grievance.in/scores/JS/jquery.in/scores/App_Themes/ http://grievance.in/scores/SebiContents.nic.aspx http://grievance.in/ http://grievance.aspx http://grievance.in/scores/imgnew.nic.min.in/JS/ http://grievance.aspx http://grievance.nic.in/scores/ScriptResource.aspx http://grievance.nic.in/scores/Default.in/scores/JS/Print.nic.nic.in/scores/LetterDetails.nic.in/scores/logout.nic.axd http://grievance.nic.in/scores/JS/ http://grievance.in/scores/WebResource.nic.aspx http://grievance.js http://grievance.aspx http://grievance.nic.nic.in/App_Themes/ http://grievance.in/scores/LogoutProcess.in/scores http://grievance.in/scores/JS/jscheck.nic.js http://grievance.tools.nic.

Sign up to vote on this title
UsefulNot useful