Security Test Report
Overview
Timeline
Setup detail
Web application details
API Details
Summary of the findings by severity
Severity
Count
Detailed Findings
Scenario 1
Current Status
Severity
Risk
Scenario 2
Current Status
Severity
Risk
Scenario 3
Current Status
Severity
Risk
Description
Session was not getting invalidated after logout
Scenario 4
Current Status
Severity
Risk
Description
Attacker can bypass authentication using SQL injection or LDAP injection. Sometimes due to insufficient data sanitation and testing, attackers can break in. This has a very high security risk.
Scenario 5
Current Status
Severity
Risk
Description
An attacker can monitor the request and response and change the request parameters. If an attacker uses certain proxy tools, he/she will be able to monitor the requests and responses of certain users in the network.
Scenario 6
Current Status
Severity
Risk
Description
An attacker can overload the system by sending thousands of requests
Scenario 7
Current Status
Severity
Risk
Description
An attacker can try a dictionary attack or a brute force method to get the userId and password.
Scenario 8
Current Status
Severity
Risk
Description
An attacker can put XSS scripts that will be executed on victims browser
Scenario 9
Current Status
Severity
Risk
Description
An attacker can try to upload malicious files
Scenario 10
Current Status
Severity
Risk
Description
Attackers can try Null Byte upload or try to change the file extension.
Scenario 11
Current Status
Severity
Risk
Description
An attacker can try to attempt to upload oversized files to cause buffer overload.
Scenario 12
Current Status
Severity
Risk
Description
An attackers can try different methods to expose the used server name and version. It is otherwise known as banner grabbing.
Scenario 13
Current Status
Severity
Risk
Description
Attackers can try path traversal/Directory Traversal attacks.
Scenario 14
Current Status
Severity
Risk
Description
Attackers can try CSRF attacks
Scenario 15
Current Status
Severity
Risk
Description
Attackers can try CORS attacks
Scenario 16
Current Status
Severity
Risk
Description
Attackers can try header manipulation attacks
Scenario 17
Current Status
Severity
Risk
Description
An attacker with access to admin UI can try to upload incorrect certificates.
Scenario 18
Current Status
Severity
Risk
Description
Attackers can try request smuggling attacks.
Scenario 19
Current Status
Severity
Risk
Description
Attackers can try XXE injection attacks
Scenario 20
Current Status
Severity
Risk
Description
Attackers can try to spoof /change biometric data or confidential data
Scenario 21
Current Status
Severity
Risk
Description
An attacker can try double host header attacks
Scenario 22
Current Status
Severity
Risk
Description
Attackers can try to use other user’s PRID to get their PII data(IDOR)
Scenario 23
Current Status
Severity
Risk
Description
An attacker can try privilege escalation attacks.
Scenario 24
Current Status
Severity
Risk
Description
Absence of x-content –type header
Scenario 25
Current Status
Severity
Risk
Description
Weak ciphers can be decrypted and used for data stealing
Scenario 26
Current Status
Severity
Risk
Description
Without a CSP(content security Policy) a program is never very secure
Scenario 27
Current Status
Severity
Risk
Description
The pre-registration zip file might cause buffer overload
Last updated
Was this helpful?