Jump to content

Test This Site


magebash

Recommended Posts

I am currently hosting this site on a free server until I get all the bugs out so I know it will be secure on a paid one.  Could you please help me find some vulnerabilities and inform me about them.  I know there are many still.  Thanks.  Here is the link:  Click Here

 

Username: demo

Password: demo

Link to comment
Share on other sites

  • Replies 86
  • Created
  • Last Reply

Top Posters In This Topic

I added a link <a href='javascript:alert(document.cookie);'>Click here</a> and when I clicked it, it gave me all sorts of neat information. With that knowledge, a hacker could do all sorts of mean things. Filter out javascript in links(and for that matter, in all posted data).

 

 

Also, is there a way to edit my post?

Link to comment
Share on other sites

Vulnerability description

By this form input is possible to upload a file to the server.

This vulnerability affects /.

The impact of this vulnerability

User may upload malicious files to server.

 

How to fix this vulnerability

Check if the script inputs are properly validated.

 

Password type input with autocomplete enabled

The impact of this vulnerability

Possible sensitive information disclosure

 

How to fix this vulnerability

The password autocomplete should be disabled in sensitive applications.

To disable autocomplete, you may use a code similar to:

<INPUT TYPE="password" AUTOCOMPLETE="off">

 

User credentials are sent in clear text

The impact of this vulnerability

A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection.

How to fix this vulnerability

Because user credentials usually are considered sensitive information, it is recommended to be sent to the server over an encrypted connection.

 

 

 

Link to comment
Share on other sites

Cross Site Scripting

 

The impact of this vulnerability

Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser.

 

Attack details

The GET variable dest has been set to >"><ScRiPt%20%0a%0d>alert(44514.6172421643)%3B</ScRiPt>.

 

 

How to fix this vulnerability

Your script should filter metacharacters from user input

 

Link to comment
Share on other sites


×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.