Jump to content

Recommended Posts

I have been working on this site for my neighbors lacrosse camp and have gotten this far.  I need to check for any security holes before I go any further.

 

I'm sure there will be alot, and might need help figuring out how to fix them.

 

http://www.skiingguru1611.com

 

**Right now I'm hosting the site under my personal domain name**

Vulnerability description

PHPinfo page has been found on this directory. The PHPinfo page outputs a large amount of information about the current state of PHP. This includes information about PHP compilation options and extensions, the PHP version, server information and environment (if compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options, HTTP headers, and the PHP License.

This vulnerability affects /phpinfo.php.

The impact of this vulnerability

This file may expose sensitive information that may help an malicious user to prepare more advanced attacks.

 

How to fix this vulnerability

Remove the file from production systems.

Vulnerability description

HTTP TRACE method is enabled on this web server. In the presence of other cross-domain vulnerabilities in web browsers, sensitive header information could be read from any domains that support the HTTP TRACE method.

This vulnerability affects Web Server.

The impact of this vulnerability

Attackers may abuse HTTP TRACE functionality to gain access to information in HTTP headers such as cookies and authentication data.

 

How to fix this vulnerability

Disable TRACE Method on the web server

 

Vulnerability description

Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are found in the file. In some cases this may generate false positives.

This vulnerability affects /.

The impact of this vulnerability

An attacker can gather sensitive information (database connection strings, application logic) by analysing the source code. This information can be used to conduct further attacks.

 

Attack details

We found

<?php include("../calendar/minical.php"); ?>

How to fix this vulnerability

Remove this file from your website or change permissions in order to remove access.

 

Vulnerability description

One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet looking for email addresses on any website they come across. Spambot programs look for strings like myname@mydomain.com and then record any addresses found.

This vulnerability affects /contact.html.

The impact of this vulnerability

Email addresses posted on Web sites may attract spam.

Attack details

We found

aalaxcamp@twcny.rr.com

 

How to fix this vulnerability

http://evolt.org/article/Spam_Proofing_Your_Website/20/41849/

Vulnerability description

By this form input is possible to upload a file to the server.

This vulnerability affects /webmail/themes/clean/upload.php

/webmail/themes/express/upload.php.

/webmail/themes/senti/upload.php.

The impact of this vulnerability

User may upload malicious files to server.

How to fix this vulnerability

Check if the script inputs are properly validated.

 

Instead of having a link to email you, how about just telling them your address like

&#97;&#97;&#108;&#97;&#120;&#99;&#97;&#109;&#112;&#64;&#116;&#119;&#99;&#110;&#121;&#46;&#114;&#114;&#46;&#99;&#111;&#109;

Which will come out as an email address and is hard for email collector bots to find.

 

Not really security, but would be useful.

 

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.