Risk | Count |
---|---|
High | 12 |
Medium | 28 |
Low | 2 |
Warning | 0 |
Information | 0 |
Total | 42 |
No | Vulnerability Name | Risk | Severity | Cvss score | Occurrences |
---|---|---|---|---|---|
1 | Insecure communication | High | High | 8.1 | 9 |
2 | Directory traversal | High | High | 7.5 | 3 |
3 | Verb tampering | Medium | Medium | 6.4 | 9 |
4 | Weak password policy | Medium | Medium | 5.6 | 1 |
5 | Sensitive information disclosure in response headers | Medium | Medium | 5.0 | 10 |
6 | Missing httponly flag in the set-cookie | Medium | Medium | 5.0 | 2 |
7 | Missing security headers - X-Content-Type-Options | Medium | Medium | 5.0 | 2 |
8 | Missing security headers - X-Frame-Options | Medium | Medium | 5.0 | 2 |
9 | Technical information exposure on the webpage | Low | Low | 3.1 | 2 |
10 | Autocomplete on password fields | Medium | Medium | 4.3 | 1 |
11 | Autocomplete on sensitive fields | Medium | Medium | 4.3 | 1 |
Risk | High |
Severity | High |
CVSS Score | 8.1 |
Occurrences | 9 |
Details | Yaazhini detected insecure communication vulnerability. Insecure communications are when a client and server communicate over a non-secure (unencrypted) channel. Without encrypting the channel, the developer can’t guarantee the integrity of the data. |
Remediation | Make sure all client-to-server connections are encrypted with SSL. |
URL: | |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/index.php Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:11:39 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 5278 keep-alive: timeout=5, max=100 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |
URL: | |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/xss_r/ Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:12:09 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 5157 keep-alive: timeout=5, max=100 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |
URL: | |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/sqli/ Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:11:42 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 4310 keep-alive: timeout=5, max=99 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |
URL: | |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:11:10 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=duhpjesrk9drkdvvg02cnn5alv; path=/,PHPSESSID=duhpjesrk9drkdvvg02cnn5alv; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=100 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |
URL: | |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/sqli/ Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:11:55 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 5337 keep-alive: timeout=5, max=100 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |
URL: | |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://192.168.56.1/dvwa/login.php Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:11:30 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 7510 keep-alive: timeout=5, max=99 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |
URL: | |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:12:01 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 5137 keep-alive: timeout=5, max=100 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |
URL: | |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/xss_r/?name=abc Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:12:15 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 4966 keep-alive: timeout=5, max=100 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |
URL: | |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: POST User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded Origin: http://192.168.56.1 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/exec/ Upgrade-Insecure-Requests: 1 ip=127.0.0.1&Submit=Submit |
date: Fri, 16 Jul 2021 11:12:26 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 5395 keep-alive: timeout=5, max=100 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |
Risk | High |
Severity | High |
CVSS Score | 7.5 |
Occurrences | 3 |
Details | Yaazhini detected the directory traversal in the application. A directory traversal attack aims to access files and directories stored outside the webroot folder. By manipulating the URL path with 'dot-dot-slash (../)' sequences and its variations by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code or configuration and critical system files. |
Remediation | Disable directory traversal. |
URL: | http://192.168.56.1/dvwa/dvwa/ |
Occurrences in this URL: | 1 |
Request | Response | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: */* Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/exec/ |
date: Fri, 16 Jul 2021 11:13:59 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 content-length: 1618 keep-alive: timeout=5, max=90 connection: Keep-Alive content-type: text/html;charset=UTF-8 status code: 200
|
URL: | http://192.168.56.1/dvwa/vulnerabilities/ |
Occurrences in this URL: | 1 |
Request | Response | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/index.php Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:14:00 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 content-length: 3967 keep-alive: timeout=5, max=64 connection: Keep-Alive content-type: text/html;charset=UTF-8 status code: 200
|
URL: | http://192.168.56.1/dvwa/dvwa/images/ |
Occurrences in this URL: | 1 |
Request | Response | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: image/webp,*/* Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/exec/ |
date: Fri, 16 Jul 2021 11:12:40 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 content-length: 2300 keep-alive: timeout=5, max=75 connection: Keep-Alive content-type: text/html;charset=UTF-8 status code: 200
|
Risk | Medium |
Severity | Medium |
CVSS Score | 6.4 |
Occurrences | 9 |
Details | Yaazhini detected verb tampering vulnerability. The HTTP includes many request methods other than the standard GET, POST, PUT and PATCH requests. A web server may respond to these alternative methods and return some data. Sometimes it may reveal some fruitful information to the attacker. |
Remediation |
URL: | http://192.168.56.1/dvwa/vulnerabilities/sqli/ |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: TRACE User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/index.php Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:58 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 keep-alive: timeout=5, max=100 connection: Keep-Alive transfer-encoding: chunked content-type: message/http status code: 200 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/xss_r/?name=abc |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: TRACE User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/xss_r/ Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:58 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 keep-alive: timeout=5, max=93 connection: Keep-Alive transfer-encoding: chunked content-type: message/http status code: 200 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/weak_id/ |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: TRACE User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/sqli/ Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:59 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 keep-alive: timeout=5, max=91 connection: Keep-Alive transfer-encoding: chunked content-type: message/http status code: 200 |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: TRACE User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:59 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 keep-alive: timeout=5, max=83 connection: Keep-Alive transfer-encoding: chunked content-type: message/http status code: 200 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: TRACE User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/sqli/ Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:59 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 keep-alive: timeout=5, max=82 connection: Keep-Alive transfer-encoding: chunked content-type: message/http status code: 200 |
URL: | http://192.168.56.1/dvwa/index.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: TRACE User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://192.168.56.1/dvwa/login.php Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:58 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 keep-alive: timeout=5, max=100 connection: Keep-Alive transfer-encoding: chunked content-type: message/http status code: 200 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/xss_r/ |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: TRACE User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:58 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 keep-alive: timeout=5, max=93 connection: Keep-Alive transfer-encoding: chunked content-type: message/http status code: 200 |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded Origin: http://192.168.56.1 Connection: keep-alive Referer: http://192.168.56.1/dvwa/login.php Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:58 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=9loh2v2l7h8ffuso7nh6f1oldc; path=/,PHPSESSID=9loh2v2l7h8ffuso7nh6f1oldc; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=96 connection: Keep-Alive content-type: text/html;charset=utf-8 status code: 200 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/exec/ |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: TRACE User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/xss_r/?name=abc Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:59 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 keep-alive: timeout=5, max=89 connection: Keep-Alive transfer-encoding: chunked content-type: message/http status code: 200 |
Risk | Medium |
Severity | Medium |
CVSS Score | 5.6 |
Occurrences | 1 |
Details | Yaazhini detected the weak password policy in the application. A weak password policy leaves the application open to the dictionary and brute force attack against the user account. The attacker can take over the user account if he guesses or determines a weak password. |
Remediation | Implement a strong password policy that includes the following:
|
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: POST User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded Origin: http://192.168.56.1 Connection: keep-alive Referer: http://192.168.56.1/dvwa/login.php Upgrade-Insecure-Requests: 1 Login=Login&password= |
cache-control: no-store, no-cache, must-revalidate connection: Keep-Alive content-length: 0 content-type: text/html; charset=UTF-8 date: Fri, 16 Jul 2021 11:11:29 GMT expires: Thu, 19 Nov 1981 08:52:00 GMT keep-alive: timeout=5, max=100 location: index.php pragma: no-cache server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 Cache-Control: no-cache status code: 302 |
Risk | Medium |
Severity | Medium |
CVSS Score | 5.0 |
Occurrences | 10 |
Details | Yaazhini detected sensitive information disclosure in response headers. Information gathering is a type of attack during which the attackers send requests to the server to gather more information. If the server is not configured correctly, it may leak information about itself, such as the server version, PHP/ASP.NET version, OpenSSH version. These issues are not exploitable in most cases but are considered web application security issues because they allow attackers to gather the information that can be used later in the attack lifecycle. |
Remediation | 1.     X-Powered-By header is visible to client 2.     Server header is visible to client |
URL: | http://192.168.56.1/dvwa/vulnerabilities/sqli/ |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/index.php Upgrade-Insecure-Requests: 1 |
cache-control: no-store, no-cache, must-revalidate connection: Keep-Alive content-length: 0 content-type: text/html; charset=UTF-8 date: Fri, 16 Jul 2021 11:13:59 GMT expires: Thu, 19 Nov 1981 08:52:00 GMT keep-alive: timeout=5, max=70 location: ../../login.php pragma: no-cache server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 status code: 302 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/xss_r/?name=abc |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/xss_r/ Upgrade-Insecure-Requests: 1 |
cache-control: no-store, no-cache, must-revalidate connection: Keep-Alive content-length: 0 content-type: text/html; charset=UTF-8 date: Fri, 16 Jul 2021 11:14:00 GMT expires: Thu, 19 Nov 1981 08:52:00 GMT keep-alive: timeout=5, max=60 location: ../../login.php pragma: no-cache server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 status code: 302 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/weak_id/ |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/sqli/ Upgrade-Insecure-Requests: 1 |
cache-control: no-store, no-cache, must-revalidate connection: Keep-Alive content-length: 0 content-type: text/html; charset=UTF-8 date: Fri, 16 Jul 2021 11:14:00 GMT expires: Thu, 19 Nov 1981 08:52:00 GMT keep-alive: timeout=5, max=86 location: ../../login.php pragma: no-cache server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 status code: 302 |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:14:00 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=92k9ptt9vond3ohht17e3a3e70; path=/,PHPSESSID=92k9ptt9vond3ohht17e3a3e70; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=59 connection: Keep-Alive content-type: text/html;charset=utf-8 status code: 200 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/sqli/ Upgrade-Insecure-Requests: 1 |
cache-control: no-store, no-cache, must-revalidate connection: Keep-Alive content-length: 0 content-type: text/html; charset=UTF-8 date: Fri, 16 Jul 2021 11:14:00 GMT expires: Thu, 19 Nov 1981 08:52:00 GMT keep-alive: timeout=5, max=63 location: ../../login.php pragma: no-cache server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 status code: 302 |
URL: | http://192.168.56.1/dvwa/index.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://192.168.56.1/dvwa/login.php Connection: keep-alive Upgrade-Insecure-Requests: 1 |
cache-control: no-store, no-cache, must-revalidate connection: Keep-Alive content-length: 0 content-type: text/html; charset=UTF-8 date: Fri, 16 Jul 2021 11:13:59 GMT expires: Thu, 19 Nov 1981 08:52:00 GMT keep-alive: timeout=5, max=72 location: login.php pragma: no-cache server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 status code: 302 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/xss_r/ |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit Upgrade-Insecure-Requests: 1 |
cache-control: no-store, no-cache, must-revalidate connection: Keep-Alive content-length: 0 content-type: text/html; charset=UTF-8 date: Fri, 16 Jul 2021 11:14:00 GMT expires: Thu, 19 Nov 1981 08:52:00 GMT keep-alive: timeout=5, max=69 location: ../../login.php pragma: no-cache server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 status code: 302 |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: POST User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded Origin: http://192.168.56.1 Connection: keep-alive Referer: http://192.168.56.1/dvwa/login.php Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:14:00 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=tfhrbrpbhl749sj65a2ijk7rs4; path=/,PHPSESSID=tfhrbrpbhl749sj65a2ijk7rs4; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=66 connection: Keep-Alive content-type: text/html;charset=utf-8 status code: 200 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/exec/ |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/xss_r/?name=abc Upgrade-Insecure-Requests: 1 |
cache-control: no-store, no-cache, must-revalidate connection: Keep-Alive content-length: 0 content-type: text/html; charset=UTF-8 date: Fri, 16 Jul 2021 11:14:00 GMT expires: Thu, 19 Nov 1981 08:52:00 GMT keep-alive: timeout=5, max=66 location: ../../login.php pragma: no-cache server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 status code: 302 |
URL: | http://192.168.56.1/dvwa/vulnerabilities/exec/ |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: POST User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded Origin: http://192.168.56.1 Connection: keep-alive Referer: http://192.168.56.1/dvwa/vulnerabilities/exec/ Upgrade-Insecure-Requests: 1 |
cache-control: no-store, no-cache, must-revalidate connection: Keep-Alive content-length: 0 content-type: text/html; charset=UTF-8 date: Fri, 16 Jul 2021 11:14:00 GMT expires: Thu, 19 Nov 1981 08:52:00 GMT keep-alive: timeout=5, max=59 location: ../../login.php pragma: no-cache server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 status code: 302 |
Risk | Medium |
Severity | Medium |
CVSS Score | 5.0 |
Occurrences | 2 |
Details | HttpOnly is an additional flag included in a Set-Cookie HTTP response header. Using the HttpOnly flag when generating a cookie helps mitigate the risk of client side script accessing the protected cookie. it tells the browser that this particular cookie should only be accessed by the server. |
Remediation | Yaazhini detected the HttpOnly flag in the set-cookie response header is missing. HttpOnly flag an option that can be set by the application server when sending a new cookie to the browser within an HTTP Response. The purpose of an HttpOnly flag is to prevent the cookie from being used by the client-side script (JavaScript). |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:14:00 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=4lejptelhoanmb3u22sb0q2dt4; path=/,PHPSESSID=4lejptelhoanmb3u22sb0q2dt4; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=67 connection: Keep-Alive content-type: text/html;charset=utf-8 status code: 200 |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: POST User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded Origin: http://192.168.56.1 Connection: keep-alive Referer: http://192.168.56.1/dvwa/login.php Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:59 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=3fesvbq8nbppov0o1l5fjjcg11; path=/,PHPSESSID=3fesvbq8nbppov0o1l5fjjcg11; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=78 connection: Keep-Alive content-type: text/html;charset=utf-8 status code: 200 |
Risk | Medium |
Severity | Medium |
CVSS Score | 5.0 |
Occurrences | 2 |
Details | Yaazhini detected that 'X-Content-Type-Options' security header is missing. This issue is only applicable for hybrid apps. There are some HTTP response headers that your application can use to increase security of your application. Once set, these HTTP response headers can restrict modern browsers from running into easily preventable vulnerabilities. The 'X-Content-Type-Options' response HTTP header indicates the browser that the MIME types in the Content-Type headers should not be changed and be followed. Example: X-Content-Type-Options: nosniff If 'X-Content-Type-Options: nosniff' is specified in the response header, the browser checks the content type and blocks the request if the content type is mismatched. |
Remediation | It's recommended to implement the x-content-type-options security header.
Reference:
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options
https://www.owasp.org/index.php/OWASP_Secure_Headers_Project#xcto |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:59 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=drt2cet307brqo824liepc3ue5; path=/,PHPSESSID=drt2cet307brqo824liepc3ue5; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=71 connection: Keep-Alive content-type: text/html;charset=utf-8 status code: 200 |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: POST User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded Origin: http://192.168.56.1 Connection: keep-alive Referer: http://192.168.56.1/dvwa/login.php Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:59 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=73pon4qr2ogoetddbsa4dkvhps; path=/,PHPSESSID=73pon4qr2ogoetddbsa4dkvhps; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=79 connection: Keep-Alive content-type: text/html;charset=utf-8 status code: 200 |
Risk | Medium |
Severity | Medium |
CVSS Score | 5.0 |
Occurrences | 2 |
Details | Yaazhini detected that 'X-Frame-Options' security header is missing. This issue is only applicable for hybrid apps. There are some HTTP response headers that your application can use to increase security of your application. Once set, these HTTP response headers can restrict modern browsers from running into easily preventable vulnerabilities.
X-Frame-Options: The 'X-Frame-Options' HTTP response header can be used to indicate whether browsers should be allowed to render a page in a |
Remediation | It's recommended to implement the 'X-Frame-Options' security header with 'deny' or 'sameorigin' value.
Reference:
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
https://www.owasp.org/index.php/OWASP_Secure_Headers_Project#xcto |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:59 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=drt2cet307brqo824liepc3ue5; path=/,PHPSESSID=drt2cet307brqo824liepc3ue5; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=71 connection: Keep-Alive content-type: text/html;charset=utf-8 status code: 200 |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: POST User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded Origin: http://192.168.56.1 Connection: keep-alive Referer: http://192.168.56.1/dvwa/login.php Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:13:59 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=73pon4qr2ogoetddbsa4dkvhps; path=/,PHPSESSID=73pon4qr2ogoetddbsa4dkvhps; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=79 connection: Keep-Alive content-type: text/html;charset=utf-8 status code: 200 |
Risk | Low |
Severity | Low |
CVSS Score | 3.1 |
Occurrences | 2 |
Details | Yaazhini identified technical information exposure on the webpage. Information disclosure is when an application fails to properly protect technical, sensitive and confidential information from parties that are not supposed to have access to the subject matter in normal circumstances. |
Remediation | Remove unnecessary technical information from the webpage. |
URL: | http://192.168.56.1/dvwa/index.php |
Occurrences in this URL: | 2 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://192.168.56.1/dvwa/login.php Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:11:30 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 7510 keep-alive: timeout=5, max=99 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache Welcome to Damn Vulnerable Web Application!Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and to aid both students & teachers to learn about web application security in a controlled class room environment. The aim of DVWA is to practice some of the most common web vulnerability, with various difficultly levels, with a simple straightforward interface. General InstructionsIt is up to the user how they approach DVWA. Either by working through every module at a fixed level, or selecting any module and working up to reach the highest level they can before moving onto the next one. There is not a fixed object to complete a module; however users should feel that they have successfully exploited the system as best as they possible could by using that particular vulnerability. Please note, there are both documented and undocumented vulnerability with this software. This is intentional. You are encouraged to try and discover as many issues as possible. DVWA also includes a Web Application Firewall (WAF), PHPIDS, which can be enabled at any stage to further increase the difficulty. This will demonstrate how adding another layer of security may block certain malicious actions. Note, there are also various public methods at bypassing these protections (so this can be see an as extension for more advance users)! There is a help button at the bottom of each page, which allows you to view hints & tips for that vulnerability. There are also additional links for further background reading, which relates to that security issue. WARNING!Damn Vulnerable Web Application is damn vulnerable! Do not upload it to your hosting provider's public html folder or any Internet facing servers, as they will be compromised. It is recommend using a virtual machine (such as VirtualBox or VMware), which is set to NAT networking mode. Inside a guest machine, you can downloading and install DisclaimerWe do not take responsibility for the way in which any one uses this application (DVWA). We have made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing DVWA on to live web servers. If your web server is compromised via an installation of DVWA it is not our responsibility it is the responsibility of the person/s who uploaded and installed it. More Training ResourcesDVWA aims to cover the most commonly seen vulnerabilities found in today's web applications. However there are plenty of other issues with web applications. Should you wish to explore any additional attack vectors, or want more difficult challenges, you may wish to look into the following other projects:
Username: admin
Security Level: low PHPIDS: disabled |
Risk | Medium |
Severity | Medium |
CVSS Score | 4.3 |
Occurrences | 1 |
Details | Yaazhini detected an autocomplete vulnerability on password fields. By default, browsers remember information and store in local memory whatever user submits through input fields on websites. This mechanism enables the browser to offer autocompletion and autofill. The attacker can capture the stored information if the attacker gains access to the user's computer. |
Remediation | Include the attribute autocomplete = 'off' in the username, password, and the form's sensitive input fields to avoid storing the browser's data. |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:11:10 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=duhpjesrk9drkdvvg02cnn5alv; path=/,PHPSESSID=duhpjesrk9drkdvvg02cnn5alv; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=100 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |
Risk | Medium |
Severity | Medium |
CVSS Score | 4.3 |
Occurrences | 1 |
Details | Yaazhini detected an autocomplete vulnerability on sensitive fields. By default, browsers remember information and store in local memory whatever user submits through input fields on websites. This mechanism enables the browser to offer autocompletion and autofill. The attacker can capture the stored information if the attacker gains access to the user's computer. |
Remediation | Include the attribute autocomplete = 'off' in the username, password, and the form's sensitive input fields to avoid storing the browser's data. |
URL: | http://192.168.56.1/dvwa/login.php |
Occurrences in this URL: | 1 |
Request | Response |
---|---|
Method: GET User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 |
date: Fri, 16 Jul 2021 11:11:10 GMT server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.3.5 x-powered-by: PHP/7.3.5 set-cookie: PHPSESSID=duhpjesrk9drkdvvg02cnn5alv; path=/,PHPSESSID=duhpjesrk9drkdvvg02cnn5alv; path=/,security=low expires: Tue, 23 Jun 2009 12:00:00 GMT cache-control: no-cache, must-revalidate pragma: no-cache content-length: 1523 keep-alive: timeout=5, max=100 connection: Keep-Alive content-type: text/html;charset=utf-8 Cache-Control: no-cache status code: 200 |