VAPT-1
VAPT-1
REPORT
for testphp.vuln.com
TABLE OF CONTENTS
1. Disclaimer
2. ASSESSMENT OVERVIEW
2.1. SCOPE
3. Executive summary
4. Detailed findings
4.1.Sqli
4.2.XSS(Cross-site scripting)
4.3.CRYPTOGRAPHIC FAILURE
4.4.OS INJECTION
4.5.Security Misconfiguration
4.6.Vulnerable and Outdated Components
4.7.Information disclosure
Disclaimer:
This Vulnerability Assessment and Penetration Testing (VAPT) Report is based on security
testing conducted on testphp.vulnweb.com, a purposely vulnerable application provided by
Acunetix for ethical hacking and security research. The findings in this report:
● Are intended solely for educational and research purposes and must not be used for
unauthorized testing on real-world applications.
● Do not reflect vulnerabilities in live production environments.
● Are specific to the test environment and may not accurately represent real-world
security threats.
● Are not meant for malicious activities but should be used to enhance security
awareness and best practices.
● Do not imply any endorsement or security validation from Acunetix or any third party.
Neither the testers nor the organization bear responsibility for any misuse or unauthorized
testing beyond the testphp.vulnweb.com environment.
ASSESSMENT OVERVIEW
SCOPE:
Web Application: testphp.vulnweb.com
Common Web Vulnerabilities:
Executive summary
2 2 2 2 8
3 7.0-9.0 1 1 0 0 0 1
Vulnerable and
Outdated Components
4 Security 5.0-8.0 0 1 1 0 0 1
Misconfiguration
7 Os cmd injection
Detailed findings
CVSS:
Vulnerability Description:
impact:
proof:
Remediation:
CVSS:
impact:
1. Data Theft & Credential Hijacking
● Attackers can steal session
cookies, authentication
tokens, or sensitive user
data.
● This can lead to account
takeovers and unauthorized
access.
● If an administrator executes a
malicious script, the attacker can
gain control over the entire
application.
Remediation:
View guestbook and perform XSS ,we can see that it is vulnerable to XSS
Add xss payload to search buttons and update boxes,we got xss vulnerabilities here.
1.Vulnerability Name :CRYPTOGRAPHIC FAILURE
Vulnerability Rating:High
CVSS:CVE-2014-0160
proof:
Remediation:
1.Vulnerability Name :OS INJECTION
Vulnerability Rating:Critical
CVSS:CVE-2016-3714
proof:
Use Allow-Lists:
Output Encoding:
CVSS:none
proof:
CVSS:CVE-2014-0226
proof:
Remediation:
CVSS:none
url/vendor
http://testphp.vulnweb.com/vendor/
installed.json
By visiting this url we can explore many
gmails and names