Remediation Report for Server Administrator

 Scan Name: Webscantest
 Date: 9/12/2017 9:33:08 PM
 Authenticated User: testuser
 Total Links / Attackable Links: 409 / 409
 Target URL: http://webscantest.com/
https://webscantest.com/
 Reports:

Summary


Vulnerability Type

Root Causes

Variances

Custom Directory Check  2   2 
Directory Indexing  3   3 
Information Disclosure  12   12 
Predictable Resource Location  2   2 
Server Type Disclosure  2   2 
Total:  21   21 

By Risk

Variances: 21

Details


Collapse Custom Directory Check

some text
  Collapse Site: http://webscantest.com:80
URL: http://webscantest.com/ Root Cause #171: (1 Attack Variance)  Expand
some text
  Collapse Site: http://www.webscantest.com:80
URL: http://www.webscantest.com/ Root Cause #172: (1 Attack Variance)  Expand

Description:  

The description for the Example Directory Attack.


Recommendations:  

Refer to your web server's documentation for instructions.


Collapse Directory Indexing

some text
  Collapse Site: http://webscantest.com:80
URL: http://webscantest.com/css/ Root Cause #193:  Validate Expand
URL: http://webscantest.com/images/ Root Cause #194:  Validate Expand
URL: http://webscantest.com/myfiles/ Root Cause #195:  Validate Expand

Description:  

A full list of a directory's content can be viewed. This reveals each file and subdirectory, regardless of whether or not it is related to the web application. A directory listing may also reveal backup files, include files, or configuration files that are not normally viewable by users. When these types of files can be found, they often disclose sensitive information about the application.


Recommendations:  

Refer to your web server's documentation for instructions on prohibiting directory listings.


Collapse Information Disclosure

some text
  Collapse Site: http://webscantest.com:80
URL: http://webscantest.com/rest/demo/%7C/bin/cat%20/etc/hosts Root Cause #205: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/%7C/bin/cat%20/etc/hosts%7C Root Cause #206: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/%7C/bin/cat%20/etc/passwd Root Cause #207: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/%7C/bin/cat%20/etc/passwd%7C Root Cause #208: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/%7C/bin/cat%20/usr/bin/id Root Cause #209: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/%7C/bin/cat%20/usr/bin/id%7C Root Cause #210: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/|/bin/cat /etc/hosts Root Cause #211: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/|/bin/cat /etc/hosts| Root Cause #212: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/|/bin/cat /etc/passwd Root Cause #213: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/|/bin/cat /etc/passwd| Root Cause #214: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/|/bin/cat /usr/bin/id Root Cause #215: (1 Attack Variance)  Expand
URL: http://webscantest.com/rest/demo/|/bin/cat /usr/bin/id| Root Cause #216: (1 Attack Variance)  Expand

Description:  

A path was found in the error information returned by the server. This can give an attacker clues as to the directory topology and setup of your web application.


Recommendations:  

Remove all references to local path from the web application.


Collapse Predictable Resource Location

some text
  Collapse Site: http://webscantest.com:80
URL: http://webscantest.com/robots.txt Root Cause #229:  Validate Expand
some text
  Collapse Site: http://www.webscantest.com:80
URL: http://www.webscantest.com/robots.txt Root Cause #230:  Validate Expand

Description:  

A robots.txt file is present in the directory. The robots.txt file provides a list of directories that crawling engines are requested to ignore. There is no way to force the crawling engine to honor the robots.txt file. Depending on the content of the file, it may reveal administrator interfaces or alternate URLs that are supposed to be hidden from users.


Recommendations:  

  1. Ensure that the robots.txt file does not divulge directories that are intended to be hidden from users.
  2. The security of sensitive directories should not rely on hiding their presence. Restrict access to sensitive directories (e.g. admin) by password and IP address or network location.
  3. Amend your deployment policy to include the removal of sensitive directories from robots.txt files.


Collapse Server Type Disclosure

some text
  Collapse Site: http://webscantest.com:80
URL: http://webscantest.com/ Root Cause #250:  Validate Expand
some text
  Collapse Site: http://www.webscantest.com:80
URL: http://www.webscantest.com/ Root Cause #251:  Validate Expand

Description:  

Default configurations of web servers often provide too much information about their platform and version in HTTP headers and on error pages. This data is not itself dangerous, but it can help an attacker focus on vulnerabilities associated with your specific web server platform/version.


Recommendations:  

Configure your web server to avoid having it announce its own details. For example in Apache you would want these two configuration directives in your config file:

  • ServerSignature Off
  • ServerTokens Prod