Web Application Report This report includes important security information about your Web Application. OWASP Top Ten 2010 The Ten Most Critical Web Application Report This report was created by IBM Rational AppScan 8.5.0.1 4/11/2013 4:16:57 PM 4/11/2013 4:16:58 PM Copyright IBM Corp. 2000, 2011. All Rights Reserved. 1/17
OWASP Top Ten 2010 The Ten Most Critical Web Application Web Application Report Scanned Web Application: http://10.172.2.190:8080/bse Scan Name: bse110413 Content This report contains the following sections: Description Compliance Scan Results Unique Compliance-related Issues Detected Compliance-Related Issues and Section References IMPORTANT INFORMATION ABOUT THIS REPORT This Compliance Scan Results Report is based on the results of an automated Web Application Security scan, performed by AppScan. An AppScan scan attempts to uncover security-related issues in web applications, testing both the http frameworks (e.g. web servers) and the code of the application itself (e.g. dynamic pages). The testing is performed over HTTP, and is limited only to those issues that are specified for testing and identified in an automated fashion via the HTTP channel. The scan is also limited to those specific issues included in an automatic and/or manual explore performed during the scan. The security-related issues detected are compared to selected regulatory or industry standard requirements to produce this report. There may be areas of compliance risk associated with such regulation or standard that are not specified for testing by AppScan. This report will not detect any compliance-related issues in areas of compliance risk that are not tested by AppScan. The report identifies areas where there may be a compliance risk, but the exact impact of each uncovered issue type depends on the individual application, environment, and the subject regulation or standard. Regulations and standards are subject to change, and the scans performed by AppScan may not reflect all such changes. It is the user s responsibility to interpret the results in this report for determination of impact, actual compliance violations, and appropriate remedial measures, if any. Section references to regulations are provided for reference purposes only. The issues reported are general compliance-related risks and are not to be interpreted as excerpts from any regulation. The information provided does not constitute legal advice. IBM customers are responsible for ensuring their own compliance with legal requirements. It is the customer's sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer's business and any actions the customer may need to take to comply with such laws. 4/11/2013 4:16:58 PM 2/17
Description Summary Description The goal of the Top 10 project is to raise awareness about application security by identifying some of the most critical risks facing organizations. Development projects should address these potential risks in their requirements documents and design, build and test their applications to ensure that they have taken the necessary measures to reduce these risks to the minimum. Project managers should include time and budget for application security activities including developer training, application security policy development, security mechanism design and development, penetration testing, and security code review as part over the overall effort to address the risks. The primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the consequences of the most important web application security risks. The Top 10 provides basic guidance on how to address against these risks and where to go to learn more on how to address them. Although setout as an education piece, rather than a standard or a regulation, it is important to note that several prominent industry and government regulators are referencing the OWASP top ten. These bodies include among others VISA USA, MasterCard International and the American Federal Trade Commission (FTC). However, according to the OWASP team the OWASP top ten first and foremost an education piece, not a standard. The OWASP team suggests to any organization about to adopt the Top Ten paper as a policy or standard to consult with the OWASP team first. The OWASP Top 10 2010 is a significant update to the previous version of OWASP top ten (2007). It presents a more concise, risk focused list of the Top 10 Most Critical Web Application security risks and how to asses them. Each item in the top 10 is presented with the general likelihood and consequence factors that are used to categorize the typical severity of the risk. Covered Entities All companies and other entities that develop any kind of web application code are encouraged to address the top ten list as part of their over all security risk management. Adopting the OWASP Top Ten is an effective first step towards changing the software development culture within the organization into one that produces secure code. For more information on OWASP Top Ten, please review the OWASP Top Ten 2010 The Ten Most Critical Web Application, at http://www.owasp.org For more information on securing web applications, please visit http://www- 01.ibm.com/software/rational/offerings/websecurity (*) DISCLAIMER The information provided does not constitute legal advice. The results of a vulnerability assessment will demonstrate potential vulnerabilities in your application that should be corrected in order to reduce the likelihood that your information will be compromised. As legal advice must be tailored to the specific application of each law, and laws are constantly changing, nothing provided herein should be used as a substitute for the advice of competent counsel. IBM customers are responsible for ensuring their own compliance with legal requirements. It is the customer's sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer's business and any actions the customer may need to take to comply with such laws. 4/11/2013 4:16:58 PM 3/17
Compliance Scan Results 48 unique issues detected across 10 sections of the regulation: 1. Section Injection (A1) No. of Issues - 2. 3. 4. 5. 6. 7. 8. 9. 10. Cross site scripting (XSS) - (A2) Broken authentication and session management - (A3) Insecure direct object reference 45 (A4) Cross site request forgery (CSRF) - (A5) Security Misconfiguration 42 (A6) Insecure cryptographic storage 3 (A7) Failure to restrict URL access. 48 (A8) Insufficient transport layer protection - (A9) UnvalidatedRedirects and Forwards - (A10) 4/11/2013 4:16:58 PM 4/17
Unique Compliance-related Issues Detected 48 unique issues detected across 10 sections of the regulation: ID URL Parameter/Cookie Test Name Sections 1 http://10.172.2.190:8080/1.0 2 http://10.172.2.190:8080/images/ 3 http://10.172.2.190:8080/aux/ Hidden Directory Detected 4, 8 4 http://10.172.2.190:8080/cgi-bin/ Hidden Directory Detected 4, 8 5 http://10.172.2.190:8080/com1/ Hidden Directory Detected 4, 8 6 http://10.172.2.190:8080/com2/ Hidden Directory Detected 4, 8 7 http://10.172.2.190:8080/com3/ Hidden Directory Detected 4, 8 8 http://10.172.2.190:8080/bse/ Robots.txt File Web Site Structure 4, 8 Exposure 9 http://10.172.2.190:8080/bse/sites/ 10 http://10.172.2.190:8080/bse/sites/all/ 11 http://10.172.2.190:8080/bse/sites/all/modules/ 12 http://10.172.2.190:8080/bse/sites/all/modules/jq uery_update/ 13 http://10.172.2.190:8080/bse/sites/all/modules/jq UERY~1/ 14 http://10.172.2.190:8080/bse/sites/all/modules/jq uery_update/replace/ 15 http://10.172.2.190:8080/bse/sites/all/modules/jq uery_update/replace/jquery/ 16 http://10.172.2.190:8080/bse/sites/all/modules/jq uery_update/replace/jquery/1.8/ 17 http://10.172.2.190:8080/bse/misc/ 18 http://10.172.2.190:8080/bse/sites/all/modules/jq uery_update/replace/ui/ 19 http://10.172.2.190:8080/bse/sites/all/modules/jq uery_update/replace/ui/external/ 20 http://10.172.2.190:8080/bse/sites/all/modules/jq uery_update/replace/misc/ 21 http://10.172.2.190:8080/bse/sites/all/modules/ex ternal/ 22 http://10.172.2.190:8080/bse/sites/all/modules/lig htbox2/ 23 http://10.172.2.190:8080/bse/sites/all/modules/li GHTB~1/ 24 http://10.172.2.190:8080/bse/sites/all/modules/lig htbox2/js/ 25 http://10.172.2.190:8080/bse/sites/all/modules/nic e_menus/ 26 http://10.172.2.190:8080/bse/sites/all/modules/ni CE_M~1/ 4/11/2013 4:16:58 PM 5/17
ID URL Parameter/Cookie Test Name Sections 27 http://10.172.2.190:8080/bse/sites/all/modules/nic e_menus/superfish/ 28 http://10.172.2.190:8080/bse/sites/all/modules/nic e_menus/superf~1/ 29 http://10.172.2.190:8080/bse/sites/all/modules/nic e_menus/superfish/js/ 30 http://10.172.2.190:8080/bse/sites/all/modules/sc roll_to_top/ 31 http://10.172.2.190:8080/bse/sites/all/modules/s CROLL~1/ 32 http://10.172.2.190:8080/bse/sites/all/modules/vie ws_ticker/ 33 http://10.172.2.190:8080/bse/sites/all/modules/vi EWS_~1/ 34 http://10.172.2.190:8080/bse/sites/all/modules/vie ws_ticker/js/ 35 http://10.172.2.190:8080/bse/sites/all/modules/vie ws/ 36 http://10.172.2.190:8080/bse/sites/all/modules/vie ws/js/ 37 http://10.172.2.190:8080/bse/sites/all/modules/niv o_slider/ 38 http://10.172.2.190:8080/bse/sites/all/modules/ni VO_S~1/ 39 http://10.172.2.190:8080/bse/sites/all/modules/niv o_slider/js/ 40 http://10.172.2.190:8080/bse/sites/all/libraries/ 41 http://10.172.2.190:8080/bse/sites/all/librar~1/ 42 http://10.172.2.190:8080/bse/sites/all/libraries/niv o-slider/ 43 http://10.172.2.190:8080/bse/sites/all/libraries/ni VO-S~1/ 44 http://10.172.2.190:8080/bse 45 http://10.172.2.190:8080/bse/sites/all/modules/jq uery_update/replace/ui/external/jquery.cookie.js 46 http://10.172.2.190:8080/bse/ 47 http://10.172.2.190:8080/bse/sites/all/modules/we bform/ 48 http://10.172.2.190:8080/bse/sites/all/modules/we bform/js/ Internal IP Disclosure Pattern Found 6, 7, 8 Email Address Pattern Found 6, 7, 8 Internal IP Disclosure Pattern Found 6, 7, 8 4/11/2013 4:16:58 PM 6/17
Compliance-Related Issues and Section References 1) Injection (A1) No issues. 2) Cross site scripting (XSS) (A2) No issues. 3) Broken authentication and session management (A3) No issues. 4) Insecure direct object reference (A4) 45 Issues Directory Listing - It is possible to view and download the contents of certain web application virtual directories, which might contain restricted files - Directory browsing is enabled Modify the server configuration to deny directory listing, and install the latest security patches available 1 http://10.172.2.190:8080/1.0 4/11/2013 4:16:58 PM 7/17
2 http://10.172.2.190:8080/images/ 9 http://10.172.2.190:8080/bse/sites/ 10 http://10.172.2.190:8080/bse/sites/all/ 11 http://10.172.2.190:8080/bse/sites/all/modules/ 12 http://10.172.2.190:8080/bse/sites/all/modules/jquery_update/ 13 http://10.172.2.190:8080/bse/sites/all/modules/jquery~1/ 14 15 16 j query/ j query/1.8/ 17 http://10.172.2.190:8080/bse/misc/ 18 19 20 ui/ ui/external/ misc/ 21 http://10.172.2.190:8080/bse/sites/all/modules/external/ 22 http://10.172.2.190:8080/bse/sites/all/modules/lightbox2/ 23 http://10.172.2.190:8080/bse/sites/all/modules/lightb~1/ 24 http://10.172.2.190:8080/bse/sites/all/modules/lightbox2/js/ 25 http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/ 26 http://10.172.2.190:8080/bse/sites/all/modules/nice_m~1/ 27 http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/superfish/ 28 29 http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/superf~ 1/ http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/superfish/j s/ 30 http://10.172.2.190:8080/bse/sites/all/modules/scroll_to_top/ 31 http://10.172.2.190:8080/bse/sites/all/modules/scroll~1/ 32 http://10.172.2.190:8080/bse/sites/all/modules/views_ticker/ 33 http://10.172.2.190:8080/bse/sites/all/modules/views_~1/ 34 http://10.172.2.190:8080/bse/sites/all/modules/views_ticker/js/ 35 http://10.172.2.190:8080/bse/sites/all/modules/views/ 36 http://10.172.2.190:8080/bse/sites/all/modules/views/js/ 37 http://10.172.2.190:8080/bse/sites/all/modules/nivo_slider/ 38 http://10.172.2.190:8080/bse/sites/all/modules/nivo_s~1/ 4/11/2013 4:16:58 PM 8/17
39 http://10.172.2.190:8080/bse/sites/all/modules/nivo_slider/js/ 40 http://10.172.2.190:8080/bse/sites/all/libraries/ 41 http://10.172.2.190:8080/bse/sites/all/librar~1/ 42 http://10.172.2.190:8080/bse/sites/all/libraries/nivo-slider/ 43 http://10.172.2.190:8080/bse/sites/all/libraries/nivo-s~1/ 47 http://10.172.2.190:8080/bse/sites/all/modules/webform/ 48 http://10.172.2.190:8080/bse/sites/all/modules/webform/js/ Hidden Directory Detected - It is possible to retrieve information about the site's file system structure, which may help the attacker to map the web site - The web server or application server are configured in an insecure way Issue a "404 - Not Found" response status code for a forbidden resource, or remove it completely 3 http://10.172.2.190:8080/aux/ 4 http://10.172.2.190:8080/cgi-bin/ 5 http://10.172.2.190:8080/com1/ 6 http://10.172.2.190:8080/com2/ 7 http://10.172.2.190:8080/com3/ 4/11/2013 4:16:58 PM 9/17
Robots.txt File Web Site Structure Exposure - It is possible to retrieve information about the site's file system structure, which may help the attacker to map the web site - The web server or application server are configured in an insecure way Move sensitive content to an isolated location to exclude it from web robot search 8 http://10.172.2.190:8080/bse/ 5) Cross site request forgery (CSRF) (A5) No issues. 6) Security Misconfiguration (A6) 42 Issues Directory Listing - It is possible to view and download the contents of certain web application virtual directories, which might contain restricted files - Directory browsing is enabled Modify the server configuration to deny directory listing, and install the latest security patches available 1 http://10.172.2.190:8080/1.0 4/11/2013 4:16:58 PM 10/17
2 http://10.172.2.190:8080/images/ 9 http://10.172.2.190:8080/bse/sites/ 10 http://10.172.2.190:8080/bse/sites/all/ 11 http://10.172.2.190:8080/bse/sites/all/modules/ 12 http://10.172.2.190:8080/bse/sites/all/modules/jquery_update/ 13 http://10.172.2.190:8080/bse/sites/all/modules/jquery~1/ 14 15 16 j query/ j query/1.8/ 17 http://10.172.2.190:8080/bse/misc/ 18 19 20 ui/ ui/external/ misc/ 21 http://10.172.2.190:8080/bse/sites/all/modules/external/ 22 http://10.172.2.190:8080/bse/sites/all/modules/lightbox2/ 23 http://10.172.2.190:8080/bse/sites/all/modules/lightb~1/ 24 http://10.172.2.190:8080/bse/sites/all/modules/lightbox2/js/ 25 http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/ 26 http://10.172.2.190:8080/bse/sites/all/modules/nice_m~1/ 27 http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/superfish/ 28 29 http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/superf~ 1/ http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/superfish/j s/ 30 http://10.172.2.190:8080/bse/sites/all/modules/scroll_to_top/ 31 http://10.172.2.190:8080/bse/sites/all/modules/scroll~1/ 32 http://10.172.2.190:8080/bse/sites/all/modules/views_ticker/ 33 http://10.172.2.190:8080/bse/sites/all/modules/views_~1/ 34 http://10.172.2.190:8080/bse/sites/all/modules/views_ticker/js/ 35 http://10.172.2.190:8080/bse/sites/all/modules/views/ 36 http://10.172.2.190:8080/bse/sites/all/modules/views/js/ 37 http://10.172.2.190:8080/bse/sites/all/modules/nivo_slider/ 38 http://10.172.2.190:8080/bse/sites/all/modules/nivo_s~1/ 4/11/2013 4:16:58 PM 11/17
39 http://10.172.2.190:8080/bse/sites/all/modules/nivo_slider/js/ 40 http://10.172.2.190:8080/bse/sites/all/libraries/ 41 http://10.172.2.190:8080/bse/sites/all/librar~1/ 42 http://10.172.2.190:8080/bse/sites/all/libraries/nivo-slider/ 43 http://10.172.2.190:8080/bse/sites/all/libraries/nivo-s~1/ 47 http://10.172.2.190:8080/bse/sites/all/modules/webform/ 48 http://10.172.2.190:8080/bse/sites/all/modules/webform/js/ Email Address Pattern Found - It is possible to gather sensitive information about the web application such as usernames, passwords, machine name and/or sensitive file locations - Insecure web application programming or configuration Remove e-mail addresses from the website 45 ui/external/jquery.cookie.js Internal IP Disclosure Pattern Found - It is possible to gather sensitive information about the web application such as usernames, passwords, machine name and/or sensitive file locations - Insecure web application programming or configuration Remove internal IP addresses from your website 44 http://10.172.2.190:8080/bse 46 http://10.172.2.190:8080/bse/ 4/11/2013 4:16:58 PM 12/17
7) Insecure cryptographic storage (A7) 3 Issues Email Address Pattern Found - It is possible to gather sensitive information about the web application such as usernames, passwords, machine name and/or sensitive file locations - Insecure web application programming or configuration Remove e-mail addresses from the website 45 ui/external/jquery.cookie.js Internal IP Disclosure Pattern Found - It is possible to gather sensitive information about the web application such as usernames, passwords, machine name and/or sensitive file locations - Insecure web application programming or configuration Remove internal IP addresses from your website 44 http://10.172.2.190:8080/bse 46 http://10.172.2.190:8080/bse/ 4/11/2013 4:16:58 PM 13/17
8) Failure to restrict URL access. (A8) 48 Issues Directory Listing - It is possible to view and download the contents of certain web application virtual directories, which might contain restricted files - Directory browsing is enabled Modify the server configuration to deny directory listing, and install the latest security patches available 1 http://10.172.2.190:8080/1.0 2 http://10.172.2.190:8080/images/ 9 http://10.172.2.190:8080/bse/sites/ 10 http://10.172.2.190:8080/bse/sites/all/ 11 http://10.172.2.190:8080/bse/sites/all/modules/ 12 http://10.172.2.190:8080/bse/sites/all/modules/jquery_update/ 13 http://10.172.2.190:8080/bse/sites/all/modules/jquery~1/ 14 15 16 j query/ j query/1.8/ 17 http://10.172.2.190:8080/bse/misc/ 18 19 20 ui/ ui/external/ misc/ 21 http://10.172.2.190:8080/bse/sites/all/modules/external/ 22 http://10.172.2.190:8080/bse/sites/all/modules/lightbox2/ 23 http://10.172.2.190:8080/bse/sites/all/modules/lightb~1/ 24 http://10.172.2.190:8080/bse/sites/all/modules/lightbox2/js/ 4/11/2013 4:16:58 PM 14/17
25 http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/ 26 http://10.172.2.190:8080/bse/sites/all/modules/nice_m~1/ 27 http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/superfish/ 28 29 http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/superf~ 1/ http://10.172.2.190:8080/bse/sites/all/modules/nice_menus/superfish/j s/ 30 http://10.172.2.190:8080/bse/sites/all/modules/scroll_to_top/ 31 http://10.172.2.190:8080/bse/sites/all/modules/scroll~1/ 32 http://10.172.2.190:8080/bse/sites/all/modules/views_ticker/ 33 http://10.172.2.190:8080/bse/sites/all/modules/views_~1/ 34 http://10.172.2.190:8080/bse/sites/all/modules/views_ticker/js/ 35 http://10.172.2.190:8080/bse/sites/all/modules/views/ 36 http://10.172.2.190:8080/bse/sites/all/modules/views/js/ 37 http://10.172.2.190:8080/bse/sites/all/modules/nivo_slider/ 38 http://10.172.2.190:8080/bse/sites/all/modules/nivo_s~1/ 39 http://10.172.2.190:8080/bse/sites/all/modules/nivo_slider/js/ 40 http://10.172.2.190:8080/bse/sites/all/libraries/ 41 http://10.172.2.190:8080/bse/sites/all/librar~1/ 42 http://10.172.2.190:8080/bse/sites/all/libraries/nivo-slider/ 43 http://10.172.2.190:8080/bse/sites/all/libraries/nivo-s~1/ 47 http://10.172.2.190:8080/bse/sites/all/modules/webform/ 48 http://10.172.2.190:8080/bse/sites/all/modules/webform/js/ Email Address Pattern Found - It is possible to gather sensitive information about the web application such as usernames, passwords, machine name and/or sensitive file locations - Insecure web application programming or configuration Remove e-mail addresses from the website 4/11/2013 4:16:58 PM 15/17
45 ui/external/jquery.cookie.js Hidden Directory Detected - It is possible to retrieve information about the site's file system structure, which may help the attacker to map the web site - The web server or application server are configured in an insecure way Issue a "404 - Not Found" response status code for a forbidden resource, or remove it completely 3 http://10.172.2.190:8080/aux/ 4 http://10.172.2.190:8080/cgi-bin/ 5 http://10.172.2.190:8080/com1/ 6 http://10.172.2.190:8080/com2/ 7 http://10.172.2.190:8080/com3/ Internal IP Disclosure Pattern Found - It is possible to gather sensitive information about the web application such as usernames, passwords, machine name and/or sensitive file locations - Insecure web application programming or configuration Remove internal IP addresses from your website 44 http://10.172.2.190:8080/bse 46 http://10.172.2.190:8080/bse/ 4/11/2013 4:16:58 PM 16/17
Robots.txt File Web Site Structure Exposure - It is possible to retrieve information about the site's file system structure, which may help the attacker to map the web site - The web server or application server are configured in an insecure way Move sensitive content to an isolated location to exclude it from web robot search 8 http://10.172.2.190:8080/bse/ 9) Insufficient transport layer protection (A9) No issues. 10) UnvalidatedRedirects and Forwards (A10) No issues. 4/11/2013 4:16:58 PM 17/17