VAPT Report for Warsaw Dynamics
Description
Vulnerability Assessment and Penetration Testing (VAPT)
Draft Date: January 9, 2024
Finalized report date: January 12, 2024
Executive Summary
This report presents the findings from a comprehensive VAPT conducted for Warsaw Dynamics Company.
Introduction
-
Objective: To identify security vulnerabilities in Warsaw Dynamics Corporation’s web application and network.
-
Scope: Web application and internal network.
-
Methodology: Used automated and manual testing techniques, including OWASP Top 10 for web applications
Vulnerability Assessment Findings
|
Target |
Description |
Status |
|---|---|---|
|
Java Application - dependencies |
3 CRITICAL |
|
|
NGINX version |
nginx/1.18.0 |
Patched with Debian Bullseye release until July 2024. |
|
Open ports |
Only 80 and 443 |
> nmap -p1-65535 -v 51.77.42.240 |
|
HSTS |
present |
GET https://confluence.external-share.com/web/redirect/share-list?… HTTP/1.1 200 OK |
|
SSL Certificate |
Subject confluence.external-share.com |
|
|
Subject warsawdynamics.com |
||
|
Server Key and Certificate #1 |
||
|
HTTP to HTTPS redirect |
present on all domains |
|
|
Bugcrowd |
@Krzysztof Bogdan |
Provided in separate document |
|
E2E security test |
@Krzysztof Bogdan |
January 10, 2024 all automate E2E |
|
XSS |
@Parsa Shiva |
Details below |
|
SQL Injection |
@Parsa Shiva |
Details below |
Penetration Testing Report
Introduction:
This report documents the security testing conducted on the "External Share for Confluence" application, focusing on Cross-Site Scripting (XSS), SQL Injection, and HTML manipulation vulnerabilities.
Methodology:
Testing was conducted manually, targeting various elements:
-
Input Fields: In areas such as user profiles, comments, attachments, labels, and internal macros (tables, code snippets, quotes, info panels).
-
API Capability Endpoints: Testing for SQL injection with payloads like:
{"contentId": "' OR '1' = '1",...} -
Page Customization Features: Including custom headers, footers, and footer links.
-
Field Validations: Ensuring specific field types (email, phone number, host) are resistant to injection attacks.
Test Results:
Findings and Recommendations:
No significant vulnerabilities were found during the testing phase. The application demonstrated robust defense against common security threats like XSS and SQL injections.
Conclusion:
"External Share for Confluence" shows a strong resilience to common web security threats, ensuring a secure experience for its users.
Risk Assessment
-
Java app dependencies: Medium - Please check conclusion for more information.
-
SQL Injection: None.
-
XSS: None.
-
Outdated Server Software: None – Update to new OS recommended within 180 days.
Conclusion
Issues have been identified with dependencies in the Java application. One of the dependencies is a false positive, while two are utilized solely during the app's initialization phase. These components do not involve user interaction. Nevertheless, we are committed to updating these dependencies.
Document draft prepared by Krzysztof Bogdan.
Tests performed by:
-
Krzysztof Surdacki
-
Parsa Shiva
Appendices:
-
Warsaw Dynamics-SECURITY POSTURE REPORT.pdf
-
Warsaw Dynamics-Security Summary Report.pdf
Hello @Krzysztof Bogdan,
Please merge code to dev branch.
This is the best moment to add more information that can be helpful to prepare release notes.
Can you prepare short overview of change that can be used in release notes?
Please provide short GIF that showcase feature.
If GIF make no sense, can you provide image that highlights feature that can be used in release notes (cropped & annotated)?
Hello @Krzysztof Bogdan ]
This is the best moment to add more information that can be helpful for tester.
What areas are affected?
What are potential edge cases?
Was it checked for XSS problems?
Does change affect security, is new data exposed?
Please attach - Before / After screenshot if possible.
Hello @Krzysztof Bogdan,
Task is ready for review.
@Krzysztof Bogdan please make sure reviewer
have easy access to contend to be reviewed.
If this is code change. Please make sure PR is created.
If this is new documentation, blogpost, etc. Please provide link to page.