Astra Security Sample VAPT Report
Astra Security Sample VAPT Report
Astra Security Sample VAPT Report
com
SECURITY AUDIT
REPORT FOR
MY BUSINESS
hello@getastra.com Confidential
ATTENTION: This document contains information from Astra IT, Inc. & Czar Securities Pvt. Ltd. that is confidential and privileged. The information is
intended for private use of the client. By accepting this document you agree to keep the contents in confidence and not copy, disclose, or distribute
this without written request to and written confirmation from Astra IT, Inc. & Czar Securities Pvt. Ltd. If you are not the intended recipient, be aware
that any disclosure, copying, or distribution of the contents of this document is prohibited.
Title Details
VALIDITY: 30 DAYS
Confidential
Table of Contents
1. Executive Summary
1.1 Scope of Testing
3.7 Test Cases for Cloud (AWS, Azure, GCP, and Other)
Confidential 2
1. Executive Summary
The purpose of this assessment was to point out security loopholes, business logic
errors, and missing best security practices. The tests were carried out assuming the
identity of an attacker or a malicious user but no harm was made to the functionality
Security assessment includes testing for security loopholes in the scope defined
below. Apart from the following, no other information was provided. Nothing was
The following was the scope covered under the security audit:
Application 1: {URL1}
Application 2: {URL2}
summary of the security audit scan results, including, vulnerabilities discovered, severity,
respective CVSS Score, and other vulnerability details such as its impact, detailed PoC,
Confidential 3
1.3 List of Vulnerabilities
Critical 0
High 1
Medium 2
Low 4
Recommendations 0
Confidential 4
2. Discovered Vulnerabilities Details
Vulnerability #1
CVSS Score
Missing API Security Headers
Severity: Status:
5.4
Medium Unsolved
Details of Vulnerability:
We were able to detect that the following API security headers are missing
3. X-Content-Type-Optio
A CSP is an important standard by the W3C that is aimed to prevent a broad range of
content injection attacks such as cross-site scripting (XSS), data injection attacks, packet
sniffing attacks etc. It is a declarative policy that informs the user agent what are valid
Impact:
Missing Content-Type header means that this website could be at risk of a MIME-
sniffing attacks.
Missing Strict Transport Security header means that the application fails to prevent
legitimate user's network traffic could bypass the application's use of SSL/TLS
encryption, and use the application as a platform for attacks against its users.
Suggested Fixes:
https://www.example.com/reference
Additional References:
https://test.com/reference
Confidential 5
Vulnerability #2
CVSS Score
Stored Cross-Site Scripting (XSS)
Severity: Status:
7.7
High Resolved
http://example.com/test1\n
Affected URL: https://example.com/test2
Details of Vulnerability:
Stored XSS Vulnerability was found on the affected URLs. This allows an attacker to inject
a script which gets stored in the application. When a victim navigates to the affected web
page in a browser, the XSS payload will be served as part of the web page. This means
that victims will inadvertently end-up executing the malicious script once the page is
viewed in a browser.
Impact:
The attacker-supplied code can perform a wide variety of actions, such as
Suggested Fixes:
In order to prevent Stored XSS attacks, the best way is to handle the input securely in
both client-side and server-side code in a proper manner before it gets stored
Suggested Fix 2
https://test.com/reference
Confidential 6
Vulnerability #3
CVSS Score
SQL Injection
Severity: Status:
5
Medium Resolved
Details of Vulnerability:
SQL injection vulnerabilities arise when user-controllable data is incorporated into
database SQL queries in an unsafe manner. An attacker can supply crafted input to break
out of the data context in which their input appears and interfere with the structure of the
surrounding query.
Steps to reproduce:
The JSON parameter appears to be vulnerable to SQL injection attacks. A single quote was
submitted in the JSON parameter, and a general error message was returned. Two single
quotes were then submitted and the error message disappeared. You should review the
contents of the error message, and the application's handling of other input, to confirm
Suggested Fixes:
The most effective way to prevent SQL injection attacks is to use parameterized
queries (also known as prepared statements) for all database access. This method uses
two steps to incorporate potentially tainted data into SQL queries: first, the application
specifies the structure of the query, leaving placeholders for each item of user input;
second, the application specifies the contents of each placeholder. Because the
structure of the query has already been defined in the first step, it is not possible for
malformed data in the second step to interfere with the query structure. You should
review the documentation for your database and application platform to determine
the appropriate APIs which you can use to perform parameterized queries.
Suggested Fix 2
https://www.example.com/reference
Additional References:
https://test.com/reference
Confidential 7
Vulnerability #4
CVSS Score
Incorrect Contructor Name
Severity: Status:
6.3
Medium Unsolved
Details of Vulnerability:
Constructors are special functions that are called only once during the contract creation.
They often perform critical, privileged actions such as setting the owner of the contract.
Before Solidity version 0.4.22, the only way of defining a constructor was to create a
function with the same name as the contract class containing it. A function meant to
become a constructor becomes a normal, callable function if its name doesn't exactly
match the contract name. This behavior sometimes leads to security issues, in particular
when smart contract code is re-used with a different name but the name of the
Steps to reproduce:
Suggested Fixes:
Solidity version 0.4.22 introduces a new constructor keyword that make a constructor
version of the Solidity compiler and change to the new constructor declaration.
Confidential 8
3. List of VAPT Tests Performed
The following lists of tests are suggestive & not limited to the ones listed. Most importantly,
every test case has multiple sub-test cases ranging from a few to sometimes 1000+ sub
tests.
1. Technology Stack
3. Framework/CMS/APIs
# OWASP Top 10
1 SQL Injection
2 Broken Authentication
6 Security Misconfiguration
8 Insecure Deserialization
3 Insecure Communication
4 Insecure Authentication
5 Insufficient Cryptography
6 Insecure Authorization
8 Code Tampering
9 Reverse Engineering
10 Extraneous Functionality
Confidential 9
3.2 SANS 25 Software Errors/Tests
# SANS 25
4 Information Exposure
5 Out-of-bounds Read
12 Out-of-bounds Write
13 Improper Authentication
Confidential 10
3.3 174 Other Test Cases
Confidential 11
# Other Test performed Typical Severity
Confidential 12
# Other Test performed Typical Severity
Confidential 13
# Other Test performed Typical Severity
Confidential 14
# Other Test performed Typical Severity
Confidential 15
3.4 Server - Level Test Cases
Information Gathering
SSL/TLS Testing
7 HeartBleed
9 ChangeCipherSpec Injection
10 BREACH
11 BEAST
13 RC4 Support
15 Lucky13
19 Certificate expiration
Confidential 16
21 Host Name mismatch
23 SSLv2 support
26 HTTPS stripping
27 SurfJacking
29 Cache control
Cryptography
Confidential 17
3.5 Test Cases for Windows
Confidential 18
Confidential 19
3.6 Test Cases for Android and iOS
Confidential 20
Confidential 21
Test Cases for iOS
Confidential 22
Confidential 23
3.7 Tests Cases for Cloud (AWS, Azure, GCP, and Other)
17 Test for loopholes that add root certificates and SSH private keys to
25 Test for MITM attack penetration on Elastic Load Balancer (ELB) for
session hijacking
management service
Confidential 24
29 Test to alter data in datastore for fraudulent transactions or static
website compromise
certificates for the resource record set to divert traffic, create phishing
sites & abuse the brand (AWS ACM, AWS Route53, Azure DNS Service)
37 Test for Disable data store access logging to prevent detection and
38 Test to alter log retention or damage the integrity of logs (S3 lifecycle,
IAM: UpdateLoginProfile)
41 Test to Change the default policy for a user or new users to include
Confidential 25
3.7 Tests Cases for Blockchain
# Test Cases for Cloud Services
Confidential 26
Your plug & play cyber security suite.
Questions? Contact us at
hello@getastra.com