Wapiti Vulnerability Report: Target: Http://123.231.148.147:8081/webservice
Wapiti Vulnerability Report: Target: Http://123.231.148.147:8081/webservice
Wapiti Vulnerability Report: Target: Http://123.231.148.147:8081/webservice
Target: http://123.231.148.147:8081/webservice/
Date of the scan: Sat, 16 Oct 2021 05:49:33 +0000. Scope of the scan: folder
Summary
Backup file 0
Weak credentials 0
CRLF Injection 0
Command execution 0
Path Traversal 0
Htaccess Bypass 0
Open Redirect 0
SQL Injection 0
Resource consumption 0
Solutions
Check if your framework has built-in CSRF protection and use it. If framework does not
have built-in CSRF protection add CSRF tokens to all state changing requests (requests
that cause actions on the site) and validate them on backend.
References
• OWASP: Testing for Cross Site Request Forgery
• OWASP: Cross-Site Request Forgery Prevention Cheat Sheet
• CWE-352: Cross-Site Request Forgery (CSRF)
Solutions
Make sure the script is up-to-date and restrict access to it if possible.
References
• Mitre: Search details of a CVE
Solutions
This is only for informational purposes.
References
• OWASP: Fingerprint Web Application Framework
Solutions
This is only for informational purposes.
References
• OWASP: Fingerprint Web Server
Solutions
This is only for informational purposes.
References
• OWASP: Fingerprint Web Server
• OWASP: Fingerprint Web Application Framework