Hoy estaba realizando varios analizis en Vega a sitios web con PHP y encontre varias vulnerabilidades una de ellas que no se como explotarla pero creo que me puede servir de algo fue esta:
Session Cookie Without Secure Flag
REQUEST
GET /
RESOURCE CONTENT
PHPSESSID=1430c1b28c90e46a5b4a384116152296; path=/
¿Alguien me puede explicar como explotarla o de que trata esta vulnerabilidad?
Tambien esta
Cross-Site Script Include
AT A GLANCE
Classification
Environment
Resource
/https:/www.*******.com/
Risk
High
GET /https:/www.*******.com/?action=login2"%20-->">'>'"
RESOURCE CONTENT
Local domain: www.*******.com
Script source: https://static.easyname.com/vendor/bootstrap/docs/assets/js/bootstrap.min.js
DISCUSSION
Vega detected that content on a server is including javascript content from an unrelated domain. When this script code is fetched by a user browser and loaded into the DOM, it will have complete control over the DOM, bypassing the protection offered by the same-origin policy. Even if the source of the script code is trusted by the website operator, malicious code could be introduced if the server is ever compromised. It is strongly recommended that sensitive applications host all included javascript locally.
Yo se que deberia de ponerme a buscar horas y horas pero realmente tengo el tiempo muy limitado con mis estudios y desearia que me pudieran ayudar
Gracias
Arin3.
Session Cookie Without Secure Flag
REQUEST
GET /
RESOURCE CONTENT
PHPSESSID=1430c1b28c90e46a5b4a384116152296; path=/
¿Alguien me puede explicar como explotarla o de que trata esta vulnerabilidad?
Tambien esta
Cross-Site Script Include
AT A GLANCE
Classification
Environment
Resource
/https:/www.*******.com/
Risk
High
GET /https:/www.*******.com/?action=login2"%20-->">'>'"
RESOURCE CONTENT
Local domain: www.*******.com
Script source: https://static.easyname.com/vendor/bootstrap/docs/assets/js/bootstrap.min.js
DISCUSSION
Vega detected that content on a server is including javascript content from an unrelated domain. When this script code is fetched by a user browser and loaded into the DOM, it will have complete control over the DOM, bypassing the protection offered by the same-origin policy. Even if the source of the script code is trusted by the website operator, malicious code could be introduced if the server is ever compromised. It is strongly recommended that sensitive applications host all included javascript locally.
Yo se que deberia de ponerme a buscar horas y horas pero realmente tengo el tiempo muy limitado con mis estudios y desearia que me pudieran ayudar
Gracias
Arin3.