Unexpected Injection
SMTP header injection
Description Email injection is a security weakness that allows a malicious attacker to exploit email-related features, such as email contact forms found on websites, in order to send harmful email content to unintended recipients. Impact - Sending ...
Error-based SQL Injection
Description An error-based attack is based on errors emitted by the database server, which allows understanding the database structure and exfiltrating database content. Impact - Allow an attacker to interfere with the queries that an application ...
Client-side template injection
Description The application allows injecting malicious entries into a client-side command template. This vulnerability occurs when an attacker can use the template's template syntax to inject a malicious payload into a template, which is then ...
Serverless - one dedicated IAM role per function
Description Avoid sharing IAM roles with multiple Lambda functions. As permissions are added to the role, these are shared across all functions using this role. By using one dedicated IAM role per function, you can control permissions more ...
Universal cross-site scripting (UXSS)
Description Universal cross-site scripting exploits client-side vulnerabilities, either through the browser or the extensions that the user enables, leading to the possibility of cross-side scripting exploitation or the execution of malicious code. ...
Server side cross-site scripting
Description It is possible to inject JavaScript into application fields, with the goal of having the server execute malicious code before rendering user input. This allows a remote attacker to compromise internal server files, make requests on behalf ...
Server side template injection
Description The application allows injecting malicious entries into a server-side command template. This vulnerability occurs when an attacker can use the template's template syntax to inject a malicious payload into a template, which is then ...
Prototype Pollution
Description An application object, method or module can be overwritten with malicious logic due to the lack of validations and the nature of the JavaScript language. Impact - Overwrite or pollute the behavior of existing methods in the application. - ...
DOM-Based cross-site scripting (XSS)
Description The web application generates dynamic web content from the client side without validating the origin of the potentially malicious data. Impact Generate web pages that could contain malicious scripts injected into untrusted data. ...
Authentication mechanism absence or evasion - Response tampering
Description The OTP validation is performed according to the response of the request, an attacker can modify the response of the request to include the success message and thus continue with the flow to do the unblocking. Impact Skip OTP validation. ...
Weak credential policy - Temporary passwords
Description Temporary passwords do not have strong enough security policies. Impact Compromise temporary passwords to gain unauthorized access to the application Recommendation Set secure temporary passwords by following the recommended best ...
Weak credential policy - Password strength
Description The credential policy present in the system does not have the recommended parameters. Impact Allow users to assign weak passwords to their accounts, which can later be easily found by an attacker through brute force or dictionary attacks. ...
Technical information leak - Content response
Description It is possible to obtain technical information such as: - System component versions (HTTP headers, service banner, etc.) - Specific information about the configuration of server components (php.ini, web.config) Impact Gather technical ...
Missing secure obfuscation - JavaScript
Description It is possible to obtain source code from the application since it has only been partially obfuscated in a secure way. This could allow an attacker to understand the inner workings of the application. Impact - Understand the operation of ...
Lack of data validation - Token
Description The generated JWT access token does not validate if the signature is valid so the token can be modified and requests are accepted; even removing the signature from the token works. Impact - Generate tokens by bypassing existing ...
Lack of data validation - Non Sanitized Variables
Description The system constructs system commands using inputs that can be manipulated externally, it does not correctly neutralize special elements that could modify the system command. Impact Execute unauthorized scripts. Recommendation Use ...
Lack of data validation - OTP
Description There is no evidence of validation of the values sent in the tokenCode parameter to complete the request, allowing random values to be used in multiple attempts. Impact Perform the account creation process without knowing the generated ...
Lack of data validation - Special Characters
Description The system does not validate that special characters are not entered in some fields. Impact Cause unexpected behavior of the application. Recommendation Validate in all fields that no special characters are entered. Threat Anonymous ...
XML injection (XXE) - Unmarshaller
Description The XML unmarshaller is not configured securely. It allows to read a source of XML data and bind its values to a new instance of an object. Impact - Escalate attack to compromise the underlying server or other back-end infrastructure. - ...
Lack of data validation - HTML code
Description It is possible to inject valid HTML code, which could be interpreted by the site receiving the JSON response. Impact - Insert character sequences whose semantics result in the creation of new HTML elements, log file injection, remote ...
SQL injection - Code
Description Dynamic SQL statements are generated without the required data validation and without using parameterized statements or stored procedures. Impact Inject SQL statements with the possibility of obtain information about the database, as well ...
Restricted fields manipulation
Description From the self-management functionality for the registration of an employee, it is possible to change the information of other employees from other companies. An attacker can initiate a request to confirm the registration of an employee ...
Lack of data validation - Emails
Description The application does not control that server-side emails used to register users do not belong to disposable mailboxes such as yopmail. Impact Reset passwords for registered users with disposable mailboxes. Recommendation Implement a ...
Lack of data validation - Out of range
Description Authenticated user in a domain that restricts certain functionalities such as Employee Management, can bypass the restrictions by using absolute paths to these functionalities. Impact Access the employee management panel from an ...
Lack of data validation - Numbers
Description There is insecure functionality that can break the current business logic and negatively impact the business. Impact Carry out transactions with a lower value than it should be. Recommendation Validate that the values of the transaction ...
Lack of data validation - Dates
Description The application does not control on the server side that you have permission to modify certain fields, on the front end there are restrictions but it is possible to ignore them and send requests that the server does not validate and ...
Lack of data validation - Headers
Description In the source code the information of some HTTP headers is not being validated, so different values could be injected in order to achieve some XSS attack or compromise the integrity of the stored information. Impact Inject potentially ...
Lack of data validation - Input Length
Description Endpoints allow more content to be added to the body than is usually allowed by the endpoint, thus making it possible to send massive amounts of characters and expand attack vectors. Impact Send massive information in the request body. ...
Lack of data validation - Host Header Injection
Description The application allows to manipulate the host header which may lead to unintended redirects to malicious websites. Impact Redirect the user to harfmful websites. Recommendation Validate the host header against a whitelist of trusty ...
Lack of data validation - Reflected Parameters
Description Included in the server error responses is unvalidated user input containing special characters, which can lead to vulnerabilities such as XSS. Impact Inject special characters in server responses. Recommendation Validate on the server ...
Lack of data validation - Responses
Description The response data of some requests are sent in subsequent requests, so when the values of these responses are changed to invalid data, subsequent requests take this erroneous information without any type of validation. Impact Compromise ...
Lack of data validation - Session Cookie
Description The Session Cookie is generated from any value sent from the front end, allowing to modify it and set an insecure session cookie. Impact - Set any value as a session cookie. - Consume reporting services without authorization. ...
Lack of data validation - Content Spoofing
Description An unauthorized attacker generating a token without credentials, due to a misconfiguration in the file upload can replace files already uploaded by a client since the application does not validate if these were already sent in the file ...
Lack of data validation - Modify DOM Elements
Description The application allows the creation of dynamic DOM (Document Object Model) elements from user controlled inputs. In addition to being functionally expensive, this operation can lead to the creation and exploitation of other ...
Lack of data validation - Source Code
Description Within the source code there is evidence of the use of dangerous regular expressions, because they make use of complex operations to find matches, which can lead an attacker to send a specific string of data that could cause the server to ...
Lack of data validation - Web Service
Description The application does not control on the server side the data being sent in certain fields and allows the use of special characters, which leads to new attack vectors. In addition, there is no adequate control over the size of the fields ...
Lack of data validation - Header x-amzn-RequestId
Description The application does not control server side permission to modify certain fields and allows potentially dangerous character strings to be entered in the x-amzn-RequestId Header. Impact - Reflect dangerous character strings to try to ...
Lack of data validation
Description The application does not control the the server side where you have permission to modify certain fields and allows the use of invalid data in some fields, for example, an ID composed of only letters. Impact Inject potentially malicious ...
SQL Injection - Headers
Description The application allows injecting SQL statements in the idClient header and application fields. Impact - Obtain confidential information from the database. - Modify and delete information from the database. Recommendation Perform database ...
Time-based SQL Injection
Description In a time-based attack, someone could inject a SQL command to the server with code to force a delay in the execution of the queries or with a heavy query that generates this time delay. Depending on the time response, it is possible to ...
Next page