mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 23:04:05 -06:00
vault backup: 2022-09-08 12:08:34
This commit is contained in:
parent
7242b1cf5b
commit
df96ce6159
@ -28,13 +28,17 @@ Jet Hughes - 9474308
|
|||||||
- '; update PRODUCT set UNIT_PRICE = 0 where 1=1;--
|
- '; update PRODUCT set UNIT_PRICE = 0 where 1=1;--
|
||||||
|
|
||||||
## Javascript Injection
|
## Javascript Injection
|
||||||
- I could be possible to perform a javascript injection as the users name is displayed in the website. and prodcut information is displayed in the view catalogue page
|
- It ispossible to perform a javascript injection as the users name is displayed in the website. and prodcut information is displayed in the view catalogue page
|
||||||
- You could update a products name to be a script which would then run on others systems
|
- I was able to create an account and log in using the username ''<script>alert("hello")</script>''. However when I did log in the username wasn't displayed in the browser, and alert didn't show. I also repeated the process with the user name ''<script>console.log("hello")</script>'' which also didn't run
|
||||||
- e.g. '; update PRODUCT set DESCRIPTION = '<script>alert("hello")</script>' where PRODUCT_ID = 67696;--
|
- You was able to update a product name to be a script which would then run on others systems
|
||||||
|
- e.g. '; update PRODUCT set DESCRIPTION = '<script>alert("hello")</script>' where PRODUCT_ID = 67696;--
|
||||||
|
- this could be used to export JSESSIONIDs of other users. Which would allow the attack to access their account (while the other user is logged in).
|
||||||
|
- It could also be used to present the user with a message
|
||||||
|
|
||||||
## Path traversal
|
## Path traversal
|
||||||
- I dont think there are any path traversal flaws in this website. This is because there isn't any urls which contain queryies or
|
- You can access the welcome page simply using the path /catalogue/welcome.jsp. This will load the welcome page with the username null. However it is unclear whether this is a security issue as curently the welcome page offers no functionality.
|
||||||
|
- I dont think there are any path traversal flaws in this website. This is because there isn't any urls which contain queries or parameters relating to sensitive pages.
|
||||||
## Network-Level security
|
## Network-Level security
|
||||||
- when a user logs in a post request to the server transmits the username and unhashed password to the server. This informaiton is susceptible to a man in the middle attack or
|
- when a user logs in a post request to the server transmits the username and unhashed password to the server. This informaiton is susceptible to a man in the middle attack or other kinds of interception. Hopefully the website uses http.
|
||||||

|

|
||||||
## Other
|
## Other
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user