1
+ {
2
+ "target" : " https://www.hackthissite.org" ,
3
+ "timestamp" : " 2025-03-24T00:32:43Z" ,
4
+ "duration" : " 20.002003241s" ,
5
+ "vulnerabilities" : [
6
+ {
7
+ "id" : " HEADER-01" ,
8
+ "name" : " Missing X-Frame-Options Header" ,
9
+ "description" : " The X-Frame-Options header is not set, which may allow clickjacking attacks" ,
10
+ "severity" : " MEDIUM" ,
11
+ "cvss" : 5.8 ,
12
+ "detail" : " X-Frame-Options header prevents a web page from being displayed in a frame on another domain" ,
13
+ "remediation" : " Add X-Frame-Options header with value DENY or SAMEORIGIN" ,
14
+ "reference" : " https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options"
15
+ },
16
+ {
17
+ "id" : " HEADER-03" ,
18
+ "name" : " Missing X-Content-Type-Options Header" ,
19
+ "description" : " The X-Content-Type-Options header is not set" ,
20
+ "severity" : " LOW" ,
21
+ "cvss" : 3.7 ,
22
+ "detail" : " X-Content-Type-Options prevents MIME type sniffing" ,
23
+ "remediation" : " Add X-Content-Type-Options header with value nosniff" ,
24
+ "reference" : " https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options"
25
+ },
26
+ {
27
+ "id" : " INFO-01" ,
28
+ "name" : " Server Information Disclosure" ,
29
+ "description" : " The server header discloses version information" ,
30
+ "severity" : " LOW" ,
31
+ "cvss" : 3.1 ,
32
+ "detail" : " Server header contains: HackThisSite" ,
33
+ "remediation" : " Configure the server to provide minimal information in the Server header" ,
34
+ "reference" : " https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002)"
35
+ },
36
+ {
37
+ "id" : " SQLI-02" ,
38
+ "name" : " Time-Based Blind SQL Injection" ,
39
+ "description" : " The application appears vulnerable to time-based blind SQL injection" ,
40
+ "severity" : " CRITICAL" ,
41
+ "cvss" : 8.5 ,
42
+ "detail" : " The application response time increased significantly with a time-delay SQL payload" ,
43
+ "evidence" : " Payload: '; WAITFOR DELAY '0:0:2'--, Response time: 1.5005967230000001 seconds" ,
44
+ "remediation" : " Use parameterized queries or prepared statements" ,
45
+ "reference" : " https://owasp.org/www-community/attacks/Blind_SQL_Injection"
46
+ },
47
+ {
48
+ "id" : " HTTP-SMUGGLE-01" ,
49
+ "name" : " HTTP Request Smuggling (CL.TE)" ,
50
+ "description" : " The server is vulnerable to HTTP request smuggling using Content-Length and Transfer-Encoding headers" ,
51
+ "severity" : " HIGH" ,
52
+ "cvss" : 8.1 ,
53
+ "detail" : " The server appears to process both Content-Length and Transfer-Encoding headers, which can lead to request smuggling attacks." ,
54
+ "evidence" : " Server accepted malformed request with conflicting headers" ,
55
+ "remediation" : " Configure the server to reject requests with both Content-Length and Transfer-Encoding headers or ensure consistent handling." ,
56
+ "reference" : " https://portswigger.net/web-security/request-smuggling"
57
+ },
58
+ {
59
+ "id" : " HTTP-SMUGGLE-02" ,
60
+ "name" : " HTTP Request Smuggling (TE.CL)" ,
61
+ "description" : " The server is vulnerable to HTTP request smuggling using Transfer-Encoding and Content-Length headers" ,
62
+ "severity" : " HIGH" ,
63
+ "cvss" : 8.1 ,
64
+ "detail" : " The server appears to process Transfer-Encoding over Content-Length, which can lead to request smuggling attacks." ,
65
+ "evidence" : " Server accepted malformed request with conflicting headers" ,
66
+ "remediation" : " Configure the server to reject requests with both Content-Length and Transfer-Encoding headers or ensure consistent handling." ,
67
+ "reference" : " https://portswigger.net/web-security/request-smuggling"
68
+ },
69
+ {
70
+ "id" : " CLICKJACK-01" ,
71
+ "name" : " Clickjacking Vulnerability" ,
72
+ "description" : " The application is vulnerable to clickjacking attacks" ,
73
+ "severity" : " MEDIUM" ,
74
+ "cvss" : 6.5 ,
75
+ "detail" : " The application does not set X-Frame-Options or CSP frame-ancestors directive" ,
76
+ "remediation" : " Set X-Frame-Options header to DENY or SAMEORIGIN, or use CSP frame-ancestors directive" ,
77
+ "reference" : " https://owasp.org/www-community/attacks/Clickjacking"
78
+ }
79
+ ],
80
+ "stats" : {
81
+ "critical" : 1 ,
82
+ "high" : 2 ,
83
+ "medium" : 2 ,
84
+ "low" : 2 ,
85
+ "info" : 0 ,
86
+ "total" : 7
87
+ }
88
+ }
0 commit comments