| Risk Level | Number of Alerts |
|---|---|
|
High
|
0
|
|
Medium
|
7
|
|
Low
|
7
|
|
Informational
|
5
|
|
False Positives:
|
0
|
For each step: result (Pass/Fail) - risk (of highest alert(s) for the step, if any).
| Name | Risk Level | Number of Instances |
|---|---|---|
| Absence of Anti-CSRF Tokens | Medium | 1 |
| CSP: Failure to Define Directive with No Fallback | Medium | 1 |
| CSP: Wildcard Directive | Medium | 1 |
| CSP: script-src unsafe-inline | Medium | 1 |
| CSP: style-src unsafe-inline | Medium | 1 |
| Content Security Policy (CSP) Header Not Set | Medium | 2 |
| Proxy Disclosure | Medium | 4 |
| Cookie No HttpOnly Flag | Low | 1 |
| Cookie Slack Detector | Low | 1 |
| Cookie Without Secure Flag | Low | 1 |
| Cookie with SameSite Attribute None | Low | 1 |
| Cookie without SameSite Attribute | Low | 3 |
| Insufficient Site Isolation Against Spectre Vulnerability | Low | 3 |
| Permissions Policy Header Not Set | Low | 3 |
| Non-Storable Content | Informational | 3 |
| Re-examine Cache-control Directives | Informational | 1 |
| Session Management Response Identified | Informational | 2 |
| Storable and Cacheable Content | Informational | 2 |
| User Agent Fuzzer | Informational | 48 |
|
Medium |
Absence of Anti-CSRF Tokens |
|---|---|
| Description |
No Anti-CSRF tokens were found in a HTML submission form.
A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The underlying cause is application functionality using predictable URL/form actions in a repeatable way. The nature of the attack is that CSRF exploits the trust that a web site has for a user. By contrast, cross-site scripting (XSS) exploits the trust that a user has for a web site. Like XSS, CSRF attacks are not necessarily cross-site, but they can be. Cross-site request forgery is also known as CSRF, XSRF, one-click attack, session riding, confused deputy, and sea surf.
CSRF attacks are effective in a number of situations, including:
* The victim has an active session on the target site.
* The victim is authenticated via HTTP auth on the target site.
* The victim is on the same local network as the target site.
CSRF has primarily been used to perform an action against a target site using the victim's privileges, but recent techniques have been discovered to disclose information by gaining access to the response. The risk of information disclosure is dramatically increased when the target site is vulnerable to XSS, because XSS can be used as a platform for CSRF, allowing the attack to operate within the bounds of the same-origin policy.
|
| URL | https://auth.nmt.com.hk/auth/realms/nmt/protocol/saml?SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&SAMLRequest=fVNdj9owEPwrkd%2BTOLnjDixAotAPJAoR0D70pXKcpViN7dTrcPTf13GONg89nhLP7o5nJpspclU3bNG6s97DrxbQRVdVa2ShMCOt1cxwlMg0V4DMCXZYfN6wPKGsscYZYWoyGLk%2FwRHBOmk0idarGdlt3292H9fb76OxeKAUJnFJxVP8%2BJxl8ZhXTzEtH0fjMj%2BVEzoi0Vew6GdnxFN5AsQW1hod185DNB%2FF9Dmm%2BZFS9pCzbPKNRIU1F1mB3XolM6KV45WS%2FvKV9yk1d4Ht7FyDLE25DyHxPYkwKjn%2FDOfUAq8Vph5Ob3bTzmfgDsd3UldS%2F7hvvOybkH06Hou42B2OJFrcwlgaja0CewB7kQK%2B7Df%2FREEN%2FAJDWT0SRHCBZD7t3lhIw8774jQdYtP%2BG3cZrFeFqaX4HX0wVnH3tuYsyQIiq%2FgUWlmrsQEhTxIqL72uzcvSZ%2BN8rM62QKL0ds%2FrGkEVlsp7c3B10dKohluJXeBw5cLdhA%2B7lrVfkD2c5nd3SDDR9Xm48I8XY6tXv%2F%2Bl6mtvyPpbHf4A8z8%3D&RelayState=https%3A%2F%2Feleave.nmt.com.hk%2Feleave%2FsamlLogin&Signature=exSYcP2P1CqVMUY9gb7hugoRIT%2BC5YoV23Ty7Ki3VG9g19Z0%2FsEUm4jofOc9gyQtTB9HCTx90mU2MF8%2B2HLPku5bws48zo7r1EFWQYseYxSNap13V0tPBJe6JXOTia6Of61lSr2RDsv0SGzMM6PCxEc7yqkvchKMoZGxWpx5zO8%3D |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | <form id="kc-form-login" onsubmit="login.disabled = true; return true;" action="https://auth.nmt.com.hk/auth/realms/nmt/login-actions/authenticate?session_code=QiZLGTiAfJ3UoypzKHBRz7Fu0DJU7SAotQgD7flK0Js&execution=0708bb7b-ca86-4eb2-a791-96686a27aa77&client_id=eleave&tab_id=I1qMjzOuVNc" method="post"> |
| Other Info | No known Anti-CSRF token [anticsrf, CSRFToken, __RequestVerificationToken, csrfmiddlewaretoken, authenticity_token, OWASP_CSRFTOKEN, anoncsrf, csrf_token, _csrf, _csrfSecret, __csrf_magic, CSRF, _token, _csrf_token, _csrfToken] was found in the following HTML form: [Form 1: "id-hidden-input" "kc-login" "password" "username" ]. |
| Instances | 1 |
| Solution |
Phase: Architecture and Design
Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
For example, use anti-CSRF packages such as the OWASP CSRFGuard.
Phase: Implementation
Ensure that your application is free of cross-site scripting issues, because most CSRF defenses can be bypassed using attacker-controlled script.
Phase: Architecture and Design
Generate a unique nonce for each form, place the nonce into the form, and verify the nonce upon receipt of the form. Be sure that the nonce is not predictable (CWE-330).
Note that this can be bypassed using XSS.
Identify especially dangerous operations. When the user performs a dangerous operation, send a separate confirmation request to ensure that the user intended to perform that operation.
Note that this can be bypassed using XSS.
Use the ESAPI Session Management control.
This control includes a component for CSRF.
Do not use the GET method for any request that triggers a state change.
Phase: Implementation
Check the HTTP Referer header to see if the request originated from an expected page. This could break legitimate functionality, because users or proxies may have disabled sending the Referer for privacy reasons.
|
| Reference |
https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
https://cwe.mitre.org/data/definitions/352.html |
| CWE Id | 352 |
| WASC Id | 9 |
| Plugin Id | 10202 |
|
Medium |
Content Security Policy (CSP) Header Not Set |
|---|---|
| Description |
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
|
| URL | https://eleave.nmt.com.hk/robots.txt |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/sitemap.xml |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | |
| Other Info | |
| Instances | 2 |
| Solution |
Ensure that your web server, application server, load balancer, etc. is configured to set the Content-Security-Policy header.
|
| Reference |
https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy
https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html https://www.w3.org/TR/CSP/ https://w3c.github.io/webappsec-csp/ https://web.dev/articles/csp https://caniuse.com/#feat=contentsecuritypolicy https://content-security-policy.com/ |
| CWE Id | 693 |
| WASC Id | 15 |
| Plugin Id | 10038 |
|
Medium |
Proxy Disclosure |
|---|---|
| Description |
1 proxy server(s) were detected or fingerprinted. This information helps a potential attacker to determine
- A list of targets for an attack against the application.
- Potential vulnerabilities on the proxy servers that service the application.
- The presence or absence of any proxy-based components that might cause attacks against the application to be detected, prevented, or mitigated.
|
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | |
| Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
| Evidence | |
| Other Info | Using the TRACE, OPTIONS, and TRACK methods, the following proxy servers have been identified between ZAP and the application/web server: - Unknown The following web/application server has been identified: - Unknown |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | |
| Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
| Evidence | |
| Other Info | Using the TRACE, OPTIONS, and TRACK methods, the following proxy servers have been identified between ZAP and the application/web server: - Unknown The following web/application server has been identified: - Unknown |
| URL | https://eleave.nmt.com.hk/robots.txt |
| Method | GET |
| Parameter | |
| Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
| Evidence | |
| Other Info | Using the TRACE, OPTIONS, and TRACK methods, the following proxy servers have been identified between ZAP and the application/web server: - Unknown The following web/application server has been identified: - Unknown |
| URL | https://eleave.nmt.com.hk/sitemap.xml |
| Method | GET |
| Parameter | |
| Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
| Evidence | |
| Other Info | Using the TRACE, OPTIONS, and TRACK methods, the following proxy servers have been identified between ZAP and the application/web server: - Unknown The following web/application server has been identified: - Unknown |
| Instances | 4 |
| Solution |
Disable the 'TRACE' method on the proxy servers, as well as the origin web/application server.
Disable the 'OPTIONS' method on the proxy servers, as well as the origin web/application server, if it is not required for other purposes, such as 'CORS' (Cross Origin Resource Sharing).
Configure the web and application servers with custom error pages, to prevent 'fingerprintable' product-specific error pages being leaked to the user in the event of HTTP errors, such as 'TRACK' requests for non-existent pages.
Configure all proxies, application servers, and web servers to prevent disclosure of the technology and version information in the 'Server' and 'X-Powered-By' HTTP response headers.
|
| Reference | https://tools.ietf.org/html/rfc7231#section-5.1.2 |
| CWE Id | 204 |
| WASC Id | 45 |
| Plugin Id | 40025 |
|
Low |
Cookie No HttpOnly Flag |
|---|---|
| Description |
A cookie has been set without the HttpOnly flag, which means that the cookie can be accessed by JavaScript. If a malicious script can be run on this page then the cookie will be accessible and can be transmitted to another site. If this is a session cookie then session hijacking may be possible.
|
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | JSESSIONID |
| Attack | |
| Evidence | Set-Cookie: JSESSIONID |
| Other Info | |
| Instances | 1 |
| Solution |
Ensure that the HttpOnly flag is set for all cookies.
|
| Reference | https://owasp.org/www-community/HttpOnly |
| CWE Id | 1004 |
| WASC Id | 13 |
| Plugin Id | 10010 |
|
Low |
Cookie Slack Detector |
|---|---|
| Description |
Repeated GET requests: drop a different cookie each time, followed by normal request with all cookies to stabilize session, compare responses against original baseline GET. This can reveal areas where cookie based authentication/attributes are not actually enforced.
|
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | |
| Other Info | NOTE: Because of its name this cookie may be important, but dropping it appears to have no effect: [JSESSIONID] Cookies that don't have expected effects can reveal flaws in application logic. In the worst case, this can reveal where authentication via cookie token(s) is not actually enforced. These cookies affected the response: These cookies did NOT affect the response: JSESSIONID |
| Instances | 1 |
| Solution | |
| Reference | https://cwe.mitre.org/data/definitions/205.html |
| CWE Id | 205 |
| WASC Id | 45 |
| Plugin Id | 90027 |
|
Low |
Cookie Without Secure Flag |
|---|---|
| Description |
A cookie has been set without the secure flag, which means that the cookie can be accessed via unencrypted connections.
|
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | JSESSIONID |
| Attack | |
| Evidence | Set-Cookie: JSESSIONID |
| Other Info | |
| Instances | 1 |
| Solution |
Whenever a cookie contains sensitive information or is a session token, then it should always be passed using an encrypted channel. Ensure that the secure flag is set for cookies containing such sensitive information.
|
| Reference | https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/06-Session_Management_Testing/02-Testing_for_Cookies_Attributes.html |
| CWE Id | 614 |
| WASC Id | 13 |
| Plugin Id | 10011 |
|
Informational |
Non-Storable Content |
|---|---|
| Description |
The response contents are not storable by caching components such as proxy servers. If the response does not contain sensitive, personal or user-specific information, it may benefit from being stored and cached, to improve performance.
|
| URL | https://auth.nmt.com.hk/auth/realms/nmt/protocol/saml?SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&SAMLRequest=fVNdj9owEPwrkd%2BTOLnjDixAotAPJAoR0D70pXKcpViN7dTrcPTf13GONg89nhLP7o5nJpspclU3bNG6s97DrxbQRVdVa2ShMCOt1cxwlMg0V4DMCXZYfN6wPKGsscYZYWoyGLk%2FwRHBOmk0idarGdlt3292H9fb76OxeKAUJnFJxVP8%2BJxl8ZhXTzEtH0fjMj%2BVEzoi0Vew6GdnxFN5AsQW1hod185DNB%2FF9Dmm%2BZFS9pCzbPKNRIU1F1mB3XolM6KV45WS%2FvKV9yk1d4Ht7FyDLE25DyHxPYkwKjn%2FDOfUAq8Vph5Ob3bTzmfgDsd3UldS%2F7hvvOybkH06Hou42B2OJFrcwlgaja0CewB7kQK%2B7Df%2FREEN%2FAJDWT0SRHCBZD7t3lhIw8774jQdYtP%2BG3cZrFeFqaX4HX0wVnH3tuYsyQIiq%2FgUWlmrsQEhTxIqL72uzcvSZ%2BN8rM62QKL0ds%2FrGkEVlsp7c3B10dKohluJXeBw5cLdhA%2B7lrVfkD2c5nd3SDDR9Xm48I8XY6tXv%2F%2Bl6mtvyPpbHf4A8z8%3D&RelayState=https%3A%2F%2Feleave.nmt.com.hk%2Feleave%2FsamlLogin&Signature=exSYcP2P1CqVMUY9gb7hugoRIT%2BC5YoV23Ty7Ki3VG9g19Z0%2FsEUm4jofOc9gyQtTB9HCTx90mU2MF8%2B2HLPku5bws48zo7r1EFWQYseYxSNap13V0tPBJe6JXOTia6Of61lSr2RDsv0SGzMM6PCxEc7yqkvchKMoZGxWpx5zO8%3D |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | no-store |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | 302 |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | 302 |
| Other Info | |
| Instances | 3 |
| Solution |
The content may be marked as storable by ensuring that the following conditions are satisfied:
The request method must be understood by the cache and defined as being cacheable ("GET", "HEAD", and "POST" are currently defined as cacheable)
The response status code must be understood by the cache (one of the 1XX, 2XX, 3XX, 4XX, or 5XX response classes are generally understood)
The "no-store" cache directive must not appear in the request or response header fields
For caching by "shared" caches such as "proxy" caches, the "private" response directive must not appear in the response
For caching by "shared" caches such as "proxy" caches, the "Authorization" header field must not appear in the request, unless the response explicitly allows it (using one of the "must-revalidate", "public", or "s-maxage" Cache-Control response directives)
In addition to the conditions above, at least one of the following conditions must also be satisfied by the response:
It must contain an "Expires" header field
It must contain a "max-age" response directive
For "shared" caches such as "proxy" caches, it must contain a "s-maxage" response directive
It must contain a "Cache Control Extension" that allows it to be cached
It must have a status code that is defined as cacheable by default (200, 203, 204, 206, 300, 301, 404, 405, 410, 414, 501).
|
| Reference |
https://datatracker.ietf.org/doc/html/rfc7234
https://datatracker.ietf.org/doc/html/rfc7231 https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html |
| CWE Id | 524 |
| WASC Id | 13 |
| Plugin Id | 10049 |
|
Informational |
Storable and Cacheable Content |
|---|---|
| Description |
The response contents are storable by caching components such as proxy servers, and may be retrieved directly from the cache, rather than from the origin server by the caching servers, in response to similar requests from other users. If the response data is sensitive, personal or user-specific, this may result in sensitive information being leaked. In some cases, this may even result in a user gaining complete control of the session of another user, depending on the configuration of the caching components in use in their environment. This is primarily an issue where "shared" caching servers such as "proxy" caches are configured on the local network. This configuration is typically found in corporate or educational environments, for instance.
|
| URL | https://eleave.nmt.com.hk/robots.txt |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | |
| Other Info | In the absence of an explicitly specified caching lifetime directive in the response, a liberal lifetime heuristic of 1 year was assumed. This is permitted by rfc7234. |
| URL | https://eleave.nmt.com.hk/sitemap.xml |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | |
| Other Info | In the absence of an explicitly specified caching lifetime directive in the response, a liberal lifetime heuristic of 1 year was assumed. This is permitted by rfc7234. |
| Instances | 2 |
| Solution |
Validate that the response does not contain sensitive, personal or user-specific information. If it does, consider the use of the following HTTP response headers, to limit, or prevent the content being stored and retrieved from the cache by another user:
Cache-Control: no-cache, no-store, must-revalidate, private
Pragma: no-cache
Expires: 0
This configuration directs both HTTP 1.0 and HTTP 1.1 compliant caching servers to not store the response, and to not retrieve the response (without validation) from the cache, in response to a similar request.
|
| Reference |
https://datatracker.ietf.org/doc/html/rfc7234
https://datatracker.ietf.org/doc/html/rfc7231 https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html |
| CWE Id | 524 |
| WASC Id | 13 |
| Plugin Id | 10049 |
|
Informational |
User Agent Fuzzer |
|---|---|
| Description |
Check for differences in response based on fuzzed User Agent (eg. mobile sites, access as a Search Engine Crawler). Compares the response statuscode and the hashcode of the response body with the original response.
|
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/ |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
| Evidence | |
| Other Info | |
| URL | https://eleave.nmt.com.hk/eleave/samlLogin?loginType=keycloak |
| Method | GET |
| Parameter | Header User-Agent |
| Attack | msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
| Evidence | |
| Other Info | |
| Instances | 48 |
| Solution | |
| Reference | https://owasp.org/wstg |
| CWE Id | |
| WASC Id | |
| Plugin Id | 10104 |