Web-Application-VAPT-Sample-Report-PDF-CyberSapiens
Web-Application-VAPT-Sample-Report-PDF-CyberSapiens
CyberSapiens
Report on
XYZ
Table of Contents
1. Document Attributes................................................................................................................... 3
2. Executive Summary ..................................................................................................................... 3
3. VAPT Test Graph.......................................................................................................................... 3
4. AUDITING SCOPE .............................................................................................................................. 4
5. METHODOLOGIES and Standards ..................................................................................................... 4
6. VAPT Project Timeframe ............................................................................................................. 4
7. Risk Ratings and Treat Level ........................................................................................................ 4
8. Vulnerability Summary ................................................................................................................ 5
9. Observations ............................................................................................................................ 5
10. Tools used for the Assessment ................................................................................................ 7
11. Conclusion ............................................................................................................................... 8
1. Document Attributes
Date 02-07-2022
Version 1.0
Prepared by NAME
Reviewed by NAME
Submitted to NAME
2. Executive Summary
CyberSapiens United LLP was contracted by CLIENT to conduct a web application vulnerability
assessment and penetration testing activity to determine its exposure to the targeted attacks and
ensure that CLIENT web application is secure from advanced attack techniques.
This activity was conducted in a manner that malicious attacker is engaged to assess the provided
scope of CLIENT. The goals of the vulnerability assessment and Penetration Testing scan were:
• Identifying the threats or vulnerabilities that might be present on the web application
• Confidentiality of the CLIENT data that are stored on the company storage/servers
Risk Distrubusion
4. AUDITING SCOPE
Detailed list of assets is given in the below table:
The following methodologies and standards were used during the project.
• OWASP testing guide
• PTES
• WSTG
• Open Source Security Testing Methodology Manual (OSSTMM)
• Web Application Security Consortium Threat Classification (WASC-TC)
Severity Description
Loss of business / Breach of internal data / Non-bearable financial and reputational
Critical
loss / Breakdown of assets / Access and modification of critical data
Loss of customer / Exposure of internal data / Noncompliance to regulations /
High Unavailability of the services / Access to configurational changes / High financial and
reputational loss / Access and modification of internal data
Customer service affected for one day / Noncompliance with internal requirements
Medium / Bearable financial and reputational loss / Disclosure of non-public data
Internal services affected / Minor inconvenience to customers / Very minimal
Low
financial and reputation loss
8. Vulnerability Summary
A summary of vulnerabilities that have been discovered while performing web application
security assessment are given bellow:
9. Observations
Vulnerability #1 XSS via File Upload
IP Address 0.0.0.0
Risk Critical
Description DESCRIPTION
Remediation
Impact IDOR occur when a user being able to directly access resources that they
should not be able to access, using a user input functionality.
Proof of Concept
(POC)
Remediation DESCRIPTION
Impact User’s account remains at risk, as even after logout a person having session
cookies can login into user account and make malicious changes.
Proof of Concept
(POC)
Remediation DESCRIPTION
Risk Critical
Description DESCRIPTION
Impact The users email inbox will be spammed with multiple password reset links
which would cause trouble to the user
Proof of Concept
(POC)
Remediation DESCRIPTION
11.Conclusion
Overall, we found the Assets tested to be well designed and to be utilizing many solid security
practices. However, few misconfigurations/vulnerabilities were identified which are given above.
We recommend to immediately fix the issue identified to make the systems risk free and secure.