Templ Presentation & Penetration Test Report by Muaz
Templ Presentation & Penetration Test Report by Muaz
By,
This document contains sensitive information about the computer security environment, practices, current vulnerabilities, and weaknesses in the client security
infrastructure, as well as proprietary tools and methodologies developed or used by me (Muaz). Reproduction or distribution of this document must be approved
by either the client or me (Muaz Ibn Masud). This document is subject to the terms and conditions of a non-disclosure agreement between me (Muaz) and the
client (instractor Imtiaz)
Web Application Penetration Testing Report Page-2
for XYZ
Report Details
Report History
Version Date
v1.0 DDDD
Table of Content:
Web Application Penetration Testing Report Page-3
for XYZ
Web Application Penetration Testing Report Page-4
for XYZ
1.Executive Summary
This document constitutes the final report for the web application penetration test performed on your domain, executed
during the period of time that spans from the project's 7-day dateline . The Grey Box assessment was conducted against
the production environment with all limitations.
The objective of this service was to proactively discover flaws, weaknesses, and vulnerabilities that could lead to critical
service interruption or compromise of sensitive systems and data. By providing details on vulnerabilities and specific
remediation guidance, our intent is to help Audit Solution protect its business-critical application and data.
1.1Project Timeline
The penetration test was performed on bWAPP between 11/2/2025. Domains was tested for 4 work hours. Reporting
took at all 10-14 work hours.
1.2Scope
We have performed a web application penetration testing exercise on the following scope: URL : A
Web App (bWAPP)
LIKELIHOOD
Any outcome of the services performed is limited to a point-in-time examination of the environments tested. I does not
constitute any form of representation, warranty, or guarantee that the systems are 100% secure from every form of attack.
While my methodology includes automated and manual testing to identify and attempt the most common security issues,
testing was limited to an agreed-upon timeframe. It is possible that not every vulnerability identified by our scanning
platform was tested during this engagement.
● Denial of service issues that could potentially disrupt the Client environment was not tested
● Social engineering attacks & Information Reconsis were not in scope for this assessment.
Web Application Penetration Testing Report Page-5
for XYZ
2.Methodology
Our penetration testing methodology is grounded on the following guides and standards:
Access controls enforce policies so that users cannot act outside of their intended permissions. Failures typically lead to
unauthorized information disclosure or modification, destruction of data, or performing a business function outside the
user’s limits.
A02:2021-Cryptographic Failures
Cryptographic failures involve protecting data in transit and at rest. This includes passwords, credit card numbers, health
records, personal information, and business secrets that require extra protection, especially if that data falls under privacy laws
such as GDPR or regulations like PCI Data Security Standard (PCI DSS) for financial data.
A03:2021-Injection
Injection, which now includes cross-site scripting, occurs when untrusted data is sent to an interpreter as part of a
command or query, tricking the interpreter into executing unintended commands or accessing data without proper
authorization.
A04:2021-Insecure Design
Insecure Design focuses on risks related to design flaws. This means using more threat modeling, secure design patterns
and principles, and reference architectures to shift security left. It is a broad category representing many different
weaknesses.
A05:2021-Security Misconfiguration
This category includes missing security hardening across any part of the application stack, improperly configured
permissions on cloud services, any unnecessary features that are enabled or installed, and unchanged default accounts or
passwords. The former category XML External Entities (XXE) is now included in Security Misconfiguration.
this includes objects or data encoded or serialized into a structure that an attacker can modify.
As a baseline for testing, the OWASP Application Security Verification Standard 3.0 was used, and the security
verification level applied was ASVS Level 1 (Opportunistic).
3.Testing Approach
Web application penetration testing is comprised of five main steps, including information gathering, research and
exploitation, reporting and recommendations, and remediation with ongoing support. These tests are performed primarily
to maintain secure software code development throughout its lifecycle. Coding mistakes, specific requirements, or lack of
knowledge in cyber-attack vectors are the main purpose of performing this type of penetration test.
Image of OWASP Top 10 by Certera
Pre-engagement phase of Pen-testing
Determining the scope of the penetration test ensures that both the target and the tester know what to expect from the test.
There are certain assets that the pen testers are allowed to test, those are within the scope of the pen test, others are not.
Similarly, the target organization’s security posture is tested for a predetermined set of vulnerabilities, anything out of that
set is out of scope for the pen test.
Web Application Penetration Testing Report Page-7
for XYZ
3.1Discovery
The discovery phase can be divided into two parts:
● Further information gathering: This first part involves gathering more information about the target network
using a bunch of different techniques. Hackers can uncover host-names and IP information using techniques like
DNS interrogation, network sniffing etc.
● Vulnerability Scan: This part consists of testing the application or the operating system for known
vulnerabilities. You can get an automated scan where the system is tested against a
vulnerability database.
3.2Vulnerability Analysis
Upon understanding the critical control points within the system, the pen tester can then minutely examine the
probable attack vectors.
This involves scanning the target application for vulnerabilities using scanners such as Zed Attack Proxy (ZAP), Burp
Suite Pro, or Nessus to understand how the application responds to various intrusion attempts and identify security
loopholes.
● OS Command Injection
● SQL Injection
● Cross-Site Scripting
● Clickjacking
● LFI/ RFI
● File Upload
● Buffer Overflow
● Path Manipulation
● Site Search
● Directory Traversal
● Authorization Assessment
● Brute Force Authentication attacks
Authentication Testing
No Test Name Result
1 Testing for Credentials Transported over an Encrypted Channel (CVE-2024-43798) Issue
2 Testing for default credentials (CVE-2025-0890) Pass
3 Testing for Weak lock out mechanism (CVE-2017-7551) Issues
4 Testing for bypassing authentication schema Pass
5 Test remember password functionality Issue
6 Testing for Browser cache weakness Pass
7 Testing for Weak password policy (CVE-2022-37164) Issue (9.8/10)
8 Testing for Weak security question/answer N/A
9 Testing for weak password change or reset functionalities N/A
10 Testing for Weaker authentication in alternative channel N/A
Authorization Testing
No Test Name Result
1 Testing for Credentials Transported over an Encrypted Channel Issue
2 Testing for default credentials (CVE-2025-0890) Pass
3 Testing for a weak lockout mechanism (CVE-2017-7551) Issues
4 Testing for bypassing authentication schema Pass
Session Management
No Test Name Result
1 Testing for Bypassing Session Management Schema Pass
2 Testing for Cookies attributes (CVE-2023-45141) Issues
3 Testing for Session Fixation Pass
4 Testing for Exposed Session Variables (CVE-2024-55556) Issues
5 Testing for Cross Site Request Forgery (CVE-2024-9661) Issues
6 Testing for logout functionality Pass
7 Test Session Timeout Issues
8 Testing for Session puzzling N/A
Web Application Penetration Testing Report Page-11
for XYZ
Error Handling
No Test Name Result
1 Analysis of Error Codes Issues
2 Analysis of Stack Traces N/A
Cryptography
Web Application Penetration Testing Report Page-12
for XYZ
4.Risk Rating
Web Application Penetration Testing Report Page-13
for XYZ
Each weakness has its own CVSS 3 base score rating (Common Vulnerability Scoring System Version 3 Calculator).1,2
Based on the CVSS 3 base score, the following weakness assessment is performed:
CRITICAL Weaknesses classified as Critical can be exploited with very little effort by an attacker.
HIGH Severe issues that can easily be exploited to immediately impact the environment.
Moderate security issues that require some effort to successfully impact the
MEDIUM environment.
LOW Security issues that have a limited or trivial impact to the environment.
5.
5. Summary of Findings
Vector String:
Web Application Penetration Testing Report Page-14
for XYZ
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/RC:C/CR:H/IR:H/AR:H/MAV:L/MAC:L/MPR:N/MUI:N/MC:L/MI:L/MA:H
Risk Critical |
Locations(s) /
Issue Details Admin password changed by changing id and brute-forcing old password simultaneously.
CVE CWE-640
Weak Password Machanism
CVSS Score : 7
Risk High |
Locations(s) /
A weak password is short, common, a system default, or something that could be rapidly
guessed by executing a brute force attack using a subset of all possible passwords, such as
Issue Details
words in the dictionary, proper names, words based on the user name or common variations
on these themes.
Weak passwords can be easily guessed and are an easy target for brute force attacks. This
Impact can lead to an authentication system failure and compromise system security.
Authentication is an important aspect of security.
CWE-1008
CVE
CWE-1003
Risk High |
N/A
Locations(s)
File upload vulnerabilities are when a web server allows users to upload files to its
filesystem without sufficiently validating things like their name, type, contents, or size.
Failing to enforce restrictions on these properly could mean that even a basic image upload
Issue Details function can be used to upload arbitrary and potentially dangerous files instead. This could
even include server-side script files that enable remote code execution.
A malicious file can be responsible for taking over complete system, an overloaded file
system or database, forwarding attacks to back-end systems, client-side attacks, or simple
defacement.Uploading malicious files can make the website vulnerable to client-side
Impact attacks such as XSS or Cross-site Content Hijacking. Uploaded files might trigger
vulnerabilities in broken libraries/applications on the client side.
CVE-2001-0901
CVE-2002-1841
CVE CVE-2005-1868
CVE-2005-1881
The web server accepts a file without validating it or keeping any restriction, it is
considered as an unrestricted file upload.So stop accepting a file
Recommendation
without validation.
6.4H03 CSRF where token is not tied to user session CVSS Score : N/A
Web Application Penetration Testing Report Page-16
for XYZ
Risk High |
Locations(s) N/A
In this situation, the attacker can log in to the application using their own account,
Impact
obtain a valid token, and then feed that token to the victim user in their CSRF attack.
CVE CVE-2020-11825
Make sure XSRF token is destroyed after login and new XSRF token is
Recommendation
generated.
Risk Medium |
Locations(s) /ldap_connect.php
If the lockout threshold is not present then the more attempts an attacker can make to brute
Impact
force the account before it will be locked.
CWE-645
CVE
CWE-1216
Time-based lockout and unlock. (Example: After 5 failed login trials, lock out user for 15
minutes).
Recommendation Self-service unlock (sends unlock email to registered email address).
Manual administrator unlock.
Manual administrator unlock with positive user identification.
Risk Medium |
Locations(s) /js/html5.js
Issue Details The main JavaScript source code file was exposed
An attacker can analyze the source code and find potential vulnerability which might lead to
Impact
potential attacks.
CVE-2002-0840
CVE
CVE-2002-1156
Risk Medium |
Issue Details Stack trace, laravel debug mode is displayed in case of error.
A stack trace is an information leak, which reveals information about web application
implementation. Whilst not a serious vulnerability, it does allow an attacker to gain certain
Impact
information about the system. It may also allow them to use a debugging-based approach to
exploiting flaws in the site.
CVE
Risk Medium |
Issue Details HttpOnly flag was not set for session cookie.
If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set
by client-side JavaScript. This measure makes certain client-side attacks, such as
Impact
cross-site scripting, slightly harder to exploit by preventing them from trivially capturing
the cookie's value via an injected script.
CVE CVE-2018-12302
Risk Medium |
Locations(s) /login.php
Session timeout is a fairly popular option that needs to be used carefully.It is used to
Issue Details determine how long a device may remain authenticated on a switchport before it must
perform authentication again.
A web application should invalidate a session after a predefined idle time has passed (a
Impact timeout) and provide users the means to invalidate their own sessions (logout). These simple
measures help to keep the lifespan of a session ID as short as possible.
CVE CWE-613
If you have not been doing anything on the page for a set length of time (often 30 minutes),
Recommendation
the server times out your session.
Risk Medium |
CWE-1000
CVE
CWE-699
User credentials are considered sensitive information and should always be transferred to
Recommendation
the server over an encrypted connection (HTTPS).
Risk Low |
Locations(s) N/A
Session ID variables were base64 encoded, thus it was easily decoded, and the ID values
Issue Details
were exposed.
CWE-200
CVE
CWE-488
Use 2 type of encryption algorithms recursively, and outer encryption should not be base64.
Recommendation
Risk Info |
Locations(s) N/A
When an admin/auditor assigns any project to the coordinator, then this assigned
Observation
coordinator cannot access this project.
Risk Info |
Locations(s) N/A
Observation When an admin/client tries to login, then 2FA OTP takes a lot of time.
Risk Info |
Locations(s) N/A
Observation Our existing URL management is not bad, but we want something better.
Recommendation Our URL management will be better when we use the same folder mechanism.
Web Application Penetration Testing Report Page-21
for XYZ
At last,
This penetration test provided valuable information about the bWAPP application's security posture. The identified
vulnerabilities, which range from critical to low-risk, highlight areas that require immediate attention to prevent
potential threats. While this report provides a snapshot of the application's security at the time of testing, security
remains an ongoing process. We strongly advise you to follow the recommendations below and establish a continuous
security improvement cycle.
The key findings and high-level recommendations are summarized in the table below. This report's "Detailed
Findings" section contains comprehensive information and specific remediation steps.