0.2.9 • Published 1 year ago

monitornodejstestversion v0.2.9

Weekly downloads
-
License
ISC
Repository
-
Last release
1 year ago

auto-protect-expressjs-security-

Web Application Security Dashboard

This repository contains a collection of security vulnerabilities and attack vectors commonly found in web applications. The data is organized into categories, each containing a list of use cases related to that category.

Categories

Broken Authentication and Session Management

Injection

  • Application is vulnerable to Command injection attack
  • Application is vulnerable to HTML injection attack
  • Application is vulnerable to iframe injection attack
  • Application is vulnerable to SQL Injection
  • Application is vulnerable to XML injection

SSL

  • SSL Information

Error Message

  • Server Error Message

Insecure Direct Object References

  • Directory listing is enabled on the server
  • HTTP parameter pollution
  • The remote server contains a 'robots.txt' file

Security Misconfiguration

  • Application accepts arbitrary methods
  • Dangerous HTTP methods are enabled on the server
  • OPTIONS method enabled

Sensitive Data Exposure

  • An adversary can fingerprint the web server from the HTTP responses
  • An adversary can harvest email ids for spamming
  • Application's server side source code disclosure
  • Critical information in URL
  • Default web-page present in the server
  • Sensitive data is accessible from cache
  • Sensitive information revealed in HTTP response
  • Cleartext Password returned in login response

Unvalidated Redirects and Forwards

  • The application is vulnerable to a URL redirection flaw

Cross-Site Scripting (XSS)

  • Application is vulnerable to cross frame scripting
  • Application is vulnerable to Cross Site Scripting attack
  • Application is vulnerable to stored Cross Site Scripting attack
  • Is XSS possible via CSS injection?

Miscellaneous Attacks

  • Application accepts special characters as user inputs
  • Auto-complete is enabled for sensitive fields
  • captcha can be bypassed
  • Captcha is not implemented for publicly available forms
  • click jacking
  • Default/Test files found on the web server
  • Developer comments revealed in page source
  • Email Flooding
  • Insecure administrator login name
  • Server Side input validations are not in place
  • Temporary account lockout feature is not implemented
  • Weak auditing and logging mechanisms
  • DOS using sql wildcards
  • OTPs and credentials communicated in clear text on emails
  • Can Registrations override another user's record or username or email address?
  • Can Profile updations override another user's record or username or email address, thereby taking over another user's identity?
  • Submit a valid username and invalid password and see if the application has already created a valid session even though login process generated an error response
  • Vulnerabilities in known components

Sensitive Data stored in local storage

  • Is sensitive data or session token stored in local data storage of browser?

Weak Cross domain policy

  • Is "allow-access-from domain" in cross-domain.xml policy file set to * or unauthorized domains?
  • Is "Origin" header in client request validated at the server?
  • Is "Access-Control-Allow-Origin" header in server response is set securely?

XML External Entity Attack

  • Is "allow-access-from domain" in cross-domain.xml policy file set to * or unauthorized domains?
0.2.7

1 year ago

0.2.6

1 year ago

0.2.9

1 year ago

0.2.8

1 year ago

0.2.5

1 year ago

0.2.4

1 year ago

0.1.0

1 year ago

0.2.1

1 year ago

0.2.0

1 year ago

0.2.3

1 year ago

0.2.2

1 year ago

0.0.3

1 year ago

0.0.2

1 year ago

0.0.1

1 year ago