Report for http://www.fao.com/product/index.jsp?productId=3262833 (Generated on 2013-08-30 17:32:19 -0400)

Found a false positive? Report it here.

Summary


(Submit empty query to show all again.)

[1] Blind SQL Injection (differential analysis) (Trusted — Severity: High)

SQL code can be injected into the web application even though it may not be obvious due to suppression of error messages.

In header input User-Agent using GET at http://www.fao.com/product/index.jsp?productId=3262833.

 

 

 

 

 

 

Configuration

Version: 1.0dev
Revision: 0.2.8
Audit started on: Fri Aug 30 16:37:14 2013
Audit finished on: Fri Aug 30 17:23:12 2013
Runtime: 00:45:58

 

Runtime options

URL: http://www.fao.com/product/index.jsp?productId=3262833
User agent: Arachni/v1.0dev

 

Audited elements Modules Filters Cookies
  • Links
  • Forms
  • Headers
  • sqli_blind_rdiff
  • Exclude:
    • N/A
  • Include:
    • N/A
  • Redundant:
    • N/A
  • JSESSIONID = TYTlSkNBDM82DwzZJNvf4yz29Sp94TQydrvL1pW1FcfQ1TvlvVPQ!-1874741247
  • browser_id = 236445014523
  • rvdata = XR79534053185a401a0f4f1a175b0a0a0304

Issues

(Submit empty query to show all again.)

Trusted issues

At the time these issues were logged there were no abnormal interferences or anomalous server behavior.
These issues are considered trusted and fairly accurate.

[1] Blind SQL Injection (differential analysis)

References

Description

SQL code can be injected into the web application even though it may not be obvious due to suppression of error messages.

Remedial guidance

Suppression of error messages leads to security through obscurity which is not a good practise. The web application needs to enforce stronger validation on user inputs.

[+] Variation 1
Affected URL:

http://www.fao.com/product/index.jsp?productId=3262833



Injected value:
 Arachni/v1.0dev))) and  1=1 

Regular expression:

                        

Headers
Request Response
Accepttext/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encodinggzip, deflate
User-AgentArachni/v1.0dev))) and 1=1
CookieJSESSIONID=TYTlSkNBDM82DwzZJNvf4yz29Sp94TQydrvL1pW1FcfQ1TvlvVPQ!-1874741247;browser_id=236445014523;rvdata=XR79534053185a401a0f4f1a175b0a0a0304
DateMon, 02 Sep 2013 18:25:05 GMT
ServerApache/2.0.64 (Unix)
Cache-Controlno-cache="set-cookie"
Pragmano-cache
P3pCP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
Set-Cookiervdata=XR79534053185a401a0f4f1a175b0a0a0304; expires=Saturday, 20-Sep-2081 21:39:12 GMT; path=/
Content-Languageen-US
X-Powered-ByServlet/2.5 JSP/2.1
VaryAccept-Encoding
Content-Encodinggzip
X-Ua-CompatibleIE=EmulateIE7
Connectionclose
Transfer-Encodingchunked
Content-Typetext/html; charset=ISO-8859-1

 

Untrusted

These issues are considered untrusted (and may in fact be false positives) because at the time they were identified the server was exhibiting some kind of anomalous behavior or there was third part interference (like network latency for example).
The listed issues need verification by a human.

No untrusted issues have been logged.

Plugin results

                            Resolves vulnerable hostnames to IP addresses.
                        

Results

Hostname IP Address
www.fao.com 63.240.110.215

                            Generates a simple list of safe/unsafe URLs.
                        

http://www.fao.com/product/index.jsp
http://www.fao.com/product/index.jsp?productId=3262833

Stats

Total: 2
Safe: 1
Unsafe: 1
Issue percentage: 50%

Sitemap