PCI Scan Report Summary

TARGET URL
http://test.q2bstudio.com/
SCAN DATE
1/29/2020 12:43:19 PM (UTC)
REPORT DATE
1/29/2020 1:15:06 PM (UTC)
SCAN DURATION
00:18:34
pentestonline.es VERSION
5.3.0.24388-5.3-hf6-de321fd
Total Requests
9962
Average Speed
8.94 req/sec.
29
Identified
5
Confirmed
0
Critical
6
Informational

Explanation

EXPLANATION
This report is generated based on PCI classification and it has no validity. PCI DSS scans must be performed by an approved scanning vendor. There are 84 more vulnerabilities that are not shown below. Please take a look at the detailed scan report to see them.

29 vulnerabilities listed in PCI classification were found on this web site.


Vulnerabilities

Issues Instances Confirmed
CRITICAL
0 0 0
HIGH
1 2 2
MEDIUM
3 5 2
LOW
3 16 1
INFORMATION
3 6 0
BEST PRACTICE
0 0 0
TOTAL 10 29 5


Vulnerabilities By PCI

PCI v3.2

6.2 - Critical security patches

URL Severity Vulnerability
http://test.q2bstudio.com/ Information Out-of-date Version (jQuery)
http://test.q2bstudio.com/ Information Out-of-date Version (Moment.js)
http://test.q2bstudio.com/ Medium Out-of-date Version (Bootstrap)
http://test.q2bstudio.com/ Information Out-of-date Version (jQuery UI Autocomplete)
http://test.q2bstudio.com/ Information Out-of-date Version (jQuery)
http://test.q2bstudio.com/ Information Out-of-date Version (Moment.js)
http://test.q2bstudio.com/ Medium Out-of-date Version (Bootstrap)
http://test.q2bstudio.com/ Information Out-of-date Version (jQuery UI Autocomplete)
http://test.q2bstudio.com/ Information Out-of-date Version (jQuery)
http://test.q2bstudio.com/ Information Out-of-date Version (Moment.js)
http://test.q2bstudio.com/ Medium Out-of-date Version (Bootstrap)
http://test.q2bstudio.com/ Information Out-of-date Version (jQuery UI Autocomplete)
http://test.q2bstudio.com/assets/javascripts/bootstrap.min.js Medium Out-of-date Version (Bootstrap)
http://test.q2bstudio.com/assets/javascripts/bootstrap.min.js Medium Out-of-date Version (Bootstrap)

6.5.4 - Insecure communications

URL Severity Vulnerability
http://test.q2bstudio.com/ High Password Transmitted over HTTP
http://test.q2bstudio.com/ High Password Transmitted over HTTP
http://test.q2bstudio.com/ High Password Transmitted over HTTP
https://test.q2bstudio.com/ Medium Insecure Transportation Security Protocol Supported (SSLv3)
https://test.q2bstudio.com/ Low Insecure Transportation Security Protocol Supported (TLS 1.0)
https://test.q2bstudio.com/ Medium Weak Ciphers Enabled

6.5.5 - Improper error handling

URL Severity Vulnerability
http://test.q2bstudio.com/ Low Programming Error Message
http://test.q2bstudio.com/ Low Programming Error Message
http://test.q2bstudio.com/?%27%22--%3e%3c%2fstyle%3e%3c%2fscRipt%3e%3cscRipt%20src%3d%22%2f%2fen5k_y54-pfmmjdpxw0jylmw7ejnljou7quqmkj2ius%26%2346%3br87%26%2346%3bme%22%3e%3c%2fscRipt%3e Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000037)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000037)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000038)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000038)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/demo/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00028F)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/demo/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00028F)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/demo/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000290)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/demo/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000290)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/javascripts/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000163)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/javascripts/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000163)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/javascripts/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000164)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/assets/javascripts/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000164)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/Resources/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00033D)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/Resources/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00033D)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/Resources/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000358)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/Resources/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000358)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/Resources/images/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00041F)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/Resources/images/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00041F)%3C/scRipt%3E Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/trace.axd Low Programming Error Message
http://test.q2bstudio.com/trace.axd Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/trace.axd Low Programming Error Message
http://test.q2bstudio.com/trace.axd Low Stack Trace Disclosure (ASP.NET)
http://test.q2bstudio.com/trace.axd Low Programming Error Message
http://test.q2bstudio.com/trace.axd/%22ns=%22pentestonline.es(0x000A1B) Low Programming Error Message
http://test.q2bstudio.com/trace.axd/%22ns=%22pentestonline.es(0x000A1B) Low Programming Error Message

1. Password Transmitted over HTTP

2 TOTAL
HIGH
Confirmed
2

pentestonline.es detected that password data is being transmitted over HTTP.

Impact

If an attacker can intercept network traffic, he/she can steal users' credentials.

Actions to Take

  1. See the remedy for solution.
  2. Move all of your critical forms and pages to HTTPS and do not serve them over HTTP.

Remedy

All sensitive data should be transferred over HTTPS rather than HTTP. Forms should be served over HTTPS. All aspects of the application that accept user input, starting from the login process, should only be served over HTTPS.

Classification

PCI V3.2-6.5.4

CVSS 3.0

CVSS Vector String: CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Base: 5.7 (Medium)
Temporal: 5.7 (Medium)
Environmental: 5.7 (Medium)

1.1. http://test.q2bstudio.com/

Confirmed
http://test.q2bstudio.com/

Input Name

password_id

Form target action

http://test.q2bstudio.com/

Request

GET / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



span class="fa fa-user signin-form-icon"></span>
</div>
<!-- / Username -->

<div class="form-group w-icon">

<input name="password_id" type="password" id="password_id" class="form-control input-lg format_input_login" placeholder="Contraseña" />
<span class="fa fa-lock signin-form-icon"></span>
</div>
<!-- / Password -->
</div>
<!-- / Form -->
</d

1.2. http://test.q2bstudio.com/

Confirmed
http://test.q2bstudio.com/

Input Name

password_id

Form target action

./

Request

POST / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 124
Content-Type: application/xml
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

<?xml version="1.0"?><!DOCTYPE ns [<!ELEMENT ns ANY><!ENTITY lfi SYSTEM "data:;base64,TlM3NzU0NTYxNDQ2NTc1">]><ns>&lfi;</ns>

Response



span class="fa fa-user signin-form-icon"></span>
</div>
<!-- / Username -->

<div class="form-group w-icon">

<input name="password_id" type="password" id="password_id" class="form-control input-lg format_input_login" placeholder="Contraseña" />password_id" type="password" id="password_id" class="form-control input-lg format_input_login" placeholder="Contraseña" />
<span class="fa fa-lock signin-form-icon"></span>
</

2. Weak Ciphers Enabled

1 TOTAL
MEDIUM
Confirmed
1

pentestonline.es detected that weak ciphers are enabled during secure communication (SSL).

You should allow only strong ciphers on your web server to protect secure communication with your visitors.

Impact

Attackers might decrypt SSL traffic between your server and your visitors.

Actions to Take

  1. For Apache, you should modify the SSLCipherSuite directive in the httpd.conf.
    SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
    
  2. For Microsoft IIS, you should make some changes to the system registry.

    a. Click Start, click Run, type regedt32 or type regedit, and then click OK.
    b. In Registry Editor, locate the following registry key: HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders
    c. Set "Enabled" DWORD to "0x0" for the following registry keys:
    SCHANNEL\Ciphers\DES 56/56
    SCHANNEL\Ciphers\RC4 64/128
    SCHANNEL\Ciphers\RC4 40/128
    SCHANNEL\Ciphers\RC2 56/128
    SCHANNEL\Ciphers\RC2 40/128
    SCHANNEL\Ciphers\NULL
    SCHANNEL\Hashes\MD5

Remedy

Configure your web server to disallow using weak ciphers.

External References

Classification

PCI V3.2-6.5.4

CVSS 3.0

CVSS Vector String: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Base: 6.8 (Medium)
Temporal: 6.8 (Medium)
Environmental: 6.8 (Medium)

2.1. https://test.q2bstudio.com/

Confirmed
https://test.q2bstudio.com/

List of Supported Weak Ciphers

Request

[pentestonline.es] SSL Connection

Response

[pentestonline.es] SSL Connection

3. Insecure Transportation Security Protocol Supported (SSLv3)

1 TOTAL
MEDIUM
Confirmed
1

pentestonline.es detected that insecure transportation security protocol (SSLv3) is supported by your web server.

SSLv3 has several flaws. An attacker can cause connection failures and they can trigger the use of SSL 3.0 to exploit vulnerabilities like POODLE.

Impact

Attackers can perform man-in-the-middle attacks and observe the encryption traffic between your website and its visitors.

Remedy

Configure your web server to disallow using weak ciphers. You need to restart the web server to enable changes.

  • For Apache, adjust the SSLProtocol directive provided by the mod_ssl module. This directive can be set either at the server level or in a virtual host configuration.
    SSLProtocol +TLSv1.1 +TLSv1.2
    
  • For Nginx, locate any use of the directive ssl_protocols in the nginx.conf file and remove SSLv3.
    ssl_protocols TLSv1.1 TLSv1.2;
    
  • For Microsoft IIS, you should make some changes on the system registry.
    1. Click on Start and then Run, type regedt32 or regedit, and then click OK.
    2. In Registry Editor, locate the following registry key or create if it does not exist:
      HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\
      
    3. Locate a key named Server or create if it doesn't exist.
    4. Under the Server key, locate a DWORD value named Enabled or create if it doesn't exist and set its value to "0".
  • For lighttpd, put the following lines in your configuration file:
    ssl.use-sslv2 = "disable"
    ssl.use-sslv3 = "disable"
    

External References

Classification

PCI V3.2-6.5.4

CVSS 3.0

CVSS Vector String: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
Base: 6.8 (Medium)
Temporal: 6.1 (Medium)
Environmental: 6.1 (Medium)

3.1. https://test.q2bstudio.com/

Confirmed
https://test.q2bstudio.com/

Request

[pentestonline.es] SSL Connection

Response

[pentestonline.es] SSL Connection

4. Out-of-date Version (Bootstrap)

3 TOTAL
MEDIUM

pentestonline.es identified that the target web site is using Bootstrap and detected that it is out of date.

Impact

Since this is an old version of the software, it may be vulnerable to attacks.

Remedy

Please upgrade your installation of Bootstrap to the latest stable version.

Remedy References

Known Vulnerabilities in this Version

bootstrap.js Cross-Site Scripting (XSS) Vulnerability

In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.

External References

bootstrap.js Cross-Site Scripting (XSS) Vulnerability

In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.

External References

bootstrap.js Cross-Site Scripting (XSS) Vulnerability

In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.

External References

Classification

PCI V3.2-6.2

4.1. http://test.q2bstudio.com/

http://test.q2bstudio.com/

Identified Version

3.3.7

Latest Version

3.4.1 (in this branch)

Vulnerability Database

Result is based on 04/05/2019 16:30:00 vulnerability database content.

Certainty

Request

GET / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response

HTTP/1.1 200 OK
Set-Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; path=/; HttpOnly
Set-Cookie: q2blng=ca-ES; expires=Wed, 05-Feb-2020 12:43:22 GMT; path=/
X-Powered-By: ASP.NET
Vary: Accept-Encoding
Content-Length: 3261
Content-Type: text/html; charset=utf-8
Content-Encoding:
Date: Wed, 29 Jan 2020 12:43:22 GMT
Cache-Control: private



<!DOCTYPE html>
<!--[if IE 8]> <html class="ie8"> <![endif]-->
<!--[if IE 9]> <html class="ie9 gt-ie8"> <![endif]-->
<!--[if gt IE 9]><!-->
<html class="gt-ie8 gt-ie9 not-ie">
<!--<![endif]-->
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>Login</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=no, minimum-scale=1.0, maximum-scale=1.0">
<link rel="shortcut icon" href="Resources/logo/logo_vc.png" />
<!-- Open Sans font from Google CDN -->
<link href="http://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,400,600,700,300&subset=latin" rel="stylesheet" type="text/css">

<!-- Pixel Admin's stylesheets -->
<link href="assets/stylesheets/bootstrap.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pixel-admin.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pages.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/rtl.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/themes.min.css" rel="stylesheet" type="text/css">

<!-- Get jQuery from Google CDN -->
<!--[if !IE]> -->
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.0.3/jquery.min.js">' + "<" + "/script>"); </script>
<!-- <![endif]-->
<!--[if lte IE 9]>
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js">'

4.2. http://test.q2bstudio.com/assets/javascripts/bootstrap.min.js

http://test.q2bstudio.com/assets/javascripts/bootstrap.min.js

Identified Version

3.3.7

Latest Version

3.4.1 (in this branch)

Vulnerability Database

Result is based on 04/05/2019 16:30:00 vulnerability database content.

Certainty

Request

GET /assets/javascripts/bootstrap.min.js HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
Referer: http://test.q2bstudio.com/
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



9
Last-Modified: Mon, 01 Jul 2019 07:45:39 GMT
Accept-Ranges: bytes
Content-Type: application/javascript
Content-Encoding:
Date: Wed, 29 Jan 2020 12:43:32 GMT
ETag: "8013f4f9e02fd51:0"

/*!
* Bootstrap v3.3.7 (http://getbootstrap.com)
* Copyright 2011-2016 Twitter, Inc.
* Licensed under the MIT license
*/
if("undefined"==typeof jQuery)throw new Error("Bootstrap's JavaScript requires jQuery");+function(

4.3. http://test.q2bstudio.com/

http://test.q2bstudio.com/

Identified Version

3.3.7

Latest Version

3.4.1 (in this branch)

Vulnerability Database

Result is based on 04/05/2019 16:30:00 vulnerability database content.

Certainty

Request

POST / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 160
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
Referer: http://test.q2bstudio.com/
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

btnResetPass=%c2%bfOlvidaste+tu+contrase%c3%b1a%3f&username_id=Smith&__VIEWSTATE=IL&__VIEWSTATE_KEY=VS_52.143.173.9_637159022021935337&password_id=N3tsp%40rker-

Response

HTTP/1.1 200 OK
X-Powered-By: ASP.NET
Vary: Accept-Encoding
Content-Length: 3216
Content-Type: text/html; charset=utf-8
Content-Encoding:
Date: Wed, 29 Jan 2020 12:43:32 GMT
Cache-Control: private



<!DOCTYPE html>
<!--[if IE 8]> <html class="ie8"> <![endif]-->
<!--[if IE 9]> <html class="ie9 gt-ie8"> <![endif]-->
<!--[if gt IE 9]><!-->
<html class="gt-ie8 gt-ie9 not-ie">
<!--<![endif]-->
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>Login</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=no, minimum-scale=1.0, maximum-scale=1.0">
<link rel="shortcut icon" href="Resources/logo/logo_vc.png" />
<!-- Open Sans font from Google CDN -->
<link href="http://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,400,600,700,300&subset=latin" rel="stylesheet" type="text/css">

<!-- Pixel Admin's stylesheets -->
<link href="assets/stylesheets/bootstrap.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pixel-admin.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pages.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/rtl.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/themes.min.css" rel="stylesheet" type="text/css">

<!-- Get jQuery from Google CDN -->
<!--[if !IE]> -->
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.0.3/jquery.min.js">' + "<" + "/script>"); </script>
<!-- <![endif]-->
<!--[if lte IE 9]>
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js">'+"<"+"/script>"); </script>
<![endif]-->


<!-- Pixel Admin's javascripts -->
<script src="assets/javascripts/bootstrap.min.js"></script>


5. Programming Error Message

4 TOTAL
LOW

pentestonline.es identified a programming error message.

Impact

The error message may disclose sensitive information and this information can be used by an attacker to mount new attacks or to enlarge the attack surface. Source code, stack trace, etc. data may be disclosed. Most of these issues will be identified and reported separately by pentestonline.es.

Remedy

Do not provide error messages on production environments. Save error messages with a reference number to a backend storage such as a log, text file or database, then show this number and a static user-friendly error message to the user.

Classification

PCI V3.2-6.5.5

5.1. http://test.q2bstudio.com/trace.axd

http://test.q2bstudio.com/trace.axd

IdentifiedErrorMessage

Exception of type &#39;System.Web.HttpException&#39; was thrown.

Certainty

Request

GET /trace.axd HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
Referer: http://test.q2bstudio.com/trace.axd
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



=silver>

<b>Version Information:</b>&nbsp;Microsoft .NET Framework Version:4.0.30319; ASP.NET Version:4.7.3429.0

</font>

</body>
</html>
<!--
[HttpException]: Exception of type &#39;System.Web.HttpException&#39; was thrown.
at System.Web.Handlers.TraceHandler.System.Web.IHttpHandler.ProcessRequest(HttpContext context)
at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionSte

5.2. http://test.q2bstudio.com/

http://test.q2bstudio.com/

Parameters

Parameter Type Value
username_id POST
__VIEWSTATE POST
__VIEWSTATE_KEY POST <?xml version="1.0"?><!DOCTYPE ns [<!ELEMENT ns ANY><!ENTITY lfi SYSTEM "file:///C:/Windows/System32...
ctl01 POST Inicia sesión
password_id POST

IdentifiedErrorMessage

Exception of type &#39;System.Web.HttpUnhandledException&#39; was thrown.

Certainty

Request

POST / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 284
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
Referer: http://test.q2bstudio.com/
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

username_id=&__VIEWSTATE=&__VIEWSTATE_KEY=%3c%3fxml+version%3d%221.0%22%3f%3e%3c!DOCTYPE+ns+%5b%3c!ELEMENT+ns+ANY%3e%3c!ENTITY+lfi+SYSTEM+%22file%3a%2f%2f%2fC%3a%2fWindows%2fSystem32%2fdrivers%2fetc%2fhosts%22%3e%5d%3e%3cns%3e%26lfi%3b%3c%2fns%3e&ctl01=Inicia+sesi%c3%b3n&password_id=

Response



s:line 41
at System.Web.UI.Page.LoadAllState()
at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)
[HttpUnhandledException]: Exception of type &#39;System.Web.HttpUnhandledException&#39; was thrown.
at System.Web.UI.Page.HandleError(Exception e)
at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)
at System.Web.UI.Page.

5.3. http://test.q2bstudio.com/trace.axd

http://test.q2bstudio.com/trace.axd

IdentifiedErrorMessage

Exception of type &#39;System.Web.HttpException&#39; was thrown.

Certainty

Request

POST /trace.axd HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 124
Content-Type: application/xml
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
Referer: http://test.q2bstudio.com/trace.axd
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

<?xml version="1.0"?><!DOCTYPE ns [<!ELEMENT ns ANY><!ENTITY lfi SYSTEM "data:;base64,TlM3NzU0NTYxNDQ2NTc1">]><ns>&lfi;</ns>

Response



=silver>

<b>Version Information:</b>&nbsp;Microsoft .NET Framework Version:4.0.30319; ASP.NET Version:4.7.3429.0

</font>

</body>
</html>
<!--
[HttpException]: Exception of type &#39;System.Web.HttpException&#39; was thrown.
at System.Web.Handlers.TraceHandler.System.Web.IHttpHandler.ProcessRequest(HttpContext context)
at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionSte

5.4. http://test.q2bstudio.com/trace.axd/%22ns=%22pentestonline.es(0x000A1B)

http://test.q2bstudio.com/trace.axd/%22ns=%22pentestonline.es(0x000A1B)

Parameters

Parameter Type Value
URI-BASED Full URL /"ns="pentestonline.es(0x000A1B)

IdentifiedErrorMessage

Exception of type &#39;System.Web.HttpException&#39; was thrown.

Certainty

Request

GET /trace.axd/%22ns=%22pentestonline.es(0x000A1B) HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
Referer: http://test.q2bstudio.com/trace.axd
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



=silver>

<b>Version Information:</b>&nbsp;Microsoft .NET Framework Version:4.0.30319; ASP.NET Version:4.7.3429.0

</font>

</body>
</html>
<!--
[HttpException]: Exception of type &#39;System.Web.HttpException&#39; was thrown.
at System.Web.Handlers.TraceHandler.System.Web.IHttpHandler.ProcessRequest(HttpContext context)
at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionSte

6. Stack Trace Disclosure (ASP.NET)

11 TOTAL
LOW

pentestonline.es identified a stack trace disclosure (ASP.NET) in the target web server's HTTP response.

Impact

An attacker can obtain information such as:
  • ASP.NET version.
  • Physical file path of temporary ASP.NET files.
  • Information about the generated exception and possibly source code, SQL queries, etc.
This information might help an attacker gain more information and potentially focus on the development of further attacks for the target system.

Remedy

Apply following changes on your web.config file to prevent information leakage by applying custom error pages.
<System.Web>
     <customErrors mode="On" defaultRedirect="~/error/GeneralError.aspx">
          <error statusCode="403" redirect="~/error/Forbidden.aspx" />
          <error statusCode="404" redirect="~/error/PageNotFound.aspx" />
          <error statusCode="500" redirect="~/error/InternalError.aspx" />
     </customErrors>
</System.Web>

Remedy References

Classification

PCI V3.2-6.5.5

6.1. http://test.q2bstudio.com/?%27%22--%3e%3c%2fstyle%3e%3c%2fscRipt%3e%3cscRipt%20src%3d%22%2f%2fen5k_y54-pfmmjdpxw0jylmw7ejnljou7quqmkj2ius%26%2346%3br87%26%2346%3bme%22%3e%3c%2fscRipt%3e

http://test.q2bstudio.com/?%27%22--%3e%3c%2fstyle%3e%3c%2fscRipt%3e%3cscRipt%20src%3d%22%2f%2fe...

Parameters

Parameter Type Value
Query Based Query String '"--></style></scRipt><scRipt src="//en5k_y54-pfmmjdpxw0jylmw7ejnljou7quqmkj2ius&#46;r87&#46;me"></s...

Certainty

Request

GET /?%27%22--%3e%3c%2fstyle%3e%3c%2fscRipt%3e%3cscRipt%20src%3d%22%2f%2fen5k_y54-pfmmjdpxw0jylmw7ejnljou7quqmkj2ius%26%2346%3br87%26%2346%3bme%22%3e%3c%2fscRipt%3e HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



ource File: </b> c:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\root\72737181\3efab75d\App_Web_ttvm1rai.4.cs<b> &nbsp;&nbsp; Line: </b> 0
<br><br>

<b>Stack Trace:</b> <br><br>

<table width=100% bgcolor="#ffffcc">
<tr>
<td>
<code><pre>


[HttpRequestValidationException (0x80004005): A potentially dangerous Request.QueryString value was detected from the client (=&quot;&#39;&quot;--&gt;&lt;/style&gt;&lt;/scRipt&gt;&lt;sc...&quot;).

6.2. http://test.q2bstudio.com/assets/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000037)%3C/scRipt%3E

http://test.q2bstudio.com/assets/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000...

Parameters

Parameter Type Value
URI-BASED Full URL '"--></style></scRipt><scRipt>pentestonline.es(0x000037)</scRipt>

Certainty

Request

GET /assets/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000037)%3C/scRipt%3E HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



and location of the exception can be identified using the exception stack trace below.</code>

</td>
</tr>
</table>

<br>

<b>Stack Trace:</b> <br><br>

<table width=100% bgcolor="#ffffcc">
<tr>
<td>
<code><pre>


[HttpException (0x80004005): A potentially dangerous Request.Path value was detected from the client (&gt;).]
System.Web.HttpRequest.ValidateInputIfRequiredByConfig() +11981012
System.Web.

6.3. http://test.q2bstudio.com/assets/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000038)%3C/scRipt%3E

http://test.q2bstudio.com/assets/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000...

Parameters

Parameter Type Value
URI-BASED Full URL /'"--></style></scRipt><scRipt>pentestonline.es(0x000038)</scRipt>

Certainty

Request

GET /assets/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000038)%3C/scRipt%3E HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



and location of the exception can be identified using the exception stack trace below.</code>

</td>
</tr>
</table>

<br>

<b>Stack Trace:</b> <br><br>

<table width=100% bgcolor="#ffffcc">
<tr>
<td>
<code><pre>


[HttpException (0x80004005): A potentially dangerous Request.Path value was detected from the client (&gt;).]
System.Web.HttpRequest.ValidateInputIfRequiredByConfig() +11981012
System.Web.

6.4. http://test.q2bstudio.com/assets/javascripts/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000163)%3C/scRipt%3E

http://test.q2bstudio.com/assets/javascripts/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Enets...

Parameters

Parameter Type Value
URI-BASED Full URL '"--></style></scRipt><scRipt>pentestonline.es(0x000163)</scRipt>

Certainty

Request

GET /assets/javascripts/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000163)%3C/scRipt%3E HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



and location of the exception can be identified using the exception stack trace below.</code>

</td>
</tr>
</table>

<br>

<b>Stack Trace:</b> <br><br>

<table width=100% bgcolor="#ffffcc">
<tr>
<td>
<code><pre>


[HttpException (0x80004005): A potentially dangerous Request.Path value was detected from the client (&gt;).]
System.Web.HttpRequest.ValidateInputIfRequiredByConfig() +11981012
System.Web.

6.5. http://test.q2bstudio.com/assets/javascripts/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000164)%3C/scRipt%3E

http://test.q2bstudio.com/assets/javascripts/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Enets...

Parameters

Parameter Type Value
URI-BASED Full URL /'"--></style></scRipt><scRipt>pentestonline.es(0x000164)</scRipt>

Certainty

Request

GET /assets/javascripts/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000164)%3C/scRipt%3E HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



and location of the exception can be identified using the exception stack trace below.</code>

</td>
</tr>
</table>

<br>

<b>Stack Trace:</b> <br><br>

<table width=100% bgcolor="#ffffcc">
<tr>
<td>
<code><pre>


[HttpException (0x80004005): A potentially dangerous Request.Path value was detected from the client (&gt;).]
System.Web.HttpRequest.ValidateInputIfRequiredByConfig() +11981012
System.Web.

6.6. http://test.q2bstudio.com/trace.axd

http://test.q2bstudio.com/trace.axd

Certainty

Request

GET /trace.axd HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
Referer: http://test.q2bstudio.com/trace.axd
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



.NET Framework Version:4.0.30319; ASP.NET Version:4.7.3429.0

</font>

</body>
</html>
<!--
[HttpException]: Exception of type &#39;System.Web.HttpException&#39; was thrown.
at System.Web.Handlers.TraceHandler.System.Web.IHttpHandler.ProcessRequest(HttpContext context)

at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute()

at System.Web.HttpApplication.ExecuteStepImpl(IExecutionStep step)

at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously)

--><!--
This error page might contain sensitive information because ASP.NET is configured to show verbose error messages using &lt;customErrors mode="Off"/&gt;. Consider using &lt;customErrors mode

6.7. http://test.q2bstudio.com/assets/demo/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00028F)%3C/scRipt%3E

http://test.q2bstudio.com/assets/demo/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(...

Parameters

Parameter Type Value
URI-BASED Full URL '"--></style></scRipt><scRipt>pentestonline.es(0x00028F)</scRipt>

Certainty

Request

GET /assets/demo/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00028F)%3C/scRipt%3E HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



and location of the exception can be identified using the exception stack trace below.</code>

</td>
</tr>
</table>

<br>

<b>Stack Trace:</b> <br><br>

<table width=100% bgcolor="#ffffcc">
<tr>
<td>
<code><pre>


[HttpException (0x80004005): A potentially dangerous Request.Path value was detected from the client (&gt;).]
System.Web.HttpRequest.ValidateInputIfRequiredByConfig() +11981012
System.Web.

6.8. http://test.q2bstudio.com/assets/demo/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000290)%3C/scRipt%3E

http://test.q2bstudio.com/assets/demo/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(...

Parameters

Parameter Type Value
URI-BASED Full URL /'"--></style></scRipt><scRipt>pentestonline.es(0x000290)</scRipt>

Certainty

Request

GET /assets/demo/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000290)%3C/scRipt%3E HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



and location of the exception can be identified using the exception stack trace below.</code>

</td>
</tr>
</table>

<br>

<b>Stack Trace:</b> <br><br>

<table width=100% bgcolor="#ffffcc">
<tr>
<td>
<code><pre>


[HttpException (0x80004005): A potentially dangerous Request.Path value was detected from the client (&gt;).]
System.Web.HttpRequest.ValidateInputIfRequiredByConfig() +11981012
System.Web.

6.9. http://test.q2bstudio.com/Resources/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00033D)%3C/scRipt%3E

http://test.q2bstudio.com/Resources/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x...

Parameters

Parameter Type Value
URI-BASED Full URL '"--></style></scRipt><scRipt>pentestonline.es(0x00033D)</scRipt>

Certainty

Request

GET /Resources/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00033D)%3C/scRipt%3E HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



and location of the exception can be identified using the exception stack trace below.</code>

</td>
</tr>
</table>

<br>

<b>Stack Trace:</b> <br><br>

<table width=100% bgcolor="#ffffcc">
<tr>
<td>
<code><pre>


[HttpException (0x80004005): A potentially dangerous Request.Path value was detected from the client (&gt;).]
System.Web.HttpRequest.ValidateInputIfRequiredByConfig() +11981012
System.Web.

6.10. http://test.q2bstudio.com/Resources/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000358)%3C/scRipt%3E

http://test.q2bstudio.com/Resources/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x...

Parameters

Parameter Type Value
URI-BASED Full URL /'"--></style></scRipt><scRipt>pentestonline.es(0x000358)</scRipt>

Certainty

Request

GET /Resources/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x000358)%3C/scRipt%3E HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



and location of the exception can be identified using the exception stack trace below.</code>

</td>
</tr>
</table>

<br>

<b>Stack Trace:</b> <br><br>

<table width=100% bgcolor="#ffffcc">
<tr>
<td>
<code><pre>


[HttpException (0x80004005): A potentially dangerous Request.Path value was detected from the client (&gt;).]
System.Web.HttpRequest.ValidateInputIfRequiredByConfig() +11981012
System.Web.

6.11. http://test.q2bstudio.com/Resources/images/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00041F)%3C/scRipt%3E

http://test.q2bstudio.com/Resources/images/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Enetspa...

Parameters

Parameter Type Value
URI-BASED Full URL '"--></style></scRipt><scRipt>pentestonline.es(0x00041F)</scRipt>

Certainty

Request

GET /Resources/images/'%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Epentestonline.es(0x00041F)%3C/scRipt%3E HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



and location of the exception can be identified using the exception stack trace below.</code>

</td>
</tr>
</table>

<br>

<b>Stack Trace:</b> <br><br>

<table width=100% bgcolor="#ffffcc">
<tr>
<td>
<code><pre>


[HttpException (0x80004005): A potentially dangerous Request.Path value was detected from the client (&gt;).]
System.Web.HttpRequest.ValidateInputIfRequiredByConfig() +11981012
System.Web.

7. Insecure Transportation Security Protocol Supported (TLS 1.0)

1 TOTAL
LOW
Confirmed
1

pentestonline.es detected that insecure transportation security protocol (TLS 1.0) is supported by your web server.

TLS 1.0 has several flaws. An attacker can cause connection failures and they can trigger the use of TLS 1.0 to exploit vulnerabilities like BEAST (Browser Exploit Against SSL/TLS).

Websites using TLS 1.0 are considered non-compliant by PCI since 30 June 2018.

Impact

Attackers can perform man-in-the-middle attacks and observe the encryption traffic between your website and its visitors.

Remedy

Configure your web server to disallow using weak ciphers. You need to restart the web server to enable changes.

  • For Apache, adjust the SSLProtocol directive provided by the mod_ssl module. This directive can be set either at the server level or in a virtual host configuration.
    SSLProtocol +TLSv1.1 +TLSv1.2
    
  • For Nginx, locate any use of the directive ssl_protocols in the nginx.conf file and remove TLSv1.
    ssl_protocols TLSv1.1 TLSv1.2;
    
  • For Microsoft IIS, you should make some changes on the system registry.
    1. Click on Start and then Run, type regedt32 or regedit, and then click OK.
    2. In Registry Editor, locate the following registry key or create if it does not exist:
      HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\
      
    3. Locate a key named Server or create if it doesn't exist.
    4. Under the Server key, locate a DWORD value named Enabled or create if it doesn't exist and set its value to "0".

External References

Classification

PCI V3.2-6.5.4

7.1. https://test.q2bstudio.com/

Confirmed
https://test.q2bstudio.com/

Request

[pentestonline.es] SSL Connection

Response

[pentestonline.es] SSL Connection

8. Out-of-date Version (jQuery)

2 TOTAL
INFORMATION

pentestonline.es identified the target web site is using jQuery and detected that it is out of date.

Impact

Since this is an old version of the software, it may be vulnerable to attacks.

Remedy

Please upgrade your installation of jQuery to the latest stable version.

Remedy References

Classification

PCI V3.2-6.2

8.1. http://test.q2bstudio.com/

http://test.q2bstudio.com/

Identified Version

2.0.3

Latest Version

2.2.4 (in this branch)

Vulnerability Database

Result is based on 04/05/2019 16:30:00 vulnerability database content.

Certainty

Request

GET / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response



="text/css">

<!-- Get jQuery from Google CDN -->
<!--[if !IE]> -->
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.0.3/jquery.min.js">' + "<" + "/script>"); </script>
<!-- <![endif]-->
<!--[if lte IE 9]>
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js">'+"<"+"/script>"); </script>
<![endif]-->


<!-- Pixel Admin's javascripts -->
<script src="assets/javascripts/bootstrap.min.js"></script>
<script src="assets/javascripts/pixel-admin.min

8.2. http://test.q2bstudio.com/

http://test.q2bstudio.com/

Identified Version

2.0.3

Latest Version

2.2.4 (in this branch)

Vulnerability Database

Result is based on 04/05/2019 16:30:00 vulnerability database content.

Certainty

Request

POST / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 160
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
Referer: http://test.q2bstudio.com/
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

btnResetPass=%c2%bfOlvidaste+tu+contrase%c3%b1a%3f&username_id=Smith&__VIEWSTATE=IL&__VIEWSTATE_KEY=VS_52.143.173.9_637159022021935337&password_id=N3tsp%40rker-

Response



="text/css">

<!-- Get jQuery from Google CDN -->
<!--[if !IE]> -->
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.0.3/jquery.min.js">' + "<" + "/script>"); </script>
<!-- <![endif]-->
<!--[if lte IE 9]>
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js">'+"<"+"/script>"); </script>
<![endif]-->


<!-- Pixel Admin's javascripts -->
<script src="assets/javascripts/bootstrap.min.js"></script>
<script src="assets/javascripts/pixel-admin.min

9. Out-of-date Version (jQuery UI Autocomplete)

2 TOTAL
INFORMATION

pentestonline.es identified the target web site is using jQuery UI Autocomplete and detected that it is out of date.

Impact

Since this is an old version of the software, it may be vulnerable to attacks.

Remedy

Please upgrade your installation of jQuery UI Autocomplete to the latest stable version.

Remedy References

Classification

PCI V3.2-6.2

9.1. http://test.q2bstudio.com/

http://test.q2bstudio.com/

Identified Version

1.10.4

Latest Version

1.12.0 (in this branch)

Vulnerability Database

Result is based on 04/05/2019 16:30:00 vulnerability database content.

Certainty

Request

GET / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response

HTTP/1.1 200 OK
Set-Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; path=/; HttpOnly
Set-Cookie: q2blng=ca-ES; expires=Wed, 05-Feb-2020 12:43:22 GMT; path=/
X-Powered-By: ASP.NET
Vary: Accept-Encoding
Content-Length: 3261
Content-Type: text/html; charset=utf-8
Content-Encoding:
Date: Wed, 29 Jan 2020 12:43:22 GMT
Cache-Control: private



<!DOCTYPE html>
<!--[if IE 8]> <html class="ie8"> <![endif]-->
<!--[if IE 9]> <html class="ie9 gt-ie8"> <![endif]-->
<!--[if gt IE 9]><!-->
<html class="gt-ie8 gt-ie9 not-ie">
<!--<![endif]-->
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>Login</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=no, minimum-scale=1.0, maximum-scale=1.0">
<link rel="shortcut icon" href="Resources/logo/logo_vc.png" />
<!-- Open Sans font from Google CDN -->
<link href="http://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,400,600,700,300&subset=latin" rel="stylesheet" type="text/css">

<!-- Pixel Admin's stylesheets -->
<link href="assets/stylesheets/bootstrap.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pixel-admin.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pages.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/rtl.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/themes.min.css" rel="stylesheet" type="text/css">

<!-- Get jQuery from Google CDN -->
<!--[if !IE]> -->
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.0.3/jquery.min.js">' + "<" + "/script>"); </script>
<!-- <![endif]-->
<!--[if lte IE 9]>
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js">'

9.2. http://test.q2bstudio.com/

http://test.q2bstudio.com/

Identified Version

1.10.4

Latest Version

1.12.0 (in this branch)

Vulnerability Database

Result is based on 04/05/2019 16:30:00 vulnerability database content.

Certainty

Request

POST / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 160
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
Referer: http://test.q2bstudio.com/
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

btnResetPass=%c2%bfOlvidaste+tu+contrase%c3%b1a%3f&username_id=Smith&__VIEWSTATE=IL&__VIEWSTATE_KEY=VS_52.143.173.9_637159022021935337&password_id=N3tsp%40rker-

Response

HTTP/1.1 200 OK
X-Powered-By: ASP.NET
Vary: Accept-Encoding
Content-Length: 3216
Content-Type: text/html; charset=utf-8
Content-Encoding:
Date: Wed, 29 Jan 2020 12:43:32 GMT
Cache-Control: private



<!DOCTYPE html>
<!--[if IE 8]> <html class="ie8"> <![endif]-->
<!--[if IE 9]> <html class="ie9 gt-ie8"> <![endif]-->
<!--[if gt IE 9]><!-->
<html class="gt-ie8 gt-ie9 not-ie">
<!--<![endif]-->
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>Login</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=no, minimum-scale=1.0, maximum-scale=1.0">
<link rel="shortcut icon" href="Resources/logo/logo_vc.png" />
<!-- Open Sans font from Google CDN -->
<link href="http://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,400,600,700,300&subset=latin" rel="stylesheet" type="text/css">

<!-- Pixel Admin's stylesheets -->
<link href="assets/stylesheets/bootstrap.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pixel-admin.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pages.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/rtl.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/themes.min.css" rel="stylesheet" type="text/css">

<!-- Get jQuery from Google CDN -->
<!--[if !IE]> -->
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.0.3/jquery.min.js">' + "<" + "/script>"); </script>
<!-- <![endif]-->
<!--[if lte IE 9]>
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js">'+"<"+"/script>"); </script>
<![endif]-->


<!-- Pixel Admin's javascripts -->
<script src="assets/javascripts/bootstrap.min.js"></script>


10. Out-of-date Version (Moment.js)

2 TOTAL
INFORMATION

pentestonline.es identified that the target web site is using Moment.js and detected that it is out of date.

Impact

Since this is an old version of the software, it may be vulnerable to attacks.

Remedy

Please upgrade your installation of Moment.js to the latest stable version.

Remedy References

Classification

PCI V3.2-6.2

10.1. http://test.q2bstudio.com/

http://test.q2bstudio.com/

Identified Version

2.5.1

Latest Version

2.24.0 (in this branch)

Vulnerability Database

Result is based on 04/05/2019 16:30:00 vulnerability database content.

Certainty

Request

GET / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

Response

HTTP/1.1 200 OK
Set-Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; path=/; HttpOnly
Set-Cookie: q2blng=ca-ES; expires=Wed, 05-Feb-2020 12:43:22 GMT; path=/
X-Powered-By: ASP.NET
Vary: Accept-Encoding
Content-Length: 3261
Content-Type: text/html; charset=utf-8
Content-Encoding:
Date: Wed, 29 Jan 2020 12:43:22 GMT
Cache-Control: private



<!DOCTYPE html>
<!--[if IE 8]> <html class="ie8"> <![endif]-->
<!--[if IE 9]> <html class="ie9 gt-ie8"> <![endif]-->
<!--[if gt IE 9]><!-->
<html class="gt-ie8 gt-ie9 not-ie">
<!--<![endif]-->
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>Login</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=no, minimum-scale=1.0, maximum-scale=1.0">
<link rel="shortcut icon" href="Resources/logo/logo_vc.png" />
<!-- Open Sans font from Google CDN -->
<link href="http://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,400,600,700,300&subset=latin" rel="stylesheet" type="text/css">

<!-- Pixel Admin's stylesheets -->
<link href="assets/stylesheets/bootstrap.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pixel-admin.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pages.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/rtl.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/themes.min.css" rel="stylesheet" type="text/css">

<!-- Get jQuery from Google CDN -->
<!--[if !IE]> -->
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.0.3/jquery.min.js">' + "<" + "/script>"); </script>
<!-- <![endif]-->
<!--[if lte IE 9]>
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js">'

10.2. http://test.q2bstudio.com/

http://test.q2bstudio.com/

Identified Version

2.5.1

Latest Version

2.24.0 (in this branch)

Vulnerability Database

Result is based on 04/05/2019 16:30:00 vulnerability database content.

Certainty

Request

POST / HTTP/1.1
Host: test.q2bstudio.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 160
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=54c5dwctoptf0vzaryw3rymi; q2blng=ca-ES
Referer: http://test.q2bstudio.com/
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
X-Scanner: pentestonline.es

btnResetPass=%c2%bfOlvidaste+tu+contrase%c3%b1a%3f&username_id=Smith&__VIEWSTATE=IL&__VIEWSTATE_KEY=VS_52.143.173.9_637159022021935337&password_id=N3tsp%40rker-

Response

HTTP/1.1 200 OK
X-Powered-By: ASP.NET
Vary: Accept-Encoding
Content-Length: 3216
Content-Type: text/html; charset=utf-8
Content-Encoding:
Date: Wed, 29 Jan 2020 12:43:32 GMT
Cache-Control: private



<!DOCTYPE html>
<!--[if IE 8]> <html class="ie8"> <![endif]-->
<!--[if IE 9]> <html class="ie9 gt-ie8"> <![endif]-->
<!--[if gt IE 9]><!-->
<html class="gt-ie8 gt-ie9 not-ie">
<!--<![endif]-->
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>Login</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=no, minimum-scale=1.0, maximum-scale=1.0">
<link rel="shortcut icon" href="Resources/logo/logo_vc.png" />
<!-- Open Sans font from Google CDN -->
<link href="http://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,400,600,700,300&subset=latin" rel="stylesheet" type="text/css">

<!-- Pixel Admin's stylesheets -->
<link href="assets/stylesheets/bootstrap.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pixel-admin.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/pages.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/rtl.min.css" rel="stylesheet" type="text/css">
<link href="assets/stylesheets/themes.min.css" rel="stylesheet" type="text/css">

<!-- Get jQuery from Google CDN -->
<!--[if !IE]> -->
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.0.3/jquery.min.js">' + "<" + "/script>"); </script>
<!-- <![endif]-->
<!--[if lte IE 9]>
<script type="text/javascript"> window.jQuery || document.write('<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js">'+"<"+"/script>"); </script>
<![endif]-->


<!-- Pixel Admin's javascripts -->
<script src="assets/javascripts/bootstrap.min.js"></script>