pwn 0.5.362 → 0.5.363

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f96f7d17fe074a56c13412ad57096f2901637142735e40c6da52a0e1a14ddc99
4
- data.tar.gz: 2c329e97737723040338d9d3d7031c4e16a25fafc257a51bd82ad8b124d63921
3
+ metadata.gz: 21fb86e8e898726e81f654e71dd0e14d9aa039e710065c6912f313ab2ede3a96
4
+ data.tar.gz: 7905036ae9535d7a3ef4374d9510d3c7ae99a36fcb9d14cd238028ab5071436d
5
5
  SHA512:
6
- metadata.gz: 23aedc93f01608c45fb762b41fad7adcccb7dda870b7481e8cf02b843c25f56fb626215225eb89e4ceb018b7df597512f579bbc346418ca8ae1e9f22fc50dba6
7
- data.tar.gz: 689ad410f181f5dce20bca7b5cffad846d8aabaec3f773155ed40dde59bcda773c3265b1aa70327a1ced17bb1294d13707a3ab555353603161cf057d9ba153a6
6
+ metadata.gz: 02b055c4fe25af6f7621b4e4b26a28b38c24207c122042c538c184760c84a3bb29ecf60e003b2aa808a7cd5ace57c4984f0d352c767a9d02cc6e6ae85da985ff
7
+ data.tar.gz: 2beef162c831d0143544cc150b5e944b31923d5a8fdbf506acfa8d0f7139e93002967ef3b8d6b152448cdd663993bb434088d000d29a1647737c3fd65e8aa82d
data/Gemfile CHANGED
@@ -68,7 +68,7 @@ gem 'os', '1.1.4'
68
68
  gem 'ostruct', '0.6.3'
69
69
  gem 'packetfu', '2.0.0'
70
70
  gem 'packetgen', '4.1.0'
71
- gem 'pdf-reader', '2.14.1'
71
+ gem 'pdf-reader', '2.15.0'
72
72
  gem 'pg', '1.6.1'
73
73
  gem 'pry', '0.15.2'
74
74
  gem 'pry-doc', '1.6.0'
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ cd /opt/pwn
37
37
  $ ./install.sh
38
38
  $ ./install.sh ruby-gem
39
39
  $ pwn
40
- pwn[v0.5.362]:001 >>> PWN.help
40
+ pwn[v0.5.363]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.4.4@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.5.362]:001 >>> PWN.help
55
+ pwn[v0.5.363]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
  If you're using a multi-user install of RVM do:
@@ -62,7 +62,7 @@ $ rvm use ruby-3.4.4@pwn
62
62
  $ rvmsudo gem uninstall --all --executables pwn
63
63
  $ rvmsudo gem install --verbose pwn
64
64
  $ pwn
65
- pwn[v0.5.362]:001 >>> PWN.help
65
+ pwn[v0.5.363]:001 >>> PWN.help
66
66
  ```
67
67
 
68
68
  PWN periodically upgrades to the latest version of Ruby which is reflected in `/opt/pwn/.ruby-version`. The easiest way to upgrade to the latest version of Ruby from a previous PWN installation is to run the following script:
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.5.362'
4
+ VERSION = '0.5.363'
5
5
  end
@@ -499,7 +499,7 @@
499
499
  {"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.delete_proxy_listener Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.delete_proxy_listener`: Supported Method Parameters\n\nPWN::Plugins::BurpSuite.delete_proxy_listener(\n\nburp_obj: 'required - burp_obj returned by #start method',\nid: 'required - ID of the proxy listener (defaults to \"0\")'\n\n)\n"}]}
500
500
  {"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.disable_proxy Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.disable_proxy`: Supported Method Parameters\n\nPWN::Plugins::BurpSuite.disable_proxy(\n\nburp_obj: 'required - burp_obj returned by #start method'\n\n)\n"}]}
501
501
  {"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.enable_proxy Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.enable_proxy`: Supported Method Parameters\n\nPWN::Plugins::BurpSuite.enable_proxy(\n\nburp_obj: 'required - burp_obj returned by #start method'\n\n)\n"}]}
502
- {"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.format_uri_from_sitemap_resp Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.format_uri_from_sitemap_resp`: Supported Method Parameters\n\nuri = PWN::Plugins::BurpSuite.format_uri_from_sitemap_resp(\n\nscheme: 'required - scheme of the URI (http|https)',\nhost: 'required - host of the URI',\nport: 'optional - port of the URI',\npath: 'optional - path of the URI'\n\n)\n"}]}
502
+ {"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.format_uri_from_sitemap_resp Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.format_uri_from_sitemap_resp`: Supported Method Parameters\n\nuri = PWN::Plugins::BurpSuite.format_uri_from_sitemap_resp(\n\nscheme: 'required - scheme of the URI (http|https)',\nhost: 'required - host of the URI',\nport: 'optional - port of the URI',\npath: 'optional - path of the URI',\nquery: 'optional - query string of the URI'\n\n)\n"}]}
503
503
  {"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.generate_scan_report Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.generate_scan_report`: Supported Method Parameters\n\nPWN::Plugins::BurpSuite.generate_scan_report(\n\nburp_obj: 'required - burp_obj returned by #start method',\ntarget_url: 'required - target_url passed to #invoke_active_scan method',\nreport_type: :html|:xml|:both,\noutput_path: 'required - path to save report results'\n\n)\n"}]}
504
504
  {"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.get_proxy_listeners Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.get_proxy_listeners`: Supported Method Parameters\n\njson_proxy_listeners = PWN::Plugins::BurpSuite.get_proxy_listeners(\n\nburp_obj: 'required - burp_obj returned by #start method'\n\n)\n"}]}
505
505
  {"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.get_scan_issues Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.get_scan_issues`: Supported Method Parameters\n\njson_scan_issues = PWN::Plugins::BurpSuite.get_scan_issues(\n\nburp_obj: 'required - burp_obj returned by #start method'\n\n)\n"}]}
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.5.362
4
+ version: 0.5.363
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.
@@ -743,14 +743,14 @@ dependencies:
743
743
  requirements:
744
744
  - - '='
745
745
  - !ruby/object:Gem::Version
746
- version: 2.14.1
746
+ version: 2.15.0
747
747
  type: :runtime
748
748
  prerelease: false
749
749
  version_requirements: !ruby/object:Gem::Requirement
750
750
  requirements:
751
751
  - - '='
752
752
  - !ruby/object:Gem::Version
753
- version: 2.14.1
753
+ version: 2.15.0
754
754
  - !ruby/object:Gem::Dependency
755
755
  name: pg
756
756
  requirement: !ruby/object:Gem::Requirement
@@ -1329,13 +1329,11 @@ files:
1329
1329
  - ".github/FUNDING.yml"
1330
1330
  - ".github/ISSUE_TEMPLATE/bug_report.md"
1331
1331
  - ".gitignore"
1332
- - ".html"
1333
1332
  - ".rubocop.yml"
1334
1333
  - ".rubocop_todo.yml"
1335
1334
  - ".ruby-gemset"
1336
1335
  - ".ruby-version"
1337
1336
  - ".travis.yml"
1338
- - ".xml"
1339
1337
  - CHANGELOG_BETWEEN_TAGS.txt
1340
1338
  - CODE_OF_CONDUCT.md
1341
1339
  - CONTRIBUTING.md
data/.html DELETED
@@ -1,437 +0,0 @@
1
- <html><head><title>Burp Scanner Report</title>
2
- <meta http-equiv="Content-Security-Policy" content="default-src 'none';img-src 'self' data:;style-src 'unsafe-inline'" />
3
- <style type="text/css">
4
- body { background: #dedede; font-family: 'Droid sans', Helvetica, Arial, sans-serif; color: #404042; -webkit-font-smoothing: antialiased; }
5
- #container { width: 930px; padding: 0 15px; margin: 20px auto; background-color: #ffffff; }
6
- table { font-family: Arial, sans-serif; }
7
- a:link, a:visited { color: #ff6633; text-decoration: none; transform: 0.3s; }
8
- a:hover, a:active { color: #e24920; text-decoration: underline; }
9
- h1 { font-size: 1.6em; line-height: 1.4em; font-weight: normal; color: #404042; }
10
- h2 { font-size: 1.3em; line-height: 1.2em; padding: 0; margin: 0.8em 0 0.3em 0; font-weight: normal; color: #404042;}
11
- h4 { font-size: 1.0em; line-height: 1.2em; padding: 0; margin: 0.8em 0 0.3em 0; font-weight: bold; color: #404042;}
12
- .rule { height: 0px; border-top: 1px solid #404042; padding: 0; margin: 20px -15px 0 -15px; }
13
- .title { color: #ffffff; background: #1e517e; margin: 0 -15px 10px -15px; overflow: hidden; }
14
- .title h1 { color: #ffffff; padding: 10px 15px; margin: 0; font-size: 1.8em; }
15
- .title img { float: right; display: inline; padding: 1px; }
16
- .heading { background: #404042; margin: 0 -15px 10px -15px; padding: 0; display: inline-block; overflow: hidden; }
17
- .heading img { float: right; display: inline; margin: 8px 10px 0 10px; padding: 0; }
18
- .code { font-family: 'Courier New', Courier, monospace; }
19
- table.overview_table { border: 2px solid #e6e6e6; margin: 0; padding: 5px;}
20
- table.overview_table td.info { padding: 5px; background: #dedede; text-align: right; border-top: 2px solid #ffffff; border-right: 2px solid #ffffff; }
21
- table.overview_table td.info_end { padding: 5px; background: #dedede; text-align: right; border-top: 2px solid #ffffff; }
22
- table.overview_table td.colour_holder { padding: 0px; border-top: 2px solid #ffffff; border-right: 2px solid #ffffff; }
23
- table.overview_table td.colour_holder_end { padding: 0px; border-top: 2px solid #ffffff; }
24
- table.overview_table td.label { padding: 5px; font-weight: bold; }
25
- table.summary_table td { padding: 5px; background: #dedede; text-align: left; border-top: 2px solid #ffffff; border-right: 2px solid #ffffff; }
26
- table.summary_table td.icon { background: #404042; }
27
- .colour_block { padding: 5px; text-align: right; display: block; font-weight: bold; }
28
- .high_certain { border: 2px solid #f32a4c; color: #ffffff; background: #f32a4c; }
29
- .high_firm { border: 2px solid #f997a7; background: #f997a7; }
30
- .high_tentative { border: 2px solid #fddadf; background: #fddadf; }
31
- .medium_certain { border: 2px solid #ff6633; color: #ffffff; background: #ff6633; }
32
- .medium_firm { border: 2px solid #ffb299; background: #ffb299; }
33
- .medium_tentative { border: 2px solid #ffd9cc; background: #ffd9cc; }
34
- .low_certain { border: 2px solid #0094ff; color: #ffffff; background: #0094ff; }
35
- .low_firm { border: 2px solid #7fc9ff; background: #7fc9ff; }
36
- .low_tentative { border: 2px solid #bfe4ff; background: #bfe4ff; }
37
- .info_certain { border: 2px solid #7e8993; color: #ffffff; background: #7e8993; }
38
- .info_firm { border: 2px solid #b9ced2; background: #b9ced2; }
39
- .info_tentative { border: 2px solid #dae9ef; background: #dae9ef; }
40
- .false_positive_certain { border: 2px solid #3ba317; color: #ffffff; background: #3ba317; }
41
- .false_positive_firm { border: 2px solid #7dc164; background: #7dc164; }
42
- .false_positive_tentative { border: 2px solid #b8dcaa; background: #b8dcaa; }
43
- .row_total { border: 1px solid #dedede; background: #fff; }
44
- .grad_mark { padding: 4px; border-left: 1px solid #404042; display: inline-block; }
45
- .bar { margin-top: 3px; }
46
- .TOCH0 { font-size: 1.0em; font-weight: bold; word-wrap: break-word; }
47
- .TOCH1 { font-size: 0.8em; text-indent: -20px; padding-left: 50px; margin: 0; word-wrap: break-word; }
48
- .TOCH2 { font-size: 0.8em; text-indent: -20px; padding-left: 70px; margin: 0; word-wrap: break-word; }
49
- .BODH0 { font-size: 1.6em; line-height: 1.2em; font-weight: normal; padding: 10px 15px; margin: 0 -15px 10px -15px; display: inline-block; color: #ffffff; background-color: #1e517e; width: 100%; word-wrap: break-word; }
50
- .BODH0 a:link, .BODH0 a:visited, .BODH0 a:hover, .BODH0 a:active { color: #ffffff; text-decoration: none; }
51
- .BODH1 { font-size: 1.3em; line-height: 1.2em; font-weight: normal; padding: 13px 15px; margin: 0 -15px 0 -15px; display: inline-block; width: 100%; word-wrap: break-word; }
52
- .BODH1 a:link, .BODH1 a:visited, .BODH1 a:hover, .BODH1 a:active { color: #404042; text-decoration: none; }
53
- .BODH2 { font-size: 1.0em; font-weight: bold; line-height: 2.0em; width: 100%; word-wrap: break-word; }
54
- .PREVNEXT { font-size: 0.7em; font-weight: bold; color: #ffffff; padding: 3px 10px; border-radius: 10px;}
55
- .PREVNEXT:link, .PREVNEXT:visited { color: #ff6633 !important; background: #ffffff !important; border: 1px solid #ff6633 !important; text-decoration: none; }
56
- .PREVNEXT:hover, .PREVNEXT:active { color: #fff !important; background: #e24920 !important; border: 1px solid #e24920 !important; text-decoration: none; }
57
- .TEXT { font-size: 0.8em; padding: 0; margin: 0; word-wrap: break-word; }
58
- TD { font-size: 0.8em; }
59
- .HIGHLIGHT { background-color: #fcf446; }
60
- .rr_div { border: 2px solid #1e517e; width: 916px; word-wrap: break-word; -ms-word-wrap: break-word; margin: 0.8em 0; padding: 5px; font-size: 0.8em; max-height: 300px; overflow-y: auto; }
61
-
62
- div.scan_issue_false_positive_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
63
- div.scan_issue_high_certain_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
64
- div.scan_issue_high_firm_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
65
- div.scan_issue_high_tentative_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
66
- div.scan_issue_info_certain_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
67
- div.scan_issue_info_firm_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAABKFJREFUeNrEV0toXFUY/v5z78x0JjHpJGPbJLVVFFppTdzUKopWobEKFUnpQkHwsXElIiii4ErwgZCFaE1du2hdiIguIqaLFtRN0mgwtEUMtuo0mTzmmWQe5/idM2lDNXNzp0pzwsk99869//M73/8f+WJsDHYYTsUZ18L/As0nWgmMMfB4LyLb+cPjXD3Eh3u5voXTR31ozj/52iRXp43ga2hzQWr2DcrQlCXayS9TfNWjBlP/8IqAhkNB7uZ8hR88Zdz7ptGr7fzpThoxIIJBWvwVPDPIZ6eC5a8xnApaqowM+pAxLp8xIYy9RoDgMDwZ4fUzzmRTBvCD2xXUBCP1skGAz+EMeVqUTDJ1969pwBUFelVRL0M+zuuehoqJC4uNTfEEEq2tFh/uPmBs9ZQ6QyMe++dbyl8BQoTqGe4uiPqety2NdRtn6ObOFJYWS5ibnkZ7RwcikQi01sHBUOobOrfPOS316UevRp1/Ro0YSMIEBN3ukc2pFMZ//AEnj3+CxWIR/UeO4uDAEdRyOSJeB2YlKmpEKrWt9KMk9RQwfE6s9zavu9fLeLylBQuZDE4MHUP60kVUq1V8/ukQJkdHkezsDAEJaY2IssB0EVCoq+/i5c0wcFOej1Kp5DxvbWtzs1IpI59dgOdHQuCSOjz1pCey3wJQMewMvbwVFtilYh7dO3a4sBeyOfwx9Rse6D+EvnvvQ3Z2NpQMG3NP1PvWcxkeHY8xBlk+j4XaWUxeJBpFPJHAL2OjKDLvvVTueZ5bK17DDrLtbb4WOUSWi4X9yG658vIyasz9vgcPIBqLOSwUqNxrQrnUZR0lU+OR6+GYtmQSmctpLBEPqW1dzqBqpWK3WjNEdcDnv7uaIjemIMltOHl2zG3DUqGAR4mHhw8/QSBm1yOka3YE0bfHmtvTjAGb4nEUqdRuvanz55wBJ44fw4WJCRJSZ5NMbVIqiPXWGj4BuDAzg+XFJWzp6kY7977N/Uz6L4Iz0nQqVbO1xjKd5/sOfJZ67b1PGl6PihsaQBAW8H8Mkeuqlyz5uIiNGgZpy4bjG6FbnPv4WXkwwxsWAGNGWAvkO66zN1y5rQMaJ8lbWntiPrrR8Tc18yUqelq5/tiYd01osIuj3Uq5DEXzLfXansCWZBWahmlBzbxmSVNpY3shk2cUXqo3JsHDKrfk40d8ZKYvsyRnnTEdqZtZC6rhtmtND7EUnhdP2BOKrc22J9QfKpjTWMcI2wfe1N6OgedewLae7S4iA88+j129fcjOzYaAvvldV/SLrres0eVTKycj2yQwGvEyvHNSP/U0LEZ2JNmUzmdm2KAU0b3zVhTzOVemg9JAueVlo3dVxEypf58LLCyxKMbcw8VUEAasI/OzGcTZkm/p7kFufu4qJoKaKXq4n+Q9pdk2aFWfa32Rpp+9vH4blEdriO0FrOc2KhJMxT8Zo63Ms64RMauzgckmT/v6mZZXeVP8b2SD93g47WOGfw1/NFv9/AOaeQdj/g5vLjWhd5bOfczI7CbUXg8s7yGEpSnkDRrDzlkOuuO5yF66ttOeUVacyDkDBRP09Ax/H9bQeRWCXP4WYACYVfKTOSe0SAAAAABJRU5ErkJggg==)}
68
- div.scan_issue_info_tentative_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
69
- div.scan_issue_low_certain_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
70
- div.scan_issue_low_firm_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
71
- div.scan_issue_low_tentative_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
72
- div.scan_issue_medium_certain_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
73
- div.scan_issue_medium_firm_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
74
- div.scan_issue_medium_tentative_rpt{width: 32px; height: 32px; background-image: url(data:image/png;base64,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)}
75
-
76
-
77
- @media print {
78
- body { width: 100%; color: #000000; position: relative; }
79
- #container { width: 98%; padding: 0; margin: 0; }
80
- h1 { color: #000000; }
81
- h2 { color: #000000;}
82
- .rule { margin: 20px 0 0 0; }
83
- .title { color: #000000; margin: 0 0 10px 0; padding: 10px 0; }
84
- .title h1 { color: #000000; }
85
- .title img { margin: -3px 0; }
86
- .heading { margin: 0 0 10px 0; }
87
- .BODH0 { color: #000000; }
88
- .BODH1 { color: #000000; }
89
- .PREVNEXT { visibility: hidden; display: none; }
90
- .rr_div { width: 98%; margin: 0.8em auto; max-height: none !important; overflow: hidden; }
91
- }
92
-
93
- </style>
94
- </head>
95
- <body>
96
- <div id="container">
97
- <div class="title"><img src="data:image/png;base64,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" width="184" height="58"><h1>Burp Scanner Report</h1></div>
98
- <h1>Summary</h1>
99
- <span class="TEXT">The table below shows the numbers of issues identified in different categories. Issues are classified according to severity as High, Medium, Low, Information or False Positive. This reflects the likely impact of each issue for a typical organization. Issues are also classified according to confidence as Certain, Firm or Tentative. This reflects the inherent reliability of the technique that was used to identify the issue.</span><br><br><table cellpadding="0" cellspacing="0" class="overview_table">
100
- <tr>
101
- <td width="70">&nbsp;</td>
102
- <td width="100">&nbsp;</td>
103
- <td colspan="4" height="40" align="center" class="label">Confidence</td>
104
- </tr>
105
- <tr>
106
- <td width="70">&nbsp;</td>
107
- <td width="90">&nbsp;</td>
108
- <td width="82" height="30" class="info">Certain</td>
109
- <td width="82" height="30" class="info">Firm</td>
110
- <td width="82" height="30" class="info">Tentative</td>
111
- <td width="82" height="30" class="info_end">Total</td>
112
- </tr>
113
- <tr>
114
- <td rowspan="5" valign="middle" class="label">Severity</td>
115
- <td class="info" height="30">High</td>
116
- <td class="colour_holder"><span class="colour_block high_certain">0</span></td>
117
- <td class="colour_holder"><span class="colour_block high_firm">0</span></td>
118
- <td class="colour_holder"><span class="colour_block high_tentative">0</span></td>
119
- <td class="colour_holder_end"><span class="colour_block row_total">0</span></td>
120
- </tr>
121
- <tr>
122
- <td class="info" height="30">Medium</td>
123
- <td class="colour_holder"><span class="colour_block medium_certain">0</span></td>
124
- <td class="colour_holder"><span class="colour_block medium_firm">0</span></td>
125
- <td class="colour_holder"><span class="colour_block medium_tentative">0</span></td>
126
- <td class="colour_holder_end"><span class="colour_block row_total">0</span></td>
127
- </tr>
128
- <tr>
129
- <td class="info" height="30">Low</td>
130
- <td class="colour_holder"><span class="colour_block low_certain">0</span></td>
131
- <td class="colour_holder"><span class="colour_block low_firm">0</span></td>
132
- <td class="colour_holder"><span class="colour_block low_tentative">0</span></td>
133
- <td class="colour_holder_end"><span class="colour_block row_total">0</span></td>
134
- </tr>
135
- <tr>
136
- <td class="info" height="30">Information</td>
137
- <td class="colour_holder"><span class="colour_block info_certain">6</span></td>
138
- <td class="colour_holder"><span class="colour_block info_firm">0</span></td>
139
- <td class="colour_holder"><span class="colour_block info_tentative">0</span></td>
140
- <td class="colour_holder_end"><span class="colour_block row_total">6</span></td>
141
- </tr>
142
- <tr>
143
- <td class="info" height="30">False Positive</td>
144
- <td class="colour_holder"><span class="colour_block false_positive_certain">0</span></td>
145
- <td class="colour_holder"><span class="colour_block false_positive_firm">0</span></td>
146
- <td class="colour_holder"><span class="colour_block false_positive_tentative">0</span></td>
147
- <td class="colour_holder_end"><span class="colour_block row_total">0</span></td>
148
- </tr>
149
- </table><br>
150
- <span class="TEXT">The chart below shows the aggregated numbers of issues identified in each category. Solid colored bars represent issues with a confidence level of Certain, and the bars fade as the confidence level falls.</span><br><br><table cellpadding="0" cellspacing="0" class="overview_table">
151
- <tr>
152
- <td width="70">&nbsp;</td>
153
- <td width="100">&nbsp;</td>
154
- <td colspan="7" height="40" align="center" class="label">Number of issues</td>
155
- </tr>
156
- <tr>
157
- <td width="70">&nbsp;</td>
158
- <td width="90">&nbsp;</td>
159
- <td width="107"><span class="grad_mark">0</span></td>
160
- <td width="107"><span class="grad_mark">1</span></td>
161
- <td width="107"><span class="grad_mark">2</span></td>
162
- <td width="107"><span class="grad_mark">3</span></td>
163
- <td width="107"><span class="grad_mark">4</span></td>
164
- <td width="107"><span class="grad_mark">5</span></td>
165
- </tr>
166
- <tr>
167
- <td rowspan="3" valign="middle" class="label">Severity</td>
168
- <td class="info">High</td>
169
- <td colspan="6" height="30">
170
- <table cellpadding="0" cellspacing="0"><tr><td><img class="bar" src="data:image/png;base64,R0lGODlhAQABAPAAAPMqTAAAACH/C1hNUCBEYXRhWE1QPD94cGFja2V0IGJlZ2luPSLvu78iIGlkPSJXNU0wTXBDZWhpSHpyZVN6TlRjemtjOWQiPz4gPHg6eG1wbWV0YSB4bWxuczp4PSJhZG9iZTpuczptZXRhLyIgeDp4bXB0az0iQWRvYmUgWE1QIENvcmUgNi4wLWMwMDMgNzkuMTY0NTI3LCAyMDIwLzEwLzE1LTE3OjQ4OjMyICAgICAgICAiPiA8cmRmOlJERiB4bWxuczpyZGY9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkvMDIvMjItcmRmLXN5bnRheC1ucyMiPiA8cmRmOkRlc2NyaXB0aW9uIHJkZjphYm91dD0iIiB4bWxuczp4bXA9Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC8iIHhtbG5zOnhtcE1NPSJodHRwOi8vbnMuYWRvYmUuY29tL3hhcC8xLjAvbW0vIiB4bWxuczpzdFJlZj0iaHR0cDovL25zLmFkb2JlLmNvbS94YXAvMS4wL3NUeXBlL1Jlc291cmNlUmVmIyIgeG1wOkNyZWF0b3JUb29sPSJBZG9iZSBQaG90b3Nob3AgMjIuMSAoTWFjaW50b3NoKSIgeG1wTU06SW5zdGFuY2VJRD0ieG1wLmlpZDo2MUE2RjA3OTMzQzAxMUVCQkZDMEJFODVBQTNBQzcwMCIgeG1wTU06RG9jdW1lbnRJRD0ieG1wLmRpZDo2MUE2RjA3QTMzQzAxMUVCQkZDMEJFODVBQTNBQzcwMCI+IDx4bXBNTTpEZXJpdmVkRnJvbSBzdFJlZjppbnN0YW5jZUlEPSJ4bXAuaWlkOjYxQTZGMDc3MzNDMDExRUJCRkMwQkU4NUFBM0FDNzAwIiBzdFJlZjpkb2N1bWVudElEPSJ4bXAuZGlkOjYxQTZGMDc4MzNDMDExRUJCRkMwQkU4NUFBM0FDNzAwIi8+IDwvcmRmOkRlc2NyaXB0aW9uPiA8L3JkZjpSREY+IDwveDp4bXBtZXRhPiA8P3hwYWNrZXQgZW5kPSJyIj8+Af/+/fz7+vn49/b19PPy8fDv7u3s6+rp6Ofm5eTj4uHg397d3Nva2djX1tXU09LR0M/OzczLysnIx8bFxMPCwcC/vr28u7q5uLe2tbSzsrGwr66trKuqqainpqWko6KhoJ+enZybmpmYl5aVlJOSkZCPjo2Mi4qJiIeGhYSDgoGAf359fHt6eXh3dnV0c3JxcG9ubWxramloZ2ZlZGNiYWBfXl1cW1pZWFdWVVRTUlFQT05NTEtKSUhHRkVEQ0JBQD8+PTw7Ojk4NzY1NDMyMTAvLi0sKyopKCcmJSQjIiEgHx4dHBsaGRgXFhUUExIREA8ODQwLCgkIBwYFBAMCAQAALAAAAAABAAEAQAICRAEAOw==" width="0" height="16"></td><td><img class="bar" src="data:image/png;base64,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" width="0" height="16"></td><td><img class="bar" src="data:image/png;base64,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" width="0" height="16"></td></tr></table>
171
- </td>
172
- <td>&nbsp;</td>
173
- </tr>
174
- <tr>
175
- <td class="info">Medium</td>
176
- <td colspan="6" height="30">
177
- <table cellpadding="0" cellspacing="0"><tr><td><img class="bar" src="data:image/png;base64,R0lGODlhAQABAPAAAP9mMwAAACH/C1hNUCBEYXRhWE1QPD94cGFja2V0IGJlZ2luPSLvu78iIGlkPSJXNU0wTXBDZWhpSHpyZVN6TlRjemtjOWQiPz4gPHg6eG1wbWV0YSB4bWxuczp4PSJhZG9iZTpuczptZXRhLyIgeDp4bXB0az0iQWRvYmUgWE1QIENvcmUgNi4wLWMwMDMgNzkuMTY0NTI3LCAyMDIwLzEwLzE1LTE3OjQ4OjMyICAgICAgICAiPiA8cmRmOlJERiB4bWxuczpyZGY9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkvMDIvMjItcmRmLXN5bnRheC1ucyMiPiA8cmRmOkRlc2NyaXB0aW9uIHJkZjphYm91dD0iIiB4bWxuczp4bXA9Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC8iIHhtbG5zOnhtcE1NPSJodHRwOi8vbnMuYWRvYmUuY29tL3hhcC8xLjAvbW0vIiB4bWxuczpzdFJlZj0iaHR0cDovL25zLmFkb2JlLmNvbS94YXAvMS4wL3NUeXBlL1Jlc291cmNlUmVmIyIgeG1wOkNyZWF0b3JUb29sPSJBZG9iZSBQaG90b3Nob3AgMjIuMSAoTWFjaW50b3NoKSIgeG1wTU06SW5zdGFuY2VJRD0ieG1wLmlpZDo5NkRGMzMxMDMzQzAxMUVCQkZDMEJFODVBQTNBQzcwMCIgeG1wTU06RG9jdW1lbnRJRD0ieG1wLmRpZDo5NkRGMzMxMTMzQzAxMUVCQkZDMEJFODVBQTNBQzcwMCI+IDx4bXBNTTpEZXJpdmVkRnJvbSBzdFJlZjppbnN0YW5jZUlEPSJ4bXAuaWlkOjk2REYzMzBFMzNDMDExRUJCRkMwQkU4NUFBM0FDNzAwIiBzdFJlZjpkb2N1bWVudElEPSJ4bXAuZGlkOjk2REYzMzBGMzNDMDExRUJCRkMwQkU4NUFBM0FDNzAwIi8+IDwvcmRmOkRlc2NyaXB0aW9uPiA8L3JkZjpSREY+IDwveDp4bXBtZXRhPiA8P3hwYWNrZXQgZW5kPSJyIj8+Af/+/fz7+vn49/b19PPy8fDv7u3s6+rp6Ofm5eTj4uHg397d3Nva2djX1tXU09LR0M/OzczLysnIx8bFxMPCwcC/vr28u7q5uLe2tbSzsrGwr66trKuqqainpqWko6KhoJ+enZybmpmYl5aVlJOSkZCPjo2Mi4qJiIeGhYSDgoGAf359fHt6eXh3dnV0c3JxcG9ubWxramloZ2ZlZGNiYWBfXl1cW1pZWFdWVVRTUlFQT05NTEtKSUhHRkVEQ0JBQD8+PTw7Ojk4NzY1NDMyMTAvLi0sKyopKCcmJSQjIiEgHx4dHBsaGRgXFhUUExIREA8ODQwLCgkIBwYFBAMCAQAALAAAAAABAAEAQAICRAEAOw==" width="0" height="16"></td><td><img class="bar" src="data:image/png;base64,R0lGODlhAQABAPAAAP+ymQAAACH/C1hNUCBEYXRhWE1QPD94cGFja2V0IGJlZ2luPSLvu78iIGlkPSJXNU0wTXBDZWhpSHpyZVN6TlRjemtjOWQiPz4gPHg6eG1wbWV0YSB4bWxuczp4PSJhZG9iZTpuczptZXRhLyIgeDp4bXB0az0iQWRvYmUgWE1QIENvcmUgNi4wLWMwMDMgNzkuMTY0NTI3LCAyMDIwLzEwLzE1LTE3OjQ4OjMyICAgICAgICAiPiA8cmRmOlJERiB4bWxuczpyZGY9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkvMDIvMjItcmRmLXN5bnRheC1ucyMiPiA8cmRmOkRlc2NyaXB0aW9uIHJkZjphYm91dD0iIiB4bWxuczp4bXA9Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC8iIHhtbG5zOnhtcE1NPSJodHRwOi8vbnMuYWRvYmUuY29tL3hhcC8xLjAvbW0vIiB4bWxuczpzdFJlZj0iaHR0cDovL25zLmFkb2JlLmNvbS94YXAvMS4wL3NUeXBlL1Jlc291cmNlUmVmIyIgeG1wOkNyZWF0b3JUb29sPSJBZG9iZSBQaG90b3Nob3AgMjIuMSAoTWFjaW50b3NoKSIgeG1wTU06SW5zdGFuY2VJRD0ieG1wLmlpZDo5NkRGMzMwQzMzQzAxMUVCQkZDMEJFODVBQTNBQzcwMCIgeG1wTU06RG9jdW1lbnRJRD0ieG1wLmRpZDo5NkRGMzMwRDMzQzAxMUVCQkZDMEJFODVBQTNBQzcwMCI+IDx4bXBNTTpEZXJpdmVkRnJvbSBzdFJlZjppbnN0YW5jZUlEPSJ4bXAuaWlkOjYxQTZGMDdGMzNDMDExRUJCRkMwQkU4NUFBM0FDNzAwIiBzdFJlZjpkb2N1bWVudElEPSJ4bXAuZGlkOjYxQTZGMDgwMzNDMDExRUJCRkMwQkU4NUFBM0FDNzAwIi8+IDwvcmRmOkRlc2NyaXB0aW9uPiA8L3JkZjpSREY+IDwveDp4bXBtZXRhPiA8P3hwYWNrZXQgZW5kPSJyIj8+Af/+/fz7+vn49/b19PPy8fDv7u3s6+rp6Ofm5eTj4uHg397d3Nva2djX1tXU09LR0M/OzczLysnIx8bFxMPCwcC/vr28u7q5uLe2tbSzsrGwr66trKuqqainpqWko6KhoJ+enZybmpmYl5aVlJOSkZCPjo2Mi4qJiIeGhYSDgoGAf359fHt6eXh3dnV0c3JxcG9ubWxramloZ2ZlZGNiYWBfXl1cW1pZWFdWVVRTUlFQT05NTEtKSUhHRkVEQ0JBQD8+PTw7Ojk4NzY1NDMyMTAvLi0sKyopKCcmJSQjIiEgHx4dHBsaGRgXFhUUExIREA8ODQwLCgkIBwYFBAMCAQAALAAAAAABAAEAAAICRAEAOw==" width="0" height="16"></td><td><img class="bar" src="data:image/png;base64,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" width="0" height="16"></td></tr></table>
178
- </td>
179
- <td>&nbsp;</td>
180
- </tr>
181
- <tr>
182
- <td class="info">Low</td>
183
- <td colspan="6" height="30">
184
- <table cellpadding="0" cellspacing="0"><tr><td><img class="bar" src="data:image/png;base64,R0lGODlhAQABAPAAAACU/wAAACH/C1hNUCBEYXRhWE1QPD94cGFja2V0IGJlZ2luPSLvu78iIGlkPSJXNU0wTXBDZWhpSHpyZVN6TlRjemtjOWQiPz4gPHg6eG1wbWV0YSB4bWxuczp4PSJhZG9iZTpuczptZXRhLyIgeDp4bXB0az0iQWRvYmUgWE1QIENvcmUgNi4wLWMwMDMgNzkuMTY0NTI3LCAyMDIwLzEwLzE1LTE3OjQ4OjMyICAgICAgICAiPiA8cmRmOlJERiB4bWxuczpyZGY9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkvMDIvMjItcmRmLXN5bnRheC1ucyMiPiA8cmRmOkRlc2NyaXB0aW9uIHJkZjphYm91dD0iIiB4bWxuczp4bXA9Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC8iIHhtbG5zOnhtcE1NPSJodHRwOi8vbnMuYWRvYmUuY29tL3hhcC8xLjAvbW0vIiB4bWxuczpzdFJlZj0iaHR0cDovL25zLmFkb2JlLmNvbS94YXAvMS4wL3NUeXBlL1Jlc291cmNlUmVmIyIgeG1wOkNyZWF0b3JUb29sPSJBZG9iZSBQaG90b3Nob3AgMjIuMSAoTWFjaW50b3NoKSIgeG1wTU06SW5zdGFuY2VJRD0ieG1wLmlpZDpERDdCQTNGNTMzQzAxMUVCQkZDMEJFODVBQTNBQzcwMCIgeG1wTU06RG9jdW1lbnRJRD0ieG1wLmRpZDpERDdCQTNGNjMzQzAxMUVCQkZDMEJFODVBQTNBQzcwMCI+IDx4bXBNTTpEZXJpdmVkRnJvbSBzdFJlZjppbnN0YW5jZUlEPSJ4bXAuaWlkOjk2REYzMzE2MzNDMDExRUJCRkMwQkU4NUFBM0FDNzAwIiBzdFJlZjpkb2N1bWVudElEPSJ4bXAuZGlkOkREN0JBM0Y0MzNDMDExRUJCRkMwQkU4NUFBM0FDNzAwIi8+IDwvcmRmOkRlc2NyaXB0aW9uPiA8L3JkZjpSREY+IDwveDp4bXBtZXRhPiA8P3hwYWNrZXQgZW5kPSJyIj8+Af/+/fz7+vn49/b19PPy8fDv7u3s6+rp6Ofm5eTj4uHg397d3Nva2djX1tXU09LR0M/OzczLysnIx8bFxMPCwcC/vr28u7q5uLe2tbSzsrGwr66trKuqqainpqWko6KhoJ+enZybmpmYl5aVlJOSkZCPjo2Mi4qJiIeGhYSDgoGAf359fHt6eXh3dnV0c3JxcG9ubWxramloZ2ZlZGNiYWBfXl1cW1pZWFdWVVRTUlFQT05NTEtKSUhHRkVEQ0JBQD8+PTw7Ojk4NzY1NDMyMTAvLi0sKyopKCcmJSQjIiEgHx4dHBsaGRgXFhUUExIREA8ODQwLCgkIBwYFBAMCAQAALAAAAAABAAEAQAICRAEAOw==" width="0" height="16"></td><td><img class="bar" src="data:image/png;base64,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" width="0" height="16"></td><td><img class="bar" src="data:image/png;base64,R0lGODlhAQABAPABAL/k/wAAACH/C05FVFNDQVBFMi4wAwEAAAAh+QQFAAABACwAAAAAAQABAAACAkQBADs=" width="0" height="16"></td></tr></table>
185
- </td>
186
- <td>&nbsp;</td>
187
- </tr>
188
- </table>
189
-
190
- <div class="rule"></div>
191
- <h1>Contents</h1>
192
- <p class="TOCH0"><a href="#1">1.&nbsp;Content security policy: allows untrusted script execution</a></p>
193
- <p class="TOCH1"><a href="#1.1">1.1.&nbsp;https://poc.0dayinc.com/</a></p>
194
- <p class="TOCH1"><a href="#1.2">1.2.&nbsp;https://poc.0dayinc.com/robots.txt</a></p>
195
- <p class="TOCH0"><a href="#2">2.&nbsp;Content security policy: allows untrusted style execution</a></p>
196
- <p class="TOCH1"><a href="#2.1">2.1.&nbsp;https://poc.0dayinc.com/</a></p>
197
- <p class="TOCH1"><a href="#2.2">2.2.&nbsp;https://poc.0dayinc.com/robots.txt</a></p>
198
- <p class="TOCH0"><a href="#3">3.&nbsp;HTML does not specify charset</a></p>
199
- <p class="TOCH0"><a href="#4">4.&nbsp;TLS certificate</a></p>
200
- <br><div class="rule"></div>
201
- <span class="BODH0" id="1">1.&nbsp;<a href="https://portswigger.net/knowledgebase/issues/details/00200504_contentsecuritypolicyallowsuntrustedscriptexecution">Content security policy: allows untrusted script execution</a></span>
202
- <br><a class="PREVNEXT" href="#2">Next</a>
203
- <br>
204
- <br><span class="TEXT">There are 2 instances of this issue:
205
- <ul>
206
- <li><a href="#1.1">/</a></li>
207
- <li><a href="#1.2">/robots.txt</a></li>
208
- </ul></span>
209
- <h2>Issue background</h2>
210
- <span class="TEXT"><p>Content Security Policy (CSP) is a security mechanism designed to mitigate cross-site scripting attacks by disabling dangerous behaviours such as untrusted JavaScript execution.
211
- Websites can specify their security policy in a response header or meta tag, enabling fine-grained control over dangerous features like scripts and stylesheets.
212
- </p></span>
213
- <h2>Issue remediation</h2>
214
- <span class="TEXT"><p>
215
- Mitigate cross-site scripting by avoiding 'unsafe-inline', 'unsafe-eval', data: URLs, and global wildcards in script directives. Use a secure, random
216
- nonce of at least 8 characters 'nonce-RANDOM' to prevent untrusted JavaScript execution.
217
- </p></span>
218
- <h2>References</h2>
219
- <span class="TEXT"><ul><li><a href="https://portswigger.net/web-security/cross-site-scripting/content-security-policy">Web Security Academy: What is CSP?</a></li><li><a href="https://portswigger.net/web-security/cross-site-scripting#what-is-cross-site-scripting-xss">Web Security Academy: What is XSS?</a></li><li><a href="https://portswigger.net/web-security/cross-site-scripting/content-security-policy#mitigating-xss-attacks-using-csp">Web Security Academy: Mitigating XSS attacks using CSP</a></li><li><a href="https://portswigger.net/web-security/cross-site-scripting/preventing">Web Security Academy: Preventing XSS</a></li><li><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP">Content Security Policy (CSP)</a></li></ul></span>
220
- <h2>Vulnerability classifications</h2><span class="TEXT"><ul><li><a href="https://cwe.mitre.org/data/definitions/79.html">CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')</a></li><li><a href="https://cwe.mitre.org/data/definitions/80.html">CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)</a></li><li><a href="https://cwe.mitre.org/data/definitions/116.html">CWE-116: Improper Encoding or Escaping of Output</a></li><li><a href="https://cwe.mitre.org/data/definitions/159.html">CWE-159: Failure to Sanitize Special Element</a></li><li><a href="https://capec.mitre.org/data/definitions/588.html">CAPEC-588: DOM-Based XSS</a></li></ul></span>
221
- <br><br><div class="rule"></div>
222
- <span class="BODH1" id="1.1">1.1.&nbsp;https://poc.0dayinc.com/</span>
223
- <br><a class="PREVNEXT" href="#1.2">Next</a>
224
- <br>
225
- <h2>Summary</h2>
226
- <table cellpadding="0" cellspacing="0" class="summary_table">
227
- <tr>
228
- <td rowspan="4" class="icon" valign="top" align="center"><div class='scan_issue_info_certain_rpt'></div></td>
229
- <td>Severity:&nbsp;&nbsp;</td>
230
- <td><b>Information</b></td>
231
- </tr>
232
- <tr>
233
- <td>Confidence:&nbsp;&nbsp;</td>
234
- <td><b>Certain</b></td>
235
- </tr>
236
- <tr>
237
- <td>Host:&nbsp;&nbsp;</td>
238
- <td><b>https://poc.0dayinc.com</b></td>
239
- </tr>
240
- <tr>
241
- <td>Path:&nbsp;&nbsp;</td>
242
- <td><b>/</b></td>
243
- </tr>
244
- </table>
245
- <h2>Issue detail</h2>
246
- <span class="TEXT"><p>The content security policy fails to prevent untrusted JavaScript from being executed. As a result, it may fail to mitigate cross-site scripting attacks.</p><p>The policy has the following issues:</p><p>The policy contains unsafe-inline which can allow arbitrary scripts to be executed.</p><p>Allowing dynamic JavaScript execution through unsafe-eval in the policy fails to mitigate some DOM-based cross-site scripting vulnerabilities.</p></span>
247
- <h2>Request</h2>
248
- <div class="rr_div"><span>GET / HTTP/1.1<br>Host: poc.0dayinc.com<br>Sec-Ch-Ua: "Not)A;Brand";v="8", "Chromium";v="138", "Google Chrome";v="138"<br>Sec-Ch-Ua-Mobile: ?0<br>Sec-Ch-Ua-Platform: "Linux"<br>Upgrade-Insecure-Requests: 1<br>User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36<br>Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7<br>Sec-Fetch-Site: none<br>Sec-Fetch-Mode: navigate<br>Sec-Fetch-User: ?1<br>Sec-Fetch-Dest: document<br>Accept-Encoding: gzip, deflate, br<br>Accept-Language: en-US,en;q=0.9<br>Priority: u=0, i<br>Connection: keep-alive<br><br></span></div>
249
- <h2>Response</h2>
250
- <div class="rr_div"><span>HTTP/1.1 200 OK<br>Cache-Control: no-store<br>Connection: keep-alive<br>Content-Length: 218<br>Content-Security-Policy: <span class="HIGHLIGHT">default-src https:; style-src 'self' 'unsafe-inline'; font-src 'self' data:; script-src 'self' 'unsafe-inline' 'unsafe-eval'</span><br>Content-Type: text/html; charset=utf-8<br>Date: Mon, 11 Aug 2025 17:27:08 GMT<br>Last-Modified: Fri, 21 Jun 2024 20:28:04 GMT<br>Permissions-Policy: accelerometer=(none), camera=(none), geolocation=(none), gyroscope=(none), magnetometer=(none), microphone=(none), payment=(none), usb=(none)<br>Referrer-Policy: strict-origin<br>Server: Noneya 0.777<br>Strict-Transport-Security: max-age=31536000; includeSubDomains; preload<br>X-Content-Type-Options: nosniff<br>X-Frame-Options: deny<br>X-XSS-Protection: 1; mode=block<br><br>&lt;!DOCTYPE html&gt;<br>&lt;html&gt;<br> &lt;head&gt;<br> &lt;style&gt;<br> body {<br> background-color: #000000;<br> &nbsp;&nbsp;&nbsp;color: #CC0000;<br> }<br> &lt;/style&gt;<br> &lt;/head&gt;<br> &lt;body&gt;<br> &lt;div&gt;<br> &lt;p&gt;:() { : | : }; :&lt;/p&gt;<br> &lt;/div&gt;<br><br><b>...[SNIP]...</b><br></span></div>
251
- <div class="rule"></div>
252
- <span class="BODH1" id="1.2">1.2.&nbsp;https://poc.0dayinc.com/robots.txt</span>
253
- <br><a class="PREVNEXT" href="#1.1">Previous</a>
254
- &nbsp;<a class="PREVNEXT" href="#2.1">Next</a>
255
- <br>
256
- <h2>Summary</h2>
257
- <table cellpadding="0" cellspacing="0" class="summary_table">
258
- <tr>
259
- <td rowspan="4" class="icon" valign="top" align="center"><div class='scan_issue_info_certain_rpt'></div></td>
260
- <td>Severity:&nbsp;&nbsp;</td>
261
- <td><b>Information</b></td>
262
- </tr>
263
- <tr>
264
- <td>Confidence:&nbsp;&nbsp;</td>
265
- <td><b>Certain</b></td>
266
- </tr>
267
- <tr>
268
- <td>Host:&nbsp;&nbsp;</td>
269
- <td><b>https://poc.0dayinc.com</b></td>
270
- </tr>
271
- <tr>
272
- <td>Path:&nbsp;&nbsp;</td>
273
- <td><b>/robots.txt</b></td>
274
- </tr>
275
- </table>
276
- <h2>Issue detail</h2>
277
- <span class="TEXT"><p>The content security policy fails to prevent untrusted JavaScript from being executed. As a result, it may fail to mitigate cross-site scripting attacks.</p><p>The policy has the following issues:</p><p>The policy contains unsafe-inline which can allow arbitrary scripts to be executed.</p><p>Allowing dynamic JavaScript execution through unsafe-eval in the policy fails to mitigate some DOM-based cross-site scripting vulnerabilities.</p></span>
278
- <h2>Request</h2>
279
- <div class="rr_div"><span>GET /robots.txt HTTP/1.1<br>Host: poc.0dayinc.com<br>Cache-Control: max-age=0<br>Sec-Ch-Ua: "Google Chrome";v="138", "Not=A?Brand";v="8", "Chromium";v="138"<br>Sec-Ch-Ua-Mobile: ?0<br>Sec-Ch-Ua-Platform: "Linux"<br>Accept-Language: en-US;q=0.9,en;q=0.8<br>User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36<br>Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7<br>Sec-Fetch-Site: none<br>Sec-Fetch-Mode: navigate<br>Sec-Fetch-User: ?1<br>Sec-Fetch-Dest: document<br>Accept-Encoding: gzip, deflate, br<br>Connection: close<br><br></span></div>
280
- <h2>Response</h2>
281
- <div class="rr_div"><span>HTTP/1.0 404 Not Found<br>Cache-Control: no-store<br>Connection: close<br>Content-Length: 243<br>Content-Security-Policy: <span class="HIGHLIGHT">default-src https:; style-src 'self' 'unsafe-inline'; font-src 'self' data:; script-src 'self' 'unsafe-inline' 'unsafe-eval'</span><br>Content-Type: text/html<br>Date: Mon, 11 Aug 2025 17:28:20 GMT<br>Permissions-Policy: accelerometer=(none), camera=(none), geolocation=(none), gyroscope=(none), magnetometer=(none), microphone=(none), payment=(none), usb=(none)<br>Referrer-Policy: strict-origin<br>Server: Noneya 0.777<br>Strict-Transport-Security: max-age=31536000; includeSubDomains; preload<br>X-Content-Type-Options: nosniff<br>X-Frame-Options: deny<br>X-XSS-Protection: 1; mode=block<br><br>&lt;!DOCTYPE html&gt;<br>&lt;html&gt;<br> &lt;head&gt;<br> &lt;style&gt;<br> body {<br> background-color: #000000;<br> &nbsp;&nbsp;&nbsp;color: #CC0000;<br> }<br> &lt;/style&gt;<br> &lt;/head&gt;<br> &lt;body&gt;<br> &lt;div&gt;<br> &lt;p&gt;<br> O_o&lt;br /&gt;<br> .....<br><b>...[SNIP]...</b><br></span></div>
282
- <div class="rule"></div>
283
- <span class="BODH0" id="2">2.&nbsp;<a href="https://portswigger.net/knowledgebase/issues/details/00200505_contentsecuritypolicyallowsuntrustedstyleexecution">Content security policy: allows untrusted style execution</a></span>
284
- <br><a class="PREVNEXT" href="#1">Previous</a>
285
- &nbsp;<a class="PREVNEXT" href="#3">Next</a>
286
- <br>
287
- <br><span class="TEXT">There are 2 instances of this issue:
288
- <ul>
289
- <li><a href="#2.1">/</a></li>
290
- <li><a href="#2.2">/robots.txt</a></li>
291
- </ul></span>
292
- <h2>Issue background</h2>
293
- <span class="TEXT"><p>Content Security Policy (CSP) is a security mechanism designed to mitigate cross-site scripting attacks by disabling dangerous behaviours such as untrusted JavaScript execution.
294
- Websites can specify their security policy in a response header or meta tag, enabling fine-grained control over dangerous features like scripts and stylesheets.
295
- </p></span>
296
- <h2>Issue remediation</h2>
297
- <span class="TEXT"><p>
298
- Mitigate style-based data exfiltration by avoiding 'unsafe-inline', data: URLs, and global wildcards in style directives.
299
- Use a secure, random nonce of at least 8 characters 'nonce-RANDOM' in the relevant directive.
300
- </p></span>
301
- <h2>References</h2>
302
- <span class="TEXT"><ul><li><a href="https://portswigger.net/web-security/cross-site-scripting/content-security-policy">Web Security Academy: What is CSP?</a></li><li><a href="https://portswigger.net/research/blind-css-exfiltration">PortSwigger Research: Blind CSS exfiltration</a></li><li><a href="https://portswigger.net/research/detecting-and-exploiting-path-relative-stylesheet-import-prssi-vulnerabilities#badcss">PortSwigger Research: Offensive CSS research</a></li><li><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP">Content Security Policy (CSP)</a></li></ul></span>
303
- <h2>Vulnerability classifications</h2><span class="TEXT"><ul><li><a href="https://cwe.mitre.org/data/definitions/116.html">CWE-116: Improper Encoding or Escaping of Output</a></li><li><a href="https://cwe.mitre.org/data/definitions/159.html">CWE-159: Failure to Sanitize Special Element</a></li><li><a href="https://capec.mitre.org/data/definitions/468.html">CAPEC-468: Generic Cross-Browser Cross-Domain Theft</a></li></ul></span>
304
- <br><br><div class="rule"></div>
305
- <span class="BODH1" id="2.1">2.1.&nbsp;https://poc.0dayinc.com/</span>
306
- <br><a class="PREVNEXT" href="#1.2">Previous</a>
307
- &nbsp;<a class="PREVNEXT" href="#2.2">Next</a>
308
- <br>
309
- <h2>Summary</h2>
310
- <table cellpadding="0" cellspacing="0" class="summary_table">
311
- <tr>
312
- <td rowspan="4" class="icon" valign="top" align="center"><div class='scan_issue_info_certain_rpt'></div></td>
313
- <td>Severity:&nbsp;&nbsp;</td>
314
- <td><b>Information</b></td>
315
- </tr>
316
- <tr>
317
- <td>Confidence:&nbsp;&nbsp;</td>
318
- <td><b>Certain</b></td>
319
- </tr>
320
- <tr>
321
- <td>Host:&nbsp;&nbsp;</td>
322
- <td><b>https://poc.0dayinc.com</b></td>
323
- </tr>
324
- <tr>
325
- <td>Path:&nbsp;&nbsp;</td>
326
- <td><b>/</b></td>
327
- </tr>
328
- </table>
329
- <h2>Issue detail</h2>
330
- <span class="TEXT"><p>The content security policy fails to prevent untrusted style execution. As a result, it may fail to mitigate style based data exfiltration.</p><p>The policy contains unsafe-inline which can allow arbitrary styles to be executed.</p></span>
331
- <h2>Request</h2>
332
- <div class="rr_div"><span>GET / HTTP/1.1<br>Host: poc.0dayinc.com<br>Sec-Ch-Ua: "Not)A;Brand";v="8", "Chromium";v="138", "Google Chrome";v="138"<br>Sec-Ch-Ua-Mobile: ?0<br>Sec-Ch-Ua-Platform: "Linux"<br>Upgrade-Insecure-Requests: 1<br>User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36<br>Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7<br>Sec-Fetch-Site: none<br>Sec-Fetch-Mode: navigate<br>Sec-Fetch-User: ?1<br>Sec-Fetch-Dest: document<br>Accept-Encoding: gzip, deflate, br<br>Accept-Language: en-US,en;q=0.9<br>Priority: u=0, i<br>Connection: keep-alive<br><br></span></div>
333
- <h2>Response</h2>
334
- <div class="rr_div"><span>HTTP/1.1 200 OK<br>Cache-Control: no-store<br>Connection: keep-alive<br>Content-Length: 218<br>Content-Security-Policy: <span class="HIGHLIGHT">default-src https:; style-src 'self' 'unsafe-inline'; font-src 'self' data:; script-src 'self' 'unsafe-inline' 'unsafe-eval'</span><br>Content-Type: text/html; charset=utf-8<br>Date: Mon, 11 Aug 2025 17:27:08 GMT<br>Last-Modified: Fri, 21 Jun 2024 20:28:04 GMT<br>Permissions-Policy: accelerometer=(none), camera=(none), geolocation=(none), gyroscope=(none), magnetometer=(none), microphone=(none), payment=(none), usb=(none)<br>Referrer-Policy: strict-origin<br>Server: Noneya 0.777<br>Strict-Transport-Security: max-age=31536000; includeSubDomains; preload<br>X-Content-Type-Options: nosniff<br>X-Frame-Options: deny<br>X-XSS-Protection: 1; mode=block<br><br>&lt;!DOCTYPE html&gt;<br>&lt;html&gt;<br> &lt;head&gt;<br> &lt;style&gt;<br> body {<br> background-color: #000000;<br> &nbsp;&nbsp;&nbsp;color: #CC0000;<br> }<br> &lt;/style&gt;<br> &lt;/head&gt;<br> &lt;body&gt;<br> &lt;div&gt;<br> &lt;p&gt;:() { : | : }; :&lt;/p&gt;<br> &lt;/div&gt;<br><br><b>...[SNIP]...</b><br></span></div>
335
- <div class="rule"></div>
336
- <span class="BODH1" id="2.2">2.2.&nbsp;https://poc.0dayinc.com/robots.txt</span>
337
- <br><a class="PREVNEXT" href="#2.1">Previous</a>
338
- <br>
339
- <h2>Summary</h2>
340
- <table cellpadding="0" cellspacing="0" class="summary_table">
341
- <tr>
342
- <td rowspan="4" class="icon" valign="top" align="center"><div class='scan_issue_info_certain_rpt'></div></td>
343
- <td>Severity:&nbsp;&nbsp;</td>
344
- <td><b>Information</b></td>
345
- </tr>
346
- <tr>
347
- <td>Confidence:&nbsp;&nbsp;</td>
348
- <td><b>Certain</b></td>
349
- </tr>
350
- <tr>
351
- <td>Host:&nbsp;&nbsp;</td>
352
- <td><b>https://poc.0dayinc.com</b></td>
353
- </tr>
354
- <tr>
355
- <td>Path:&nbsp;&nbsp;</td>
356
- <td><b>/robots.txt</b></td>
357
- </tr>
358
- </table>
359
- <h2>Issue detail</h2>
360
- <span class="TEXT"><p>The content security policy fails to prevent untrusted style execution. As a result, it may fail to mitigate style based data exfiltration.</p><p>The policy contains unsafe-inline which can allow arbitrary styles to be executed.</p></span>
361
- <h2>Request</h2>
362
- <div class="rr_div"><span>GET /robots.txt HTTP/1.1<br>Host: poc.0dayinc.com<br>Cache-Control: max-age=0<br>Sec-Ch-Ua: "Google Chrome";v="138", "Not=A?Brand";v="8", "Chromium";v="138"<br>Sec-Ch-Ua-Mobile: ?0<br>Sec-Ch-Ua-Platform: "Linux"<br>Accept-Language: en-US;q=0.9,en;q=0.8<br>User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36<br>Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7<br>Sec-Fetch-Site: none<br>Sec-Fetch-Mode: navigate<br>Sec-Fetch-User: ?1<br>Sec-Fetch-Dest: document<br>Accept-Encoding: gzip, deflate, br<br>Connection: close<br><br></span></div>
363
- <h2>Response</h2>
364
- <div class="rr_div"><span>HTTP/1.0 404 Not Found<br>Cache-Control: no-store<br>Connection: close<br>Content-Length: 243<br>Content-Security-Policy: <span class="HIGHLIGHT">default-src https:; style-src 'self' 'unsafe-inline'; font-src 'self' data:; script-src 'self' 'unsafe-inline' 'unsafe-eval'</span><br>Content-Type: text/html<br>Date: Mon, 11 Aug 2025 17:28:20 GMT<br>Permissions-Policy: accelerometer=(none), camera=(none), geolocation=(none), gyroscope=(none), magnetometer=(none), microphone=(none), payment=(none), usb=(none)<br>Referrer-Policy: strict-origin<br>Server: Noneya 0.777<br>Strict-Transport-Security: max-age=31536000; includeSubDomains; preload<br>X-Content-Type-Options: nosniff<br>X-Frame-Options: deny<br>X-XSS-Protection: 1; mode=block<br><br>&lt;!DOCTYPE html&gt;<br>&lt;html&gt;<br> &lt;head&gt;<br> &lt;style&gt;<br> body {<br> background-color: #000000;<br> &nbsp;&nbsp;&nbsp;color: #CC0000;<br> }<br> &lt;/style&gt;<br> &lt;/head&gt;<br> &lt;body&gt;<br> &lt;div&gt;<br> &lt;p&gt;<br> O_o&lt;br /&gt;<br> .....<br><b>...[SNIP]...</b><br></span></div>
365
- <div class="rule"></div>
366
- <span class="BODH0" id="3">3.&nbsp;<a href="https://portswigger.net/knowledgebase/issues/details/00800200_htmldoesnotspecifycharset">HTML does not specify charset</a></span>
367
- <br><a class="PREVNEXT" href="#2">Previous</a>
368
- &nbsp;<a class="PREVNEXT" href="#4">Next</a>
369
- <br>
370
- <h2>Summary</h2>
371
- <table cellpadding="0" cellspacing="0" class="summary_table">
372
- <tr>
373
- <td rowspan="4" class="icon" valign="top" align="center"><div class='scan_issue_info_certain_rpt'></div></td>
374
- <td>Severity:&nbsp;&nbsp;</td>
375
- <td><b>Information</b></td>
376
- </tr>
377
- <tr>
378
- <td>Confidence:&nbsp;&nbsp;</td>
379
- <td><b>Certain</b></td>
380
- </tr>
381
- <tr>
382
- <td>Host:&nbsp;&nbsp;</td>
383
- <td><b>https://poc.0dayinc.com</b></td>
384
- </tr>
385
- <tr>
386
- <td>Path:&nbsp;&nbsp;</td>
387
- <td><b>/robots.txt</b></td>
388
- </tr>
389
- </table>
390
- <h2>Issue description</h2>
391
- <span class="TEXT"><p>If a response states that it contains HTML content but does not specify a character set, then the browser may analyze the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.</p>
392
- <p>In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of affected responses, and the context in which they appear, to determine whether any vulnerability exists. </p></span>
393
- <h2>Issue remediation</h2>
394
- <span class="TEXT"><p>For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognized character set, for example <b>charset=ISO-8859-1</b>.
395
- </p></span>
396
- <h2>Vulnerability classifications</h2><span class="TEXT"><ul><li><a href="https://cwe.mitre.org/data/definitions/16.html">CWE-16: Configuration</a></li><li><a href="https://cwe.mitre.org/data/definitions/436.html">CWE-436: Interpretation Conflict</a></li></ul></span>
397
- <h2>Request</h2>
398
- <div class="rr_div"><span>GET /robots.txt HTTP/1.1<br>Host: poc.0dayinc.com<br>Cache-Control: max-age=0<br>Sec-Ch-Ua: "Google Chrome";v="138", "Not=A?Brand";v="8", "Chromium";v="138"<br>Sec-Ch-Ua-Mobile: ?0<br>Sec-Ch-Ua-Platform: "Linux"<br>Accept-Language: en-US;q=0.9,en;q=0.8<br>User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36<br>Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7<br>Sec-Fetch-Site: none<br>Sec-Fetch-Mode: navigate<br>Sec-Fetch-User: ?1<br>Sec-Fetch-Dest: document<br>Accept-Encoding: gzip, deflate, br<br>Connection: close<br><br></span></div>
399
- <h2>Response</h2>
400
- <div class="rr_div"><span>HTTP/1.0 404 Not Found<br>Cache-Control: no-store<br>Connection: close<br>Content-Length: 243<br>Content-Security-Policy: default-src https:; style-src 'self' 'unsafe-inline'; font-src 'self' data:; script-src 'self' 'unsafe-inline' 'unsafe-eval'<br><span class="HIGHLIGHT">Content-Type: text/html</span><br>Date: Mon, 11 Aug 2025 17:28:20 GMT<br>Permissions-Policy: accelerometer=(none), camera=(none), geolocation=(none), gyroscope=(none), magnetometer=(none), microphone=(none), payment=(none), usb=(none)<br>Referrer-Policy: strict-origin<br>Server: Noneya 0.777<br>Strict-Transport-Security: max-age=31536000; includeSubDomains; preload<br>X-Content-Type-Options: nosniff<br>X-Frame-Options: deny<br>X-XSS-Protection: 1; mode=block<br><br>&lt;!DOCTYPE html&gt;<br>&lt;html&gt;<br> &lt;head&gt;<br> &lt;style&gt;<br> body {<br> background-color: #000000;<br> &nbsp;&nbsp;&nbsp;color: #CC0000;<br> }<br> &lt;/style&gt;<br> &lt;/head&gt;<br> &lt;body&gt;<br> &lt;div&gt;<br> &lt;p&gt;<br> O_o&lt;br /&gt;<br> .....<br><b>...[SNIP]...</b><br></span></div>
401
- <div class="rule"></div>
402
- <span class="BODH0" id="4">4.&nbsp;<a href="https://portswigger.net/knowledgebase/issues/details/01000100_tlscertificate">TLS certificate</a></span>
403
- <br><a class="PREVNEXT" href="#3">Previous</a>
404
- <br>
405
- <h2>Summary</h2>
406
- <table cellpadding="0" cellspacing="0" class="summary_table">
407
- <tr>
408
- <td rowspan="4" class="icon" valign="top" align="center"><div class='scan_issue_info_certain_rpt'></div></td>
409
- <td>Severity:&nbsp;&nbsp;</td>
410
- <td><b>Information</b></td>
411
- </tr>
412
- <tr>
413
- <td>Confidence:&nbsp;&nbsp;</td>
414
- <td><b>Certain</b></td>
415
- </tr>
416
- <tr>
417
- <td>Host:&nbsp;&nbsp;</td>
418
- <td><b>https://poc.0dayinc.com</b></td>
419
- </tr>
420
- <tr>
421
- <td>Path:&nbsp;&nbsp;</td>
422
- <td><b>/</b></td>
423
- </tr>
424
- </table>
425
- <h2>Issue detail</h2>
426
- <span class="TEXT">The server presented a valid, trusted TLS certificate. This issue is purely informational.<br><br>The server presented the following certificates:<br><br><h4>Server certificate</h4><table><tr><td><b>Issued to:</b>&nbsp;&nbsp;</td><td>poc.0dayinc.com, m.0dayinc.com, vpn.0dayinc.com, wdaas.0dayinc.com</td></tr><tr><td><b>Issued by:</b>&nbsp;&nbsp;</td><td>R11</td></tr><tr><td><b>Valid from:</b>&nbsp;&nbsp;</td><td>Sun Jul 06 23:01:41 MDT 2025</td></tr><tr><td><b>Valid to:</b>&nbsp;&nbsp;</td><td>Sat Oct 04 23:01:40 MDT 2025</td></tr></table><h4>Certificate chain #1</h4><table><tr><td><b>Issued to:</b>&nbsp;&nbsp;</td><td>R11</td></tr><tr><td><b>Issued by:</b>&nbsp;&nbsp;</td><td>ISRG Root X1</td></tr><tr><td><b>Valid from:</b>&nbsp;&nbsp;</td><td>Tue Mar 12 18:00:00 MDT 2024</td></tr><tr><td><b>Valid to:</b>&nbsp;&nbsp;</td><td>Fri Mar 12 16:59:59 MST 2027</td></tr></table><h4>Certificate chain #2</h4><table><tr><td><b>Issued to:</b>&nbsp;&nbsp;</td><td>ISRG Root X1</td></tr><tr><td><b>Issued by:</b>&nbsp;&nbsp;</td><td>ISRG Root X1</td></tr><tr><td><b>Valid from:</b>&nbsp;&nbsp;</td><td>Thu Jun 04 05:04:38 MDT 2015</td></tr><tr><td><b>Valid to:</b>&nbsp;&nbsp;</td><td>Mon Jun 04 05:04:38 MDT 2035</td></tr></table></span>
427
- <h2>Issue background</h2>
428
- <span class="TEXT"><p>TLS (or SSL) helps to protect the confidentiality and integrity of information in transit between the browser and server, and to provide authentication of the server's identity. To serve this purpose, the server must present an TLS certificate that is valid for the server's hostname, is issued by a trusted authority and is valid for the current date. If any one of these requirements is not met, TLS connections to the server will not provide the full protection for which TLS is designed.</p>
429
- <p>It should be noted that various attacks exist against TLS in general, and in the context of HTTPS web connections in particular. It may be possible for a determined and suitably-positioned attacker to compromise TLS connections without user detection even when a valid TLS certificate is used. </p></span>
430
- <h2>References</h2>
431
- <span class="TEXT"><ul><li><a href="https://wiki.mozilla.org/Security/Server_Side_TLS">SSL/TLS Configuration Guide</a></li></ul></span>
432
- <h2>Vulnerability classifications</h2><span class="TEXT"><ul><li><a href="https://cwe.mitre.org/data/definitions/295.html">CWE-295: Improper Certificate Validation</a></li><li><a href="https://cwe.mitre.org/data/definitions/326.html">CWE-326: Inadequate Encryption Strength</a></li><li><a href="https://cwe.mitre.org/data/definitions/327.html">CWE-327: Use of a Broken or Risky Cryptographic Algorithm</a></li></ul></span>
433
- <div class="rule"></div>
434
- <span class="TEXT"><br>Report generated by Burp Suite <a href="https://portswigger.net/vulnerability-scanner/">web vulnerability scanner</a> v2025.7.2, at Mon Aug 11 11:33:20 MDT 2025.<br><br></span>
435
- </div>
436
- </body>
437
- </html>
data/.xml DELETED
@@ -1,212 +0,0 @@
1
- <?xml version="1.0"?>
2
- <!DOCTYPE issues [
3
- <!ELEMENT issues (issue*)>
4
- <!ATTLIST issues burpVersion CDATA "">
5
- <!ATTLIST issues exportTime CDATA "">
6
- <!ELEMENT issue (serialNumber, type, name, host, path, location, severity, confidence, issueBackground?, remediationBackground?, references?, vulnerabilityClassifications?, issueDetail?, issueDetailItems?, remediationDetail?, requestresponse*, collaboratorEvent*, infiltratorEvent*, staticAnalysis*, dynamicAnalysis*, prototypePollution*)>
7
- <!ELEMENT serialNumber (#PCDATA)>
8
- <!ELEMENT type (#PCDATA)>
9
- <!ELEMENT name (#PCDATA)>
10
- <!ELEMENT host (#PCDATA)>
11
- <!ATTLIST host ip CDATA "">
12
- <!ELEMENT path (#PCDATA)>
13
- <!ELEMENT location (#PCDATA)>
14
- <!ELEMENT severity (#PCDATA)>
15
- <!ELEMENT confidence (#PCDATA)>
16
- <!ELEMENT issueBackground (#PCDATA)>
17
- <!ELEMENT remediationBackground (#PCDATA)>
18
- <!ELEMENT references (#PCDATA)>
19
- <!ELEMENT vulnerabilityClassifications (#PCDATA)>
20
- <!ELEMENT issueDetail (#PCDATA)>
21
- <!ELEMENT issueDetailItems (issueDetailItem*)>
22
- <!ELEMENT issueDetailItem (#PCDATA)>
23
- <!ELEMENT remediationDetail (#PCDATA)>
24
- <!ELEMENT requestresponse (request?, response?, responseRedirected?)>
25
- <!ELEMENT request (#PCDATA)>
26
- <!ATTLIST request method CDATA "">
27
- <!ATTLIST request base64 (true|false) "false">
28
- <!ELEMENT response (#PCDATA)>
29
- <!ATTLIST response base64 (true|false) "false">
30
- <!ELEMENT responseRedirected (#PCDATA)>
31
- <!ELEMENT sender (#PCDATA)>
32
- <!ELEMENT message (#PCDATA)>
33
- <!ELEMENT conversation (#PCDATA)>
34
- <!ELEMENT recipient (#PCDATA)>
35
- <!ELEMENT recipients (recipient*)>
36
- <!ELEMENT smtp (sender, recipients, message, conversation)>
37
- <!ELEMENT collaboratorEvent (interactionType, originIp, time, lookupType?, lookupHost?, requestresponse?, smtp?)>
38
- <!ELEMENT interactionType (#PCDATA)>
39
- <!ELEMENT originIp (#PCDATA)>
40
- <!ELEMENT time (#PCDATA)>
41
- <!ELEMENT lookupType (#PCDATA)>
42
- <!ELEMENT lookupHost (#PCDATA)>
43
- <!ELEMENT infiltratorEvent (parameterName, platform, signature, stackTrace?, parameterValue?, collaboratorEvent)>
44
- <!ELEMENT parameterName (#PCDATA)>
45
- <!ELEMENT platform (#PCDATA)>
46
- <!ELEMENT signature (#PCDATA)>
47
- <!ELEMENT stackTrace (#PCDATA)>
48
- <!ELEMENT parameterValue (#PCDATA)>
49
- <!ELEMENT dynamicAnalysis (source, sink, sourceStackTrace, sinkStackTrace, eventListenerStackTrace, sourceValue, sinkValue, eventHandlerData, eventHandlerDataType, eventHandlerManipulatedData, poc, origin, isOriginChecked, sourceElementId, sourceElementName, eventFiredEventName, eventFiredElementId, eventFiredElementName, eventFiredOuterHtml)>
50
- <!ELEMENT prototypePollution (poc, pollutionTechnique, pollutionType)>
51
- <!ELEMENT staticAnalysis (source, sink, codeSnippets)>
52
- <!ELEMENT source (#PCDATA)>
53
- <!ELEMENT sink (#PCDATA)>
54
- <!ELEMENT sourceStackTrace (#PCDATA)>
55
- <!ELEMENT sinkStackTrace (#PCDATA)>
56
- <!ELEMENT eventListenerStackTrace (#PCDATA)>
57
- <!ELEMENT sourceValue (#PCDATA)>
58
- <!ELEMENT sinkValue (#PCDATA)>
59
- <!ELEMENT eventHandlerData (#PCDATA)>
60
- <!ELEMENT eventHandlerDataType (#PCDATA)>
61
- <!ELEMENT sourceElementId (#PCDATA)>
62
- <!ELEMENT sourceElementName (#PCDATA)>
63
- <!ELEMENT eventFiredEventName (#PCDATA)>
64
- <!ELEMENT eventFiredElementId (#PCDATA)>
65
- <!ELEMENT eventFiredElementName (#PCDATA)>
66
- <!ELEMENT eventFiredOuterHtml (#PCDATA)>
67
- <!ELEMENT eventHandlerManipulatedData (#PCDATA)>
68
- <!ELEMENT poc (#PCDATA)>
69
- <!ELEMENT origin (#PCDATA)>
70
- <!ELEMENT isOriginChecked (#PCDATA)>
71
- <!ELEMENT codeSnippets (codeSnippet*)>
72
- <!ELEMENT codeSnippet (#PCDATA)>
73
- <!ELEMENT pollutionTechnique (#PCDATA)>
74
- <!ELEMENT pollutionType (#PCDATA)>
75
- ]>
76
- <issues burpVersion="2025.7.2" exportTime="Mon Aug 11 11:33:20 MDT 2025">
77
- <issue>
78
- <serialNumber>8761614717769578496</serialNumber>
79
- <type>2098436</type>
80
- <name><![CDATA[Content security policy: allows untrusted script execution]]></name>
81
- <host ip="136.38.196.251">https://poc.0dayinc.com</host>
82
- <path><![CDATA[/]]></path>
83
- <location><![CDATA[/]]></location>
84
- <severity>Information</severity>
85
- <confidence>Certain</confidence>
86
- <issueBackground><![CDATA[<p>Content Security Policy (CSP) is a security mechanism designed to mitigate cross-site scripting attacks by disabling dangerous behaviours such as untrusted JavaScript execution.
87
- Websites can specify their security policy in a response header or meta tag, enabling fine-grained control over dangerous features like scripts and stylesheets.
88
- </p>]]></issueBackground>
89
- <remediationBackground><![CDATA[<p>
90
- Mitigate cross-site scripting by avoiding 'unsafe-inline', 'unsafe-eval', data: URLs, and global wildcards in script directives. Use a secure, random
91
- nonce of at least 8 characters 'nonce-RANDOM' to prevent untrusted JavaScript execution.
92
- </p>]]></remediationBackground>
93
- <references><![CDATA[<ul><li><a href="https://portswigger.net/web-security/cross-site-scripting/content-security-policy">Web Security Academy: What is CSP?</a></li><li><a href="https://portswigger.net/web-security/cross-site-scripting#what-is-cross-site-scripting-xss">Web Security Academy: What is XSS?</a></li><li><a href="https://portswigger.net/web-security/cross-site-scripting/content-security-policy#mitigating-xss-attacks-using-csp">Web Security Academy: Mitigating XSS attacks using CSP</a></li><li><a href="https://portswigger.net/web-security/cross-site-scripting/preventing">Web Security Academy: Preventing XSS</a></li><li><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP">Content Security Policy (CSP)</a></li></ul>]]></references>
94
- <vulnerabilityClassifications><![CDATA[<ul><li><a href="https://cwe.mitre.org/data/definitions/79.html">CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')</a></li><li><a href="https://cwe.mitre.org/data/definitions/80.html">CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)</a></li><li><a href="https://cwe.mitre.org/data/definitions/116.html">CWE-116: Improper Encoding or Escaping of Output</a></li><li><a href="https://cwe.mitre.org/data/definitions/159.html">CWE-159: Failure to Sanitize Special Element</a></li><li><a href="https://capec.mitre.org/data/definitions/588.html">CAPEC-588: DOM-Based XSS</a></li></ul>]]></vulnerabilityClassifications>
95
- <issueDetail><![CDATA[<p>The content security policy fails to prevent untrusted JavaScript from being executed. As a result, it may fail to mitigate cross-site scripting attacks.</p><p>The policy has the following issues:</p><p>The policy contains unsafe-inline which can allow arbitrary scripts to be executed.</p><p>Allowing dynamic JavaScript execution through unsafe-eval in the policy fails to mitigate some DOM-based cross-site scripting vulnerabilities.</p>]]></issueDetail>
96
- <requestresponse>
97
- <request method="GET" base64="true"><![CDATA[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]]></request>
98
- <response base64="true"><![CDATA[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]]></response>
99
- <responseRedirected>false</responseRedirected>
100
- </requestresponse>
101
- </issue>
102
- <issue>
103
- <serialNumber>5973985809874235392</serialNumber>
104
- <type>2098437</type>
105
- <name><![CDATA[Content security policy: allows untrusted style execution]]></name>
106
- <host ip="136.38.196.251">https://poc.0dayinc.com</host>
107
- <path><![CDATA[/]]></path>
108
- <location><![CDATA[/]]></location>
109
- <severity>Information</severity>
110
- <confidence>Certain</confidence>
111
- <issueBackground><![CDATA[<p>Content Security Policy (CSP) is a security mechanism designed to mitigate cross-site scripting attacks by disabling dangerous behaviours such as untrusted JavaScript execution.
112
- Websites can specify their security policy in a response header or meta tag, enabling fine-grained control over dangerous features like scripts and stylesheets.
113
- </p>]]></issueBackground>
114
- <remediationBackground><![CDATA[<p>
115
- Mitigate style-based data exfiltration by avoiding 'unsafe-inline', data: URLs, and global wildcards in style directives.
116
- Use a secure, random nonce of at least 8 characters 'nonce-RANDOM' in the relevant directive.
117
- </p>]]></remediationBackground>
118
- <references><![CDATA[<ul><li><a href="https://portswigger.net/web-security/cross-site-scripting/content-security-policy">Web Security Academy: What is CSP?</a></li><li><a href="https://portswigger.net/research/blind-css-exfiltration">PortSwigger Research: Blind CSS exfiltration</a></li><li><a href="https://portswigger.net/research/detecting-and-exploiting-path-relative-stylesheet-import-prssi-vulnerabilities#badcss">PortSwigger Research: Offensive CSS research</a></li><li><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP">Content Security Policy (CSP)</a></li></ul>]]></references>
119
- <vulnerabilityClassifications><![CDATA[<ul><li><a href="https://cwe.mitre.org/data/definitions/116.html">CWE-116: Improper Encoding or Escaping of Output</a></li><li><a href="https://cwe.mitre.org/data/definitions/159.html">CWE-159: Failure to Sanitize Special Element</a></li><li><a href="https://capec.mitre.org/data/definitions/468.html">CAPEC-468: Generic Cross-Browser Cross-Domain Theft</a></li></ul>]]></vulnerabilityClassifications>
120
- <issueDetail><![CDATA[<p>The content security policy fails to prevent untrusted style execution. As a result, it may fail to mitigate style based data exfiltration.</p><p>The policy contains unsafe-inline which can allow arbitrary styles to be executed.</p>]]></issueDetail>
121
- <requestresponse>
122
- <request method="GET" base64="true"><![CDATA[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]]></request>
123
- <response base64="true"><![CDATA[SFRUUC8xLjEgMjAwIE9LDQpDYWNoZS1Db250cm9sOiBuby1zdG9yZQ0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQ29udGVudC1MZW5ndGg6IDIxOA0KQ29udGVudC1TZWN1cml0eS1Qb2xpY3k6IGRlZmF1bHQtc3JjIGh0dHBzOjsgc3R5bGUtc3JjICdzZWxmJyAndW5zYWZlLWlubGluZSc7IGZvbnQtc3JjICdzZWxmJyBkYXRhOjsgc2NyaXB0LXNyYyAnc2VsZicgJ3Vuc2FmZS1pbmxpbmUnICd1bnNhZmUtZXZhbCcNCkNvbnRlbnQtVHlwZTogdGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04DQpEYXRlOiBNb24sIDExIEF1ZyAyMDI1IDE3OjI3OjA4IEdNVA0KTGFzdC1Nb2RpZmllZDogRnJpLCAyMSBKdW4gMjAyNCAyMDoyODowNCBHTVQNClBlcm1pc3Npb25zLVBvbGljeTogYWNjZWxlcm9tZXRlcj0obm9uZSksIGNhbWVyYT0obm9uZSksIGdlb2xvY2F0aW9uPShub25lKSwgZ3lyb3Njb3BlPShub25lKSwgbWFnbmV0b21ldGVyPShub25lKSwgbWljcm9waG9uZT0obm9uZSksIHBheW1lbnQ9KG5vbmUpLCB1c2I9KG5vbmUpDQpSZWZlcnJlci1Qb2xpY3k6IHN0cmljdC1vcmlnaW4NClNlcnZlcjogTm9uZXlhIDAuNzc3DQpTdHJpY3QtVHJhbnNwb3J0LVNlY3VyaXR5OiBtYXgtYWdlPTMxNTM2MDAwOyBpbmNsdWRlU3ViRG9tYWluczsgcHJlbG9hZA0KWC1Db250ZW50LVR5cGUtT3B0aW9uczogbm9zbmlmZg0KWC1GcmFtZS1PcHRpb25zOiBkZW55DQpYLVhTUy1Qcm90ZWN0aW9uOiAxOyBtb2RlPWJsb2NrDQoNCjwhRE9DVFlQRSBodG1sPgo8aHRtbD4KICA8aGVhZD4KICAgIDxzdHlsZT4KICAgICAgYm9keSB7CiAgICAgICAgYmFja2dyb3VuZC1jb2xvcjogIzAwMDAwMDsKCWNvbG9yOiAjQ0MwMDAwOwogICAgICB9CiAgICA8L3N0eWxlPgogIDwvaGVhZD4KICA8Ym9keT4KICAgIDxkaXY+CiAgICAgIDxwPjooKSB7IDogfCA6IH07IDo8L3A+CiAgICA8L2Rpdj4KICA8L2JvZHk+CjwvaHRtbD4K]]></response>
124
- <responseRedirected>false</responseRedirected>
125
- </requestresponse>
126
- </issue>
127
- <issue>
128
- <serialNumber>993590318586394624</serialNumber>
129
- <type>16777472</type>
130
- <name><![CDATA[TLS certificate]]></name>
131
- <host ip="136.38.196.251">https://poc.0dayinc.com</host>
132
- <path><![CDATA[/]]></path>
133
- <location><![CDATA[/]]></location>
134
- <severity>Information</severity>
135
- <confidence>Certain</confidence>
136
- <issueBackground><![CDATA[<p>TLS (or SSL) helps to protect the confidentiality and integrity of information in transit between the browser and server, and to provide authentication of the server's identity. To serve this purpose, the server must present an TLS certificate that is valid for the server's hostname, is issued by a trusted authority and is valid for the current date. If any one of these requirements is not met, TLS connections to the server will not provide the full protection for which TLS is designed.</p>
137
- <p>It should be noted that various attacks exist against TLS in general, and in the context of HTTPS web connections in particular. It may be possible for a determined and suitably-positioned attacker to compromise TLS connections without user detection even when a valid TLS certificate is used. </p>]]></issueBackground>
138
- <references><![CDATA[<ul><li><a href="https://wiki.mozilla.org/Security/Server_Side_TLS">SSL/TLS Configuration Guide</a></li></ul>]]></references>
139
- <vulnerabilityClassifications><![CDATA[<ul><li><a href="https://cwe.mitre.org/data/definitions/295.html">CWE-295: Improper Certificate Validation</a></li><li><a href="https://cwe.mitre.org/data/definitions/326.html">CWE-326: Inadequate Encryption Strength</a></li><li><a href="https://cwe.mitre.org/data/definitions/327.html">CWE-327: Use of a Broken or Risky Cryptographic Algorithm</a></li></ul>]]></vulnerabilityClassifications>
140
- <issueDetail><![CDATA[The server presented a valid, trusted TLS certificate. This issue is purely informational.<br><br>The server presented the following certificates:<br><br><h4>Server certificate</h4><table><tr><td><b>Issued to:</b>&nbsp;&nbsp;</td><td>poc.0dayinc.com, m.0dayinc.com, vpn.0dayinc.com, wdaas.0dayinc.com</td></tr><tr><td><b>Issued by:</b>&nbsp;&nbsp;</td><td>R11</td></tr><tr><td><b>Valid from:</b>&nbsp;&nbsp;</td><td>Sun Jul 06 23:01:41 MDT 2025</td></tr><tr><td><b>Valid to:</b>&nbsp;&nbsp;</td><td>Sat Oct 04 23:01:40 MDT 2025</td></tr></table><h4>Certificate chain #1</h4><table><tr><td><b>Issued to:</b>&nbsp;&nbsp;</td><td>R11</td></tr><tr><td><b>Issued by:</b>&nbsp;&nbsp;</td><td>ISRG Root X1</td></tr><tr><td><b>Valid from:</b>&nbsp;&nbsp;</td><td>Tue Mar 12 18:00:00 MDT 2024</td></tr><tr><td><b>Valid to:</b>&nbsp;&nbsp;</td><td>Fri Mar 12 16:59:59 MST 2027</td></tr></table><h4>Certificate chain #2</h4><table><tr><td><b>Issued to:</b>&nbsp;&nbsp;</td><td>ISRG Root X1</td></tr><tr><td><b>Issued by:</b>&nbsp;&nbsp;</td><td>ISRG Root X1</td></tr><tr><td><b>Valid from:</b>&nbsp;&nbsp;</td><td>Thu Jun 04 05:04:38 MDT 2015</td></tr><tr><td><b>Valid to:</b>&nbsp;&nbsp;</td><td>Mon Jun 04 05:04:38 MDT 2035</td></tr></table>]]></issueDetail>
141
- </issue>
142
- <issue>
143
- <serialNumber>6457410302985630720</serialNumber>
144
- <type>8389120</type>
145
- <name><![CDATA[HTML does not specify charset]]></name>
146
- <host ip="136.38.196.251">https://poc.0dayinc.com</host>
147
- <path><![CDATA[/robots.txt]]></path>
148
- <location><![CDATA[/robots.txt]]></location>
149
- <severity>Information</severity>
150
- <confidence>Certain</confidence>
151
- <issueBackground><![CDATA[<p>If a response states that it contains HTML content but does not specify a character set, then the browser may analyze the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.</p>
152
- <p>In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of affected responses, and the context in which they appear, to determine whether any vulnerability exists. </p>]]></issueBackground>
153
- <remediationBackground><![CDATA[<p>For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognized character set, for example <b>charset=ISO-8859-1</b>.
154
- </p>]]></remediationBackground>
155
- <vulnerabilityClassifications><![CDATA[<ul><li><a href="https://cwe.mitre.org/data/definitions/16.html">CWE-16: Configuration</a></li><li><a href="https://cwe.mitre.org/data/definitions/436.html">CWE-436: Interpretation Conflict</a></li></ul>]]></vulnerabilityClassifications>
156
- <requestresponse>
157
- <request method="GET" base64="true"><![CDATA[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]]></request>
158
- <response base64="true"><![CDATA[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]]></response>
159
- <responseRedirected>false</responseRedirected>
160
- </requestresponse>
161
- </issue>
162
- <issue>
163
- <serialNumber>6812554366595366912</serialNumber>
164
- <type>2098436</type>
165
- <name><![CDATA[Content security policy: allows untrusted script execution]]></name>
166
- <host ip="136.38.196.251">https://poc.0dayinc.com</host>
167
- <path><![CDATA[/robots.txt]]></path>
168
- <location><![CDATA[/robots.txt]]></location>
169
- <severity>Information</severity>
170
- <confidence>Certain</confidence>
171
- <issueBackground><![CDATA[<p>Content Security Policy (CSP) is a security mechanism designed to mitigate cross-site scripting attacks by disabling dangerous behaviours such as untrusted JavaScript execution.
172
- Websites can specify their security policy in a response header or meta tag, enabling fine-grained control over dangerous features like scripts and stylesheets.
173
- </p>]]></issueBackground>
174
- <remediationBackground><![CDATA[<p>
175
- Mitigate cross-site scripting by avoiding 'unsafe-inline', 'unsafe-eval', data: URLs, and global wildcards in script directives. Use a secure, random
176
- nonce of at least 8 characters 'nonce-RANDOM' to prevent untrusted JavaScript execution.
177
- </p>]]></remediationBackground>
178
- <references><![CDATA[<ul><li><a href="https://portswigger.net/web-security/cross-site-scripting/content-security-policy">Web Security Academy: What is CSP?</a></li><li><a href="https://portswigger.net/web-security/cross-site-scripting#what-is-cross-site-scripting-xss">Web Security Academy: What is XSS?</a></li><li><a href="https://portswigger.net/web-security/cross-site-scripting/content-security-policy#mitigating-xss-attacks-using-csp">Web Security Academy: Mitigating XSS attacks using CSP</a></li><li><a href="https://portswigger.net/web-security/cross-site-scripting/preventing">Web Security Academy: Preventing XSS</a></li><li><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP">Content Security Policy (CSP)</a></li></ul>]]></references>
179
- <vulnerabilityClassifications><![CDATA[<ul><li><a href="https://cwe.mitre.org/data/definitions/79.html">CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')</a></li><li><a href="https://cwe.mitre.org/data/definitions/80.html">CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)</a></li><li><a href="https://cwe.mitre.org/data/definitions/116.html">CWE-116: Improper Encoding or Escaping of Output</a></li><li><a href="https://cwe.mitre.org/data/definitions/159.html">CWE-159: Failure to Sanitize Special Element</a></li><li><a href="https://capec.mitre.org/data/definitions/588.html">CAPEC-588: DOM-Based XSS</a></li></ul>]]></vulnerabilityClassifications>
180
- <issueDetail><![CDATA[<p>The content security policy fails to prevent untrusted JavaScript from being executed. As a result, it may fail to mitigate cross-site scripting attacks.</p><p>The policy has the following issues:</p><p>The policy contains unsafe-inline which can allow arbitrary scripts to be executed.</p><p>Allowing dynamic JavaScript execution through unsafe-eval in the policy fails to mitigate some DOM-based cross-site scripting vulnerabilities.</p>]]></issueDetail>
181
- <requestresponse>
182
- <request method="GET" base64="true"><![CDATA[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]]></request>
183
- <response base64="true"><![CDATA[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]]></response>
184
- <responseRedirected>false</responseRedirected>
185
- </requestresponse>
186
- </issue>
187
- <issue>
188
- <serialNumber>4524306458680059904</serialNumber>
189
- <type>2098437</type>
190
- <name><![CDATA[Content security policy: allows untrusted style execution]]></name>
191
- <host ip="136.38.196.251">https://poc.0dayinc.com</host>
192
- <path><![CDATA[/robots.txt]]></path>
193
- <location><![CDATA[/robots.txt]]></location>
194
- <severity>Information</severity>
195
- <confidence>Certain</confidence>
196
- <issueBackground><![CDATA[<p>Content Security Policy (CSP) is a security mechanism designed to mitigate cross-site scripting attacks by disabling dangerous behaviours such as untrusted JavaScript execution.
197
- Websites can specify their security policy in a response header or meta tag, enabling fine-grained control over dangerous features like scripts and stylesheets.
198
- </p>]]></issueBackground>
199
- <remediationBackground><![CDATA[<p>
200
- Mitigate style-based data exfiltration by avoiding 'unsafe-inline', data: URLs, and global wildcards in style directives.
201
- Use a secure, random nonce of at least 8 characters 'nonce-RANDOM' in the relevant directive.
202
- </p>]]></remediationBackground>
203
- <references><![CDATA[<ul><li><a href="https://portswigger.net/web-security/cross-site-scripting/content-security-policy">Web Security Academy: What is CSP?</a></li><li><a href="https://portswigger.net/research/blind-css-exfiltration">PortSwigger Research: Blind CSS exfiltration</a></li><li><a href="https://portswigger.net/research/detecting-and-exploiting-path-relative-stylesheet-import-prssi-vulnerabilities#badcss">PortSwigger Research: Offensive CSS research</a></li><li><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP">Content Security Policy (CSP)</a></li></ul>]]></references>
204
- <vulnerabilityClassifications><![CDATA[<ul><li><a href="https://cwe.mitre.org/data/definitions/116.html">CWE-116: Improper Encoding or Escaping of Output</a></li><li><a href="https://cwe.mitre.org/data/definitions/159.html">CWE-159: Failure to Sanitize Special Element</a></li><li><a href="https://capec.mitre.org/data/definitions/468.html">CAPEC-468: Generic Cross-Browser Cross-Domain Theft</a></li></ul>]]></vulnerabilityClassifications>
205
- <issueDetail><![CDATA[<p>The content security policy fails to prevent untrusted style execution. As a result, it may fail to mitigate style based data exfiltration.</p><p>The policy contains unsafe-inline which can allow arbitrary styles to be executed.</p>]]></issueDetail>
206
- <requestresponse>
207
- <request method="GET" base64="true"><![CDATA[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]]></request>
208
- <response base64="true"><![CDATA[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]]></response>
209
- <responseRedirected>false</responseRedirected>
210
- </requestresponse>
211
- </issue>
212
- </issues>