Contents
About this report
Report parameters
Contexts
No contexts were selected, so all contexts were included by default.
Sites
The following sites were included:
- https://192.168.2.3
(If no sites were selected, all sites were included by default.)
An included site must also be within one of the included contexts for its data to be included in the report.
Risk levels
Included: High, Medium, Low, Informational
Excluded: None
Confidence levels
Included: User Confirmed, High, Medium, Low
Excluded: User Confirmed, High, Medium, Low, False Positive
Summaries
Alert counts by risk and confidence
| Confidence | ||||||
|---|---|---|---|---|---|---|
| User Confirmed | High | Medium | Low | Total | ||
| Risk | High | 0 (0.0%) |
0 (0.0%) |
0 (0.0%) |
0 (0.0%) |
0 (0.0%) |
| Medium | 0 (0.0%) |
0 (0.0%) |
2 (33.3%) |
1 (16.7%) |
3 (50.0%) |
|
| Low | 0 (0.0%) |
0 (0.0%) |
1 (16.7%) |
1 (16.7%) |
2 (33.3%) |
|
| Informational | 0 (0.0%) |
0 (0.0%) |
0 (0.0%) |
1 (16.7%) |
1 (16.7%) |
|
| Total | 0 (0.0%) |
0 (0.0%) |
3 (50.0%) |
3 (50.0%) |
6 (100%) |
|
Alert counts by site and risk
| Risk | |||||
|---|---|---|---|---|---|
|
High (= High) |
Medium (>= Medium) |
Low (>= Low) |
Informational (>= Informational) |
||
| Site | https://192.168.2.3 | 0 (0) |
3 (3) |
1 (4) |
0 (4) |
Alert counts by alert type
| Alert type | Risk | Count |
|---|---|---|
| Absence of Anti-CSRF Tokens | Medium | 3 (50.0%) |
| CSP: script-src unsafe-inline | Medium | 4 (66.7%) |
| CSP: style-src unsafe-inline | Medium | 4 (66.7%) |
| CSP: Notices | Low | 4 (66.7%) |
| Timestamp Disclosure - Unix | Low | 12 (200.0%) |
| Information Disclosure - Suspicious Comments | Informational | 27 (450.0%) |
| Total | 6 |
Alerts
-
Risk=Medium, Confidence=Medium (2)
-
https://192.168.2.3 (2)
-
CSP: script-src unsafe-inline (1)
GET https://192.168.2.3/
Alert tags Alert description Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks. Including (but not limited to) Cross Site Scripting (XSS), and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
Other info script-src includes unsafe-inline.
Request Request line and header section (403 bytes)
GET https://192.168.2.3/ HTTP/1.1 Host: 192.168.2.3 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: none Sec-Fetch-User: ?1Request body (0 bytes)
Response Status line and header section (1167 bytes)
HTTP/1.1 302 Found Date: Wed, 06 Jul 2022 23:10:54 GMT Server: Apache/2.4.29 (Ubuntu) Strict-Transport-Security: max-age=31536000; includeSubdomains; X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN Upgrade: h2 Connection: Upgrade, Keep-Alive Set-Cookie: MISP-93318e56-360b-4880-86e6-7e8f440da812=6jbnt1guubrkvakbk73spr90i2vhm1fc; expires=Sat, 09-Jul-2022 11:10:54 GMT; Max-Age=216000; path=/; secure; HttpOnly; SameSite=Lax Expires: Mon, 26 Jul 1997 05:00:00 GMT Last-Modified: Wed, 06 Jul 2022 23:10:54 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Content-Security-Policy: default-src 'self' data: 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; object-src 'none'; frame-ancestors 'none'; worker-src 'none'; child-src 'none'; frame-src 'none'; base-uri 'self'; img-src 'self' data:; font-src 'self'; form-action 'self'; connect-src 'self'; manifest-src 'none'; report-uri /servers/cspReport; upgrade-insecure-requests X-XSS-Protection: 1; mode=block Location: https://192.168.2.3/users/login Content-Length: 0 Keep-Alive: timeout=5, max=100 Content-Type: text/html; charset=UTF-8Response body (0 bytes)
Evidence default-src 'self' data: 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; object-src 'none'; frame-ancestors 'none'; worker-src 'none'; child-src 'none'; frame-src 'none'; base-uri 'self'; img-src 'self' data:; font-src 'self'; form-action 'self'; connect-src 'self'; manifest-src 'none'; report-uri /servers/cspReport; upgrade-insecure-requestsSolution Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.
-
CSP: style-src unsafe-inline (1)
GET https://192.168.2.3/
Alert tags Alert description Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks. Including (but not limited to) Cross Site Scripting (XSS), and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
Other info style-src includes unsafe-inline.
Request Request line and header section (403 bytes)
GET https://192.168.2.3/ HTTP/1.1 Host: 192.168.2.3 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: none Sec-Fetch-User: ?1Request body (0 bytes)
Response Status line and header section (1167 bytes)
HTTP/1.1 302 Found Date: Wed, 06 Jul 2022 23:10:54 GMT Server: Apache/2.4.29 (Ubuntu) Strict-Transport-Security: max-age=31536000; includeSubdomains; X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN Upgrade: h2 Connection: Upgrade, Keep-Alive Set-Cookie: MISP-93318e56-360b-4880-86e6-7e8f440da812=6jbnt1guubrkvakbk73spr90i2vhm1fc; expires=Sat, 09-Jul-2022 11:10:54 GMT; Max-Age=216000; path=/; secure; HttpOnly; SameSite=Lax Expires: Mon, 26 Jul 1997 05:00:00 GMT Last-Modified: Wed, 06 Jul 2022 23:10:54 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Content-Security-Policy: default-src 'self' data: 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; object-src 'none'; frame-ancestors 'none'; worker-src 'none'; child-src 'none'; frame-src 'none'; base-uri 'self'; img-src 'self' data:; font-src 'self'; form-action 'self'; connect-src 'self'; manifest-src 'none'; report-uri /servers/cspReport; upgrade-insecure-requests X-XSS-Protection: 1; mode=block Location: https://192.168.2.3/users/login Content-Length: 0 Keep-Alive: timeout=5, max=100 Content-Type: text/html; charset=UTF-8Response body (0 bytes)
Evidence default-src 'self' data: 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; object-src 'none'; frame-ancestors 'none'; worker-src 'none'; child-src 'none'; frame-src 'none'; base-uri 'self'; img-src 'self' data:; font-src 'self'; form-action 'self'; connect-src 'self'; manifest-src 'none'; report-uri /servers/cspReport; upgrade-insecure-requestsSolution Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.
-
-
-
Risk=Medium, Confidence=Low (1)
-
https://192.168.2.3 (1)
-
Absence of Anti-CSRF Tokens (1)
GET https://192.168.2.3/users/login
Alert tags Alert description No Anti-CSRF tokens were found in a HTML submission form.
A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The underlying cause is application functionality using predictable URL/form actions in a repeatable way. The nature of the attack is that CSRF exploits the trust that a web site has for a user. By contrast, cross-site scripting (XSS) exploits the trust that a user has for a web site. Like XSS, CSRF attacks are not necessarily cross-site, but they can be. Cross-site request forgery is also known as CSRF, XSRF, one-click attack, session riding, confused deputy, and sea surf.
CSRF attacks are effective in a number of situations, including:
* The victim has an active session on the target site.
* The victim is authenticated via HTTP auth on the target site.
* The victim is on the same local network as the target site.
CSRF has primarily been used to perform an action against a target site using the victim's privileges, but recent techniques have been discovered to disclose information by gaining access to the response. The risk of information disclosure is dramatically increased when the target site is vulnerable to XSS, because XSS can be used as a platform for CSRF, allowing the attack to operate within the bounds of the same-origin policy.
Other info No known Anti-CSRF token [anticsrf, CSRFToken, __RequestVerificationToken, csrfmiddlewaretoken, authenticity_token, OWASP_CSRFTOKEN, anoncsrf, csrf_token, _csrf, _csrfSecret, __csrf_magic, CSRF, _token, _csrf_token] was found in the following HTML form: [Form 1: "_method" "Token1906121980" "TokenFields770934101" "TokenUnlocked2112398299" "UserEmail" "UserPassword" ].
Request Request line and header section (498 bytes)
GET https://192.168.2.3/users/login HTTP/1.1 Host: 192.168.2.3 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Cookie: MISP-93318e56-360b-4880-86e6-7e8f440da812=6jbnt1guubrkvakbk73spr90i2vhm1fc Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: none Sec-Fetch-User: ?1Request body (0 bytes)
Response Status line and header section (941 bytes)
HTTP/1.1 200 OK Date: Wed, 06 Jul 2022 23:10:54 GMT Server: Apache/2.4.29 (Ubuntu) Strict-Transport-Security: max-age=31536000; includeSubdomains; X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN Expires: Mon, 26 Jul 1997 05:00:00 GMT Last-Modified: Wed, 06 Jul 2022 23:10:54 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Content-Security-Policy: default-src 'self' data: 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; object-src 'none'; frame-ancestors 'none'; worker-src 'none'; child-src 'none'; frame-src 'none'; base-uri 'self'; img-src 'self' data:; font-src 'self'; form-action 'self'; connect-src 'self'; manifest-src 'none'; report-uri /servers/cspReport; upgrade-insecure-requests X-XSS-Protection: 1; mode=block Content-Length: 7688 Vary: Accept-Encoding Keep-Alive: timeout=5, max=99 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8Response body (7688 bytes)
<!DOCTYPE html> <html xmlns="http://www.w3.org/1999/xhtml" lang="en"> <head> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="viewport" content="width=device-width"> <title>Users - MISP</title> <link rel="stylesheet" type="text/css" href="/css/bootstrap.css"/><link rel="stylesheet" type="text/css" href="/css/bootstrap-datepicker.css"/><link rel="stylesheet" type="text/css" href="/css/bootstrap-colorpicker.css"/><link rel="stylesheet" type="text/css" href="/css/font-awesome.css"/><link rel="stylesheet" type="text/css" href="/css/chosen.min.css"/><link rel="stylesheet" type="text/css" href="/css/main.css"/><link rel="stylesheet" type="text/css" href="/css/jquery-ui.css"/><link rel="stylesheet" type="text/css" href="/css/print.css" media="print"/><script type="text/javascript" src="/js/jquery.js"></script><script type="text/javascript" src="/js/misp-touch.js"></script><script type="text/javascript" src="/js/chosen.jquery.min.js"></script><script type="text/javascript" src="/js/jquery-ui.js"></script><link href="/favicon.ico" type="image/x-icon" rel="icon"/><link href="/favicon.ico" type="image/x-icon" rel="shortcut icon"/></head> <body data-controller="users" data-action="login"> <div id="popover_form" class="ajax_popover_form"></div> <div id="popover_form_large" class="ajax_popover_form ajax_popover_form_large"></div> <div id="popover_form_x_large" class="ajax_popover_form ajax_popover_form_x_large"></div> <div id="popover_matrix" class="ajax_popover_form ajax_popover_matrix"></div> <div id="popover_box" class="popover_box"></div> <div id="screenshot_box" class="screenshot_box"></div> <div id="confirmation_box" class="confirmation_box"></div> <div id="gray_out" class="gray_out"></div> <div id="container"> <div id="topBar" class="navbar navbar-inverse debugOff"> <div class="navbar-inner"> <ul class="nav"> </ul> <ul class="nav pull-right"> </ul> </div> </div> </div> <div id="flashContainer" style="padding-top:50px; !important;"> <div id="main-view-container" class="container-fluid"> </div> </div> <div> <div style="width:100%;"> <table style="margin-left:auto;margin-right:auto;"> <tr> <td style="text-align:right;width:250px;padding-right:50px"> </td> <td style="width:460px"> <span style="font-size:18px;"> Initial Install, please configure </span><br /><br /> <div> <img src="https://192.168.2.3/img/misp-logo-s-u.png" style="display:block; margin-left: auto; margin-right: auto;"/> </div> <div style="text-align:right;font-size:18px;"> Welcome to MISP on ubuntu, change this message in MISP Settings </div> <form action="/users/login" id="UserLoginForm" method="post" accept-charset="utf-8"><div style="display:none;"><input type="hidden" name="_method" value="POST"/><input type="hidden" name="data[_Token][key]" value="ac3cf48c3d5d40f9e02ceae11b6c61f0" id="Token1906121980" autocomplete="off"/></div> <legend>Login</legend> <div class="input email required"><label for="UserEmail">Email</label><input name="data[User][email]" autocomplete="off" autofocus="autofocus" maxlength="255" type="email" id="UserEmail" required="required"/></div><div class="input password required"><label for="UserPassword">Password</label><input name="data[User][password]" autocomplete="off" type="password" id="UserPassword" required="required"/></div> <div class="clear"> </div> <button class="btn btn-primary" type="submit">Login</button> <div style="display:none;"><input type="hidden" name="data[_Token][fields]" value="0aae20bc431fa1a52da1e7cf3338c540b5d78f26%3A" id="TokenFields770934101" autocomplete="off"/><input type="hidden" name="data[_Token][unlocked]" value="" id="TokenUnlocked2112398299" autocomplete="off"/></div></form> </td> <td style="width:250px;padding-left:50px"> </td> </tr> </table> </div> <script> $(function() { $('#UserLoginForm').submit(function(event) { event.preventDefault() submitLoginForm() }); }) function submitLoginForm() { var $form = $('#UserLoginForm') var url = $form.attr('action') var email = $form.find('#UserEmail').val() var password = $form.find('#UserPassword').val() var LinOTPAuth = false; var LinOTPAuthEnabled = false; if (LinOTPAuth && LinOTPAuthEnabled) { var otp = $form.find('#UserOtp').val() } if (!$form[0].checkValidity()) { $form[0].reportValidity() } else { fetchFormDataAjax(url, function(html) { var formHTML = $(html).find('form#UserLoginForm') if (!formHTML.length) { window.location = baseurl + '/users/login' } $('body').append($('<div id="temp" style="display: none"/>').append(formHTML)) var $tmpForm = $('#temp form#UserLoginForm') $tmpForm.find('#UserEmail').val(email) $tmpForm.find('#UserPassword').val(password) if (LinOTPAuth && LinOTPAuthEnabled) { $tmpForm.find('#UserOtp').val(otp) } $tmpForm.submit() }) } } </script> </div> <script type="text/javascript" src="/js/bootstrap.js"></script><script type="text/javascript" src="/js/bootstrap-timepicker.js"></script><script type="text/javascript" src="/js/bootstrap-datepicker.js"></script><script type="text/javascript" src="/js/bootstrap-colorpicker.js"></script><script type="text/javascript" src="/js/misp.js"></script><script type="text/javascript" src="/js/keyboard-shortcuts-definition.js"></script><script type="text/javascript" src="/js/keyboard-shortcuts.js"></script><div class="footer debugOff"> <div id="shortcutsListContainer" class=""> <div id="triangle" title="Show keyboard shortcuts help"></div> <div id="shortcutsList"> Keyboard shortcuts for this page:<br> <div id="shortcuts">none</div> </div> </div> <div id="footerContainer" class="navbar navbar-inverse"> <div class="navbar-inner"> <div class="pull-left footerText" style="float:left;position:absolute;padding-top:12px;z-index:2;"> <span>Download: <a href="/gpg.asc">PGP public key</a></span> </div> <div class="footerText footerCenterText"> <span>This is an initial install Powered by <a href="https://github.com/MISP/MISP" rel="noopener">MISP </a> Please configure and harden accordingly - <time>2022-07-07 01:10:54</time></span> </div> <div class="pull-right" style="position:relative;padding-top:9px;z-index:2;"> </div> </div> </div> </div> <div id="ajax_success_container" class="ajax_container"> <div id="ajax_success" class="ajax_result ajax_success"></div> </div> <div id="ajax_fail_container" class="ajax_container"> <div id="ajax_fail" class="ajax_result ajax_fail"></div> </div> <div id="ajax_hidden_container" class="hidden"></div> <div class="loading"> <div class="spinner"></div> <div class="loadingText">Loading</div> </div> <script type="text/javascript"> var baseurl = 'https://192.168.2.3'; var here = 'https://192.168.2.3/users/login'; </script> </body> </html>Evidence <form action="/users/login" id="UserLoginForm" method="post" accept-charset="utf-8">Solution Phase: Architecture and Design
Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
For example, use anti-CSRF packages such as the OWASP CSRFGuard.
Phase: Implementation
Ensure that your application is free of cross-site scripting issues, because most CSRF defenses can be bypassed using attacker-controlled script.
Phase: Architecture and Design
Generate a unique nonce for each form, place the nonce into the form, and verify the nonce upon receipt of the form. Be sure that the nonce is not predictable (CWE-330).
Note that this can be bypassed using XSS.
Identify especially dangerous operations. When the user performs a dangerous operation, send a separate confirmation request to ensure that the user intended to perform that operation.
Note that this can be bypassed using XSS.
Use the ESAPI Session Management control.
This control includes a component for CSRF.
Do not use the GET method for any request that triggers a state change.
Phase: Implementation
Check the HTTP Referer header to see if the request originated from an expected page. This could break legitimate functionality, because users or proxies may have disabled sending the Referer for privacy reasons.
-
-
-
Risk=Low, Confidence=Medium (1)
-
https://192.168.2.3 (1)
-
CSP: Notices (1)
GET https://192.168.2.3/
Alert tags Alert description Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks. Including (but not limited to) Cross Site Scripting (XSS), and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
Other info Warnings:
The report-uri directive has ben deprecated in favor of the new report-to directive
Request Request line and header section (403 bytes)
GET https://192.168.2.3/ HTTP/1.1 Host: 192.168.2.3 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: none Sec-Fetch-User: ?1Request body (0 bytes)
Response Status line and header section (1167 bytes)
HTTP/1.1 302 Found Date: Wed, 06 Jul 2022 23:10:54 GMT Server: Apache/2.4.29 (Ubuntu) Strict-Transport-Security: max-age=31536000; includeSubdomains; X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN Upgrade: h2 Connection: Upgrade, Keep-Alive Set-Cookie: MISP-93318e56-360b-4880-86e6-7e8f440da812=6jbnt1guubrkvakbk73spr90i2vhm1fc; expires=Sat, 09-Jul-2022 11:10:54 GMT; Max-Age=216000; path=/; secure; HttpOnly; SameSite=Lax Expires: Mon, 26 Jul 1997 05:00:00 GMT Last-Modified: Wed, 06 Jul 2022 23:10:54 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Content-Security-Policy: default-src 'self' data: 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; object-src 'none'; frame-ancestors 'none'; worker-src 'none'; child-src 'none'; frame-src 'none'; base-uri 'self'; img-src 'self' data:; font-src 'self'; form-action 'self'; connect-src 'self'; manifest-src 'none'; report-uri /servers/cspReport; upgrade-insecure-requests X-XSS-Protection: 1; mode=block Location: https://192.168.2.3/users/login Content-Length: 0 Keep-Alive: timeout=5, max=100 Content-Type: text/html; charset=UTF-8Response body (0 bytes)
Evidence default-src 'self' data: 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; object-src 'none'; frame-ancestors 'none'; worker-src 'none'; child-src 'none'; frame-src 'none'; base-uri 'self'; img-src 'self' data:; font-src 'self'; form-action 'self'; connect-src 'self'; manifest-src 'none'; report-uri /servers/cspReport; upgrade-insecure-requestsSolution Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.
-
-
-
Risk=Low, Confidence=Low (1)
-
Risk=Informational, Confidence=Low (1)
Appendix
Alert types
This section contains additional information on the types of alerts in the report.
-
Absence of Anti-CSRF Tokens
Source raised by a passive scanner (Absence of Anti-CSRF Tokens) CWE ID 352 WASC ID 9 Reference -
CSP: script-src unsafe-inline
Source raised by a passive scanner (CSP) CWE ID 693 WASC ID 15 Reference -
CSP: style-src unsafe-inline
Source raised by a passive scanner (CSP) CWE ID 693 WASC ID 15 Reference -
CSP: Notices
Source raised by a passive scanner (CSP) CWE ID 693 WASC ID 15 Reference -
Timestamp Disclosure - Unix
Source raised by a passive scanner (Timestamp Disclosure) CWE ID 200 WASC ID 13 Reference -
Information Disclosure - Suspicious Comments
Source raised by a passive scanner (Information Disclosure - Suspicious Comments) CWE ID 200 WASC ID 13
ZAP