Sample Report Templete
This is a template for the technical report, which explains all the parameters of the report.
Vulnerability Name
Vulnerability Name: Filename parameter on Home Page - "https://example.com/home" is vulnerable to Local File Inclusion (LFI)Affected URL and Area
Affected URL: https://example.com/home (Home Page) (Filename parameter)
OR
Vulnerable URL/Area: https://example.com/home - Home Page
Vulnerable Form/Parameter: Filename parameterVulnerability Description
Vulnerability Description: The Filename parameter on the Home Page (https://example.com/home) is vulnerable to Local File Inclusion (LFI) attacks. By sending a POST request to the server with a specially crafted payload in the Filename parameter (e.g., "../../../../../../etc/passwd"), an attacker can exploit this vulnerability to disclose sensitive information from the server. This payload allows the attacker to traverse the directory structure and access system files such as the "/etc/passwd" file, which contains user account information. The lack of proper input validation and sanitization of the Filename parameter enables this security risk, exposing the application to unauthorized disclosure of sensitive serverinformation.Severity and Risk Rating
CVE, CWE, CVSS Score and Vulnerability Class
Impact of Vulnerability
Steps to Reproduce
Proof of Concept (PoC)
Mitigation/Remediation
References
Last updated