Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • T ticket
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 1,809
    • Issues 1,809
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Infrastructure Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value stream
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Administrator
  • ticket
  • Issues
  • #483

Closed
Open
Created Apr 20, 2022 by Administrator@rootMaintainer

DirectAccesstoAdministrationPages

Created by: armorcodegithubpreprod[bot]

Threat Class :Predictable Resource Location Reason :AppScan requested a file which is probably not a legitimate part of the application. The response status was 200 OK. This indicates that the test succeeded in retrieving the content of the requested file. Technical Description :A common user can access certain pages on a site through simple surfing (i.e. following web links). However, there might be pages and scripts that are not accessible through simple surfing, (i.e. pages and scripts that are not linked). An attacker may be able to access these pages by guessing their name, e.g. admin.php, admin.asp, admin.cgi, admin.html, etc. Example request for a script named "admin.php": http://[SERVER]/admin.php Access to administration scripts should not be allowed without proper authorization, as it may allow an attacker to gain privileged rights. Sample Exploit: http://[SERVER]/admin.php http://[SERVER]/admin.asp http://[SERVER]/admin.aspx http://[SERVER]/admin.html http://[SERVER]/admin.cfm http://[SERVER]/admin.cgi Risk :It might be possible to escalate user privileges and gain administrative permissions over the web application

Mitigation: Do not allow access to administration scripts without proper authorization, as it may allow an attacker to gain privileged rights.

https://preprod.armorcode.ai/#/findings/5030013

Assignee
Assign to
Time tracking