PDF Report
PDF Report
PDF Report
Filter Settings
Severity
Included: High, Medium, Low, Information
Excluded: None
Result State
Included: To Verify, Not Exploitable, Confirmed, Urgent, Proposed Not Exploitable
Excluded: None
Assigned to
Included: All
Categories
Included:
Uncategorized All
Custom All
PCI DSS v3.2.1 All
OWASP Top 10 All
2013
FISMA 2014 All
NIST SP 800-53 All
OWASP Top 10 All
2017
OWASP Mobile Top All
10 2016
ASD STIG 4.10 All
OWASP Top 10 API All
OWASP Top 10 All
2010
OWASP Top 10 All
2021
Excluded:
Uncategorized None
PAGE 1 OF 42
Custom None
PCI DSS v3.2.1 None
OWASP Top 10 None
2013
FISMA 2014 None
NIST SP 800-53 None
OWASP Top 10 None
2017
OWASP Mobile Top None
10 2016
ASD STIG 4.10 None
OWASP Top 10 API None
OWASP Top 10 None
2010
OWASP Top 10 None
2021
Results Limit
Results limit per query was set to 50
Selected Queries
Selected queries are listed in Result Summary
PAGE 2 OF 42
Result Summary Most Vulnerable Files
index.html
High
mockServiceWorker.j
Medium
s
Low
index.tsx
Top 5 Vulnerabilities
PAGE 3 OF 42
Scan Summary - OWASP Top 10 2017
Further details and elaboration about vulnerabilities and risks can be found at: OWASP Top 10 2017
A7-Cross-Site
App. App.
Scripting EASY WIDESPREAD EASY MODERATE 0 0
Specific Specific
(XSS)*
A9-Using
Components App. App.
AVERAGE WIDESPREAD AVERAGE MODERATE 1 1
with Known Specific Specific
Vulnerabilities
A10-Insufficient
App. App.
Logging & AVERAGE WIDESPREAD DIFFICULT MODERATE 0 0
Specific Specific
Monitoring
* Project scan results do not include all relevant queries. Presets and\or Filters should be changed to include all relevant
standard queries.
PAGE 4 OF 42
Scan Summary - OWASP Top 10 2021
A2-Cryptographic Failures 0 0
A3-Injection* 0 0
A4-Insecure Design 0 0
A5-Security Misconfiguration 0 0
* Project scan results do not include all relevant queries. Presets and\or Filters should be changed to include all relevant
standard queries.
PAGE 5 OF 42
Scan Summary - OWASP Top 10 2013
Further details and elaboration about vulnerabilities and risks can be found at: OWASP Top 10 2013
A2-Broken
EXTERNAL, AFFECTED
Authentication
INTERNAL AVERAGE WIDESPREAD AVERAGE SEVERE DATA AND 0 0
and Session
USERS FUNCTIONS
Management
EXTERNAL,
A3-Cross-Site AFFECTED
INTERNAL, VERY
Scripting AVERAGE EASY MODERATE DATA AND 0 0
ADMIN WIDESPREAD
(XSS)* SYSTEM
USERS
A4-Insecure
SYSTEM EXPOSED
Direct Object EASY COMMON EASY MODERATE 0 0
USERS DATA
References*
EXTERNAL,
ALL DATA
A5-Security INTERNAL,
EASY COMMON EASY MODERATE AND 0 0
Misconfiguration ADMIN
SYSTEM
USERS
EXTERNAL,
INTERNAL,
A6-Sensitive ADMIN EXPOSED
DIFFICULT UNCOMMON AVERAGE SEVERE 0 0
Data Exposure USERS, DATA
USERS
BROWSERS
A8-Cross-Site AFFECTED
USERS
Request Forgery AVERAGE COMMON EASY MODERATE DATA AND 0 0
BROWSERS
(CSRF)* FUNCTIONS
A9-Using EXTERNAL
AFFECTED
Components USERS,
AVERAGE WIDESPREAD DIFFICULT MODERATE DATA AND 0 0
with Known AUTOMATED
FUNCTIONS
Vulnerabilities TOOLS
A10-Unvalidated AFFECTED
USERS
Redirects and AVERAGE WIDESPREAD DIFFICULT MODERATE DATA AND 0 0
BROWSERS
Forwards FUNCTIONS
* Project scan results do not include all relevant queries. Presets and\or Filters should be changed to include all relevant
standard queries.
PAGE 6 OF 42
Scan Summary - PCI DSS v3.2.1
* Project scan results do not include all relevant queries. Presets and\or Filters should be changed to include all relevant
standard queries.
PAGE 7 OF 42
Scan Summary - FISMA 2014
* Project scan results do not include all relevant queries. Presets and\or Filters should be changed to include all relevant
standard queries.
PAGE 8 OF 42
Scan Summary - NIST SP 800-53
* Project scan results do not include all relevant queries. Presets and\or Filters should be changed to include all relevant
standard queries.
PAGE 9 OF 42
Scan Summary - OWASP Mobile Top 10 2016
PAGE 10 OF 42
application uses, or modify the application's
data and resources. This can provide the
attacker a direct method of subverting the
intended use of the software for personal or
monetary gain.
PAGE 11 OF 42
Scan Summary - Custom
Check 0 0
Optional 0 0
PAGE 12 OF 42
Scan Summary - ASD STIG 4.10
APSC-DV-000650 - CAT II The application must not write sensitive data into the application
0 0
logs.
APSC-DV-000660 - CAT II The application must provide audit record generation capability
0 0
for session timeouts.
APSC-DV-000670 - CAT II The application must record a time stamp indicating when the
0 0
event occurred.
APSC-DV-000680 - CAT II The application must provide audit record generation capability
0 0
for HTTP headers including User-Agent, Referer, GET, and POST.
APSC-DV-000690 - CAT II The application must provide audit record generation capability
0 0
for connecting system IP addresses.
APSC-DV-000700 - CAT II The application must record the username or user ID of the user
0 0
associated with the event.
APSC-DV-000840 - CAT II The application must generate audit records for privileged
0 0
activities or other system-level access.
APSC-DV-000850 - CAT II The application must generate audit records showing starting and
0 0
ending time for user access to the system.
PAGE 13 OF 42
APSC-DV-000870 - CAT II The application must generate audit records for all direct access
0 0
to the information system.
APSC-DV-000880 - CAT II The application must generate audit records for all account
0 0
creations, modifications, disabling, and termination events.
APSC-DV-000910 - CAT II The application must initiate session auditing upon startup. 0 0
APSC-DV-000960 - CAT II The application must log user actions involving access to data. 0 0
APSC-DV-000970 - CAT II The application must log user actions involving changes to data. 0 0
APSC-DV-000990 - CAT II The application must produce audit records containing enough
information to establish which component, feature or function of the application triggered 0 0
the audit event.
APSC-DV-001000 - CAT II When using centralized logging; the application must include a
0 0
unique identifier in order to distinguish itself from other application logs.
APSC-DV-001010 - CAT II The application must produce audit records that contain
0 0
information to establish the outcome of the events.
APSC-DV-001030 - CAT II The application must generate audit records containing the full-
0 0
text recording of privileged commands or the individual identities of group account users.
APSC-DV-001040 - CAT II The application must implement transaction recovery logs when
0 0
transaction based.
APSC-DV-001070 - CAT II The application must off-load audit records onto a different
0 0
system or media than the system being audited.
APSC-DV-001110 - CAT II The application must alert the ISSO and SA (at a minimum) in
0 0
the event of an audit processing failure.
APSC-DV-001120 - CAT II The application must shut down by default upon audit failure
0 0
(unless availability is an overriding concern).
APSC-DV-001130 - CAT II The application must provide the capability to centrally review
0 0
and analyze audit records from multiple components within the system.
APSC-DV-001140 - CAT II The application must provide the capability to filter audit records
0 0
for events of interest based upon organization-defined criteria.
APSC-DV-001150 - CAT II The application must provide an audit reduction capability that
0 0
supports on-demand reporting requirements.
APSC-DV-001160 - CAT II The application must provide an audit reduction capability that
0 0
supports on-demand audit review and analysis.
APSC-DV-001170 - CAT II The application must provide an audit reduction capability that
0 0
supports after-the-fact investigations of security incidents.
APSC-DV-001180 - CAT II The application must provide a report generation capability that
0 0
supports on-demand audit review and analysis.
APSC-DV-001190 - CAT II The application must provide a report generation capability that 0 0
PAGE 14 OF 42
supports on-demand reporting requirements.
APSC-DV-001200 - CAT II The application must provide a report generation capability that
0 0
supports after-the-fact investigations of security incidents.
APSC-DV-001210 - CAT II The application must provide an audit reduction capability that
0 0
does not alter original content or time ordering of audit records.
APSC-DV-001220 - CAT II The application must provide a report generation capability that
0 0
does not alter original content or time ordering of audit records.
APSC-DV-001250 - CAT II The applications must use internal system clocks to generate
0 0
time stamps for audit records.
APSC-DV-001260 - CAT II The application must record time stamps for audit records that
0 0
can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
APSC-DV-001270 - CAT II The application must record time stamps for audit records that
0 0
meet a granularity of one second for a minimum degree of precision.
APSC-DV-001280 - CAT II The application must protect audit information from any type of
0 0
unauthorized read access.
APSC-DV-001290 - CAT II The application must protect audit information from unauthorized
0 0
modification.
APSC-DV-001300 - CAT II The application must protect audit information from unauthorized
0 0
deletion.
APSC-DV-001310 - CAT II The application must protect audit tools from unauthorized
0 0
access.
APSC-DV-001320 - CAT II The application must protect audit tools from unauthorized
0 0
modification.
APSC-DV-001330 - CAT II The application must protect audit tools from unauthorized
0 0
deletion.
APSC-DV-001340 - CAT II The application must back up audit records at least every seven
days onto a different system or system component than the system or component being 0 0
audited.
APSC-DV-001370 - CAT II The integrity of the audit tools must be validated by checking the
0 0
files for changes in the cryptographic hash value.
APSC-DV-001390 - CAT II The application must prohibit user installation of software without
0 0
explicit privileged status.
APSC-DV-001410 - CAT II The application must enforce access restrictions associated with
0 0
changes to application configuration.
APSC-DV-001420 - CAT II The application must audit who makes configuration changes to
0 0
the application.
APSC-DV-001430 - CAT II The application must have the capability to prevent the
installation of patches, service packs, or application components without verification the
0 0
software component has been digitally signed using a certificate that is recognized and
approved by the orga
APSC-DV-001440 - CAT II The applications must limit privileges to change the software
0 0
resident within software libraries.
PAGE 15 OF 42
APSC-DV-001510 - CAT II The application must be configured to use only functions, ports,
0 0
and protocols permitted to it in the PPSM CAL.
APSC-DV-001550 - CAT II The application must use multifactor (Alt. Token) authentication
0 0
for network access to privileged accounts.
APSC-DV-001560 - CAT II The application must accept Personal Identity Verification (PIV)
0 0
credentials.
APSC-DV-001580 - CAT II The application must use multifactor (e.g., CAC, Alt. Token)
0 0
authentication for network access to non-privileged accounts.
APSC-DV-001590 - CAT II The application must use multifactor (Alt. Token) authentication
0 0
for local access to privileged accounts.
APSC-DV-001600 - CAT II The application must use multifactor (e.g., CAC, Alt. Token)
0 0
authentication for local access to non-privileged accounts.
APSC-DV-001610 - CAT II The application must ensure users are authenticated with an
0 0
individual authenticator prior to using a group authenticator.
APSC-DV-001640 - CAT II The application must utilize mutual authentication when endpoint
0 0
device non-repudiation protections are required by DoD policy or by the data owner.
APSC-DV-001650 - CAT II The application must authenticate all network connected endpoint
0 0
devices before establishing any connection.
APSC-DV-001670 - CAT II The application must disable device identifiers after 35 days of
0 0
inactivity unless a cryptographic certificate is used for authentication.
APSC-DV-001730 - CAT II The application must require the change of at least 8 of the total
0 0
number of characters when passwords are changed.
APSC-DV-001850 - CAT I The application must not display passwords/PINs as clear text. 0 0
APSC-DV-001760 - CAT II The application must enforce 24 hours/1 day as the minimum
0 0
password lifetime.
APSC-DV-001780 - CAT II The application must prohibit password reuse for a minimum of
0 0
five generations.
PAGE 16 OF 42
APSC-DV-001790 - CAT II The application must allow the use of a temporary password for
0 0
system logons with an immediate change to a permanent password.
APSC-DV-001795 - CAT II The application password must not be changeable by users other
0 0
than the administrator or the user with which the password is associated.
APSC-DV-001800 - CAT II The application must terminate existing user sessions upon
0 0
account deletion.
APSC-DV-001830 - CAT II The application must map the authenticated identity to the
0 0
individual user or group account for PKI-based authentication.
APSC-DV-001870 - CAT II The application must uniquely identify and authenticate non-
0 0
organizational users (or processes acting on behalf of non-organizational users).
APSC-DV-001860 - CAT II The application must use mechanisms meeting the requirements
of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and 0 0
guidance for authentication to a cryptographic module.
APSC-DV-001880 - CAT II The application must accept Personal Identity Verification (PIV)
0 0
credentials from other federal agencies.
APSC-DV-001930 - CAT II Applications used for non-local maintenance sessions must audit
0 0
non-local maintenance and diagnostic sessions for organization-defined auditable events.
APSC-DV-000310 - CAT III The application must have a process, feature or function that
0 0
prevents removal or disabling of emergency accounts.
APSC-DV-001960 - CAT II Applications used for non-local maintenance sessions must verify
0 0
remote disconnection at the termination of non-local maintenance and diagnostic sessions.
APSC-DV-001980 - CAT II The application must terminate all sessions and network
0 0
connections when non-local maintenance is completed.
PAGE 17 OF 42
APSC-DV-002040 - CAT II The application must utilize FIPS-validated cryptographic modules
0 0
when protecting unclassified information that requires cryptographic protection.
APSC-DV-002210 - CAT II The application must set the HTTPOnly flag on session cookies. 0 0
APSC-DV-002220 - CAT II The application must set the secure flag on session cookies. 0 0
APSC-DV-002240 - CAT I The application must destroy the session ID value and/or cookie
0 0
on logoff or browser close.
APSC-DV-002270 - CAT II Applications must not use URL embedded session IDs. 0 0
APSC-DV-002280 - CAT II The application must not re-use or recycle session IDs. 0 0
APSC-DV-002290 - CAT II The application must use the Federal Information Processing
Standard (FIPS) 140-2-validated cryptographic modules and random number generator if
0 0
the application implements encryption, key exchange, digital signature, and hash
functionality.
APSC-DV-002300 - CAT II The application must only allow the use of DoD-approved
0 0
certificate authorities for verification of the establishment of protected sessions.
APSC-DV-002310 - CAT I The application must fail to a secure state if system initialization
0 0
fails, shutdown fails, or aborts fail.
APSC-DV-002320 - CAT II In the event of a system failure, applications must preserve any
information necessary to determine cause of failure and any information necessary to return 0 0
to operations with least disruption to mission processes.
APSC-DV-002330 - CAT II The application must protect the confidentiality and integrity of
1 1
stored information when required by DoD policy or the information owner.
APSC-DV-002360 - CAT II The application must isolate security functions from non-security
0 0
functions.
APSC-DV-002370 - CAT II The application must maintain a separate execution domain for
0 0
each executing process.
APSC-DV-002390 - CAT II XML-based applications must mitigate DoS attacks by using XML
0 0
filters, parser options, or gateways.
APSC-DV-002400 - CAT II The application must restrict the ability to launch Denial of
0 0
Service (DoS) attacks against itself or other information systems.
APSC-DV-002410 - CAT II The web service design must include redundancy mechanisms
0 0
when used with high-availability systems.
APSC-DV-002440 - CAT I The application must protect the confidentiality and integrity of
0 0
transmitted information.
APSC-DV-002460 - CAT II The application must maintain the confidentiality and integrity of 0 0
PAGE 18 OF 42
information during preparation for transmission.
APSC-DV-002470 - CAT II The application must maintain the confidentiality and integrity of
0 0
information during reception.
APSC-DV-002485 - CAT I The application must not store sensitive information in hidden
0 0
fields.
APSC-DV-002490 - CAT I The application must protect from Cross-Site Scripting (XSS)
5 5
vulnerabilities.
APSC-DV-002500 - CAT II The application must protect from Cross-Site Request Forgery
0 0
(CSRF) vulnerabilities.*
APSC-DV-002570 - CAT II The application must generate error messages that provide
information necessary for corrective actions without revealing information that could be 0 0
exploited by adversaries.
APSC-DV-002580 - CAT II The application must reveal error messages only to the ISSO,
0 0
ISSM, or SA.
APSC-DV-002900 - CAT II The ISSO must ensure application audit trails are retained for at
least 1 year for applications without SAMI data, and 5 years for applications including SAMI 0 0
data.
APSC-DV-002770 - CAT II The application must perform verification of the correct operation
of security functions: upon system startup and/or restart; upon command by a user with 0 0
privileged access; and/or every 30 days.
APSC-DV-002780 - CAT III The application must notify the ISSO and ISSM of failed security
0 0
verification tests.
APSC-DV-002870 - CAT II Unsigned Category 1A mobile code must not be used in the
0 0
application in accordance with DoD policy.
APSC-DV-002910 - CAT II The ISSO must review audit trails periodically based on system
0 0
documentation recommendations or immediately upon system security events.
APSC-DV-002920 - CAT II The ISSO must report all suspected violations of IA policies in
0 0
accordance with DoD information system IA procedures.
APSC-DV-002930 - CAT II The ISSO must ensure active vulnerability testing is performed. 0 0
APSC-DV-002980 - CAT II New IP addresses, data services, and associated ports used by
the application must be submitted to the appropriate approving authority for the
0 0
organization, which in turn will be submitted through the DoD Ports, Protocols, and Services
Management (DoD PPS
APSC-DV-002950 - CAT II Execution flow diagrams and design documents must be created 0 0
PAGE 19 OF 42
to show how deadlock and recursion issues in web services are being mitigated.
APSC-DV-002960 - CAT II The designer must ensure the application does not store
0 0
configuration and control files in the same directory as user data.
APSC-DV-002970 - CAT II The ISSO must ensure if a DoD STIG or NSA guide is not
0 0
available, a third-party product will be configured by following available guidance.
APSC-DV-002990 - CAT II The application must be registered with the DoD Ports and
0 0
Protocols Database.
APSC-DV-002990 - CAT II The application must be registered with the DoD Ports and
0 0
Protocols Database.
APSC-DV-003020 - CAT II A Configuration Control Board (CCB) that meets at least every
release cycle, for managing the Configuration Management (CM) process must be 0 0
established.
APSC-DV-003030 - CAT II The application services and interfaces must be compatible with
0 0
and ready for IPv6 networks.
APSC-DV-003060 - CAT II Recovery procedures and technical system features must exist so
recovery is performed in a secure and verifiable manner. The ISSO will document 0 0
circumstances inhibiting a trusted recovery.
APSC-DV-003080 - CAT II Back-up copies of the application software or source code must
0 0
be stored in a fire-rated container or stored separately (offsite).
APSC-DV-003100 - CAT II The application must use encryption to implement key exchange
0 0
and authenticate endpoints prior to establishing a communication channel for key exchange.
APSC-DV-003110 - CAT I The application must not contain embedded authentication data. 0 0
APSC-DV-003130 - CAT III Prior to each release of the application, updates to system, or
0 0
applying patches; tests plans and procedures must be created and executed.
APSC-DV-003150 - CAT II At least one tester must be designated to test for security flaws
0 0
in addition to functional testing.
APSC-DV-003160 - CAT III Test procedures must be created and at least annually executed
to ensure system initialization, shutdown, and aborts are configured to verify the system 0 0
remains in a secure state.
APSC-DV-003180 - CAT III Code coverage statistics must be maintained for each release of
0 0
the application.
APSC-DV-003190 - CAT II Flaws found during a code review must be tracked in a defect
0 0
tracking system.
APSC-DV-003200 - CAT II The changes to the application must be assessed for IA and 0 0
PAGE 20 OF 42
accreditation impact prior to implementation.
APSC-DV-003210 - CAT II Security flaws must be fixed or addressed in the project plan. 0 0
APSC-DV-003215 - CAT III The application development team must follow a set of coding
0 0
standards.
APSC-DV-003220 - CAT III The designer must create and update the Design Document for
0 0
each release of the application.
APSC-DV-003230 - CAT II Threat models must be documented and reviewed for each
application release and updated as required by design and functionality changes or when 0 0
new threats are discovered.
APSC-DV-003240 - CAT I All products must be supported by the vendor or the development
0 0
team.
APSC-DV-003260 - CAT III Procedures must be in place to notify users when an application
0 0
is decommissioned.
APSC-DV-003330 - CAT II The system must alert an administrator when low resource
0 0
conditions are encountered.
APSC-DV-003360 - CAT III The application must generate audit records when concurrent
0 0
logons from different workstations occur.
APSC-DV-003345 - CAT III The application must provide notifications or alerts when product
0 0
update and security related patches are available.
APSC-DV-003350 - CAT II Connections between the DoD enclave and the Internet or other
0 0
public or commercial wide area networks must require a DMZ.
APSC-DV-003400 - CAT II The Program Manager must verify all levels of program
management, designers, developers, and testers receive annual security training pertaining 0 0
to their job function.
APSC-DV-000010 - CAT II The application must provide a capability to limit the number of
0 0
logon sessions per user.
APSC-DV-000060 - CAT II The application must clear temporary storage and cookies when
0 0
the session is terminated.
APSC-DV-000080 - CAT II The application must automatically terminate the admin user
0 0
session and log off admin users after a 10 minute idle time period is exceeded.
APSC-DV-000100 - CAT III The application must display an explicit logoff message to users 0 0
PAGE 21 OF 42
indicating the reliable termination of authenticated communications sessions.
APSC-DV-000190 - CAT I Messages protected with WS_Security must use time stamps with
0 0
creation and expiration times.
APSC-DV-000180 - CAT II Applications with SOAP messages requiring integrity must include
the following message elements:-Message ID-Service Request-Timestamp-SAML Assertion 0 0
(optionally included in messages) and all elements of the message must be digitally signed.
APSC-DV-000200 - CAT I Validity periods must be verified on all application messages using
0 0
WS-Security or SAML assertions.
APSC-DV-000210 - CAT II The application must ensure each unique asserting party provides
0 0
unique assertion ID references for each SAML assertion.
APSC-DV-000230 - CAT I The application must use the NotOnOrAfter condition when using
0 0
the SubjectConfirmation element in a SAML assertion.
APSC-DV-000240 - CAT I The application must use both the NotBefore and NotOnOrAfter
0 0
elements or OneTimeUse element when using the Conditions element in a SAML assertion.
APSC-DV-000260 - CAT II The application must ensure messages are encrypted when the
0 0
SessionIndex is tied to privacy data.
APSC-DV-000320 - CAT III The application must automatically disable accounts after a 35
0 0
day period of account inactivity.
APSC-DV-000380 - CAT III The application must notify System Administrators and
0 0
Information System Security Officers when accounts are created.
APSC-DV-000390 - CAT III The application must notify System Administrators and 0 0
PAGE 22 OF 42
Information System Security Officers when accounts are modified.
APSC-DV-000400 - CAT III The application must notify System Administrators and
0 0
Information System Security Officers of account disabling actions.
APSC-DV-000410 - CAT III The application must notify System Administrators and
0 0
Information System Security Officers of account removal actions.
APSC-DV-000430 - CAT III The application must notify System Administrators and
0 0
Information System Security Officers of account enabling actions.
APSC-DV-000520 - CAT II The application must audit the execution of privileged functions. 0 0
APSC-DV-000460 - CAT I The application must enforce approved authorizations for logical
access to information and system resources in accordance with applicable access control 0 0
policies.
APSC-DV-000500 - CAT II The application must prevent non-privileged users from executing
privileged functions to include disabling, circumventing, or altering implemented security 0 0
safeguards/countermeasures.
APSC-DV-000530 - CAT I The application must enforce the limit of three consecutive invalid
0 0
logon attempts by a user during a 15 minute time period.
APSC-DV-000560 - CAT III The application must retain the Standard Mandatory DoD Notice
and Consent Banner on the screen until users acknowledge the usage conditions and take 0 0
explicit actions to log on for further access.
APSC-DV-000550 - CAT III The application must display the Standard Mandatory DoD
0 0
Notice and Consent Banner before granting access to the application.
APSC-DV-000570 - CAT III The publicly accessible application must display the Standard
0 0
Mandatory DoD Notice and Consent Banner before granting access to the application.
APSC-DV-000580 - CAT III The application must display the time and date of the users last
0 0
successful logon.
APSC-DV-000630 - CAT II The application must provide audit record generation capability
0 0
for the destruction of session IDs.
APSC-DV-000590 - CAT II The application must protect against an individual (or process
acting on behalf of an individual) falsely denying having performed organization-defined 0 0
actions to be covered by non-repudiation.
APSC-DV-000610 - CAT II The application must provide the capability for organization-
identified individuals or roles to change the auditing to be performed on all application
0 0
components, based on all selectable event criteria within organization-defined time
thresholds.
APSC-DV-000620 - CAT II The application must provide audit record generation capability
0 0
for the creation of session IDs.
PAGE 23 OF 42
* Project scan results do not include all relevant queries. Presets and\or Filters should be changed to include all relevant
standard queries.
PAGE 24 OF 42
Scan Summary - OWASP Top 10 API
API2-Broken Authentication 0 0
API6-Mass Assignment 0 0
API7-Security Misconfiguration 0 0
API8-Injection 0 0
PAGE 25 OF 42
Scan Summary - OWASP Top 10 2010
A6-Security Misconfiguration* 0 0
* Project scan results do not include all relevant queries. Presets and\or Filters should be changed to include all relevant
standard queries.
PAGE 26 OF 42
Results Distribution By Status Compared to project scan from 9/29/2022 7:26 PM
Recurrent Issues 0 0 10 0 10
Total 0 0 11 0 11
Fixed Issues 0 0 1 0 1
New Scan
Previous Scan
Result Summary
Vulnerability Type Occurrences Severity
Client Hardcoded Domain 5 Low
Log Forging 4 Low
Potential Clickjacking on Legacy Browsers 1 Low
React Deprecated 1 Low
PAGE 27 OF 42
Scan Results Details
Categories
NIST SP 800-53: SC-18 Mobile Code (P2)
ASD STIG 4.10: APSC-DV-002490 - CAT I The application must protect from Cross-Site
Scripting (XSS) vulnerabilities.
OWASP Top 10 2021: A8-Software and Data Integrity Failures
Description
Client Hardcoded Domain\Path 1:
Severity Low
Result State To Verify
Online Results https://checkmarkx_vs.axisb.com/CxWebClient/ViewerMain.aspx?scanid=105
8456&projectid=265&pathid=1
Status Recurrent
Detection Date 9/29/2022 11:58:09 AM
Code Snippet
File Name src/index.html
Method <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':
....
17.
'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBe
fore(j,f);
PAGE 28 OF 42
Source Destination
File src/index.html src/index.html
Line 5 5
Object https://www.axisbank.com/assets/image https://www.axisbank.com/assets/image
s/favicon.ico s/favicon.ico
Code Snippet
File Name src/index.html
Method <link rel="shortcut icon"
href="https://www.axisbank.com/assets/images/favicon.ico" />
....
5. <link rel="shortcut icon"
href="https://www.axisbank.com/assets/images/favicon.ico" />
Code Snippet
File Name src/index.html
Method <link rel="apple-touch-icon"
href="https://www.axisbank.com/assets/images/favicon.ico" />
....
9. <link rel="apple-touch-icon"
href="https://www.axisbank.com/assets/images/favicon.ico" />
PAGE 29 OF 42
The JavaScript file imported in https://fonts.gstatic.com in src/index.html at line 11 is from a
remote domain, which may allow attackers to replace its contents with malicious code.
Source Destination
File src/index.html src/index.html
Line 11 11
Object https://fonts.gstatic.com https://fonts.gstatic.com
Code Snippet
File Name src/index.html
Method <link rel="preconnect" href="https://fonts.gstatic.com">
....
11. <link rel="preconnect" href="https://fonts.gstatic.com">
Code Snippet
File Name src/index.html
Method <link
href="https://fonts.googleapis.com/css2?family=Lato:wght@400;700&display=s
wap" rel="stylesheet">
....
12. <link
href="https://fonts.googleapis.com/css2?family=Lato:wght@400;700&display
=swap" rel="stylesheet">
Log Forging
Query Path:
JavaScript\Cx\JavaScript Server Side Vulnerabilities\Log Forging Version:2
Categories
FISMA 2014: System And Information Integrity
PAGE 30 OF 42
NIST SP 800-53: AU-9 Protection of Audit Information (P1)
OWASP Top 10 2017: A1-Injection
ASD STIG 4.10: APSC-DV-002560 - CAT I The application must not be subject to input handling
vulnerabilities.
OWASP Top 10 2021: A9-Security Logging and Monitoring Failures
Description
Log Forging\Path 1:
Severity Low
Result State To Verify
Online Results https://checkmarkx_vs.axisb.com/CxWebClient/ViewerMain.aspx?scanid=105
8456&projectid=265&pathid=8
Status Recurrent
Detection Date 1/31/2022 5:27:34 PM
Method handleRequest at line 266 of src/mockServiceWorker.js gets user input from element
method. This element’s value flows through the code without being properly sanitized or
validated, and is eventually used in writing an audit log in handleRequest at line 266 of
src/mockServiceWorker.js.
This may enable Log Forging.
Source Destination
File src/mockServiceWorker.js src/mockServiceWorker.js
Line 269 267
Object method error
Code Snippet
File Name src/mockServiceWorker.js
Method handleRequest(event, requestId).catch((error) => {
....
269. request.method,
....
267. console.error(
Log Forging\Path 2:
Severity Low
Result State To Verify
Online Results https://checkmarkx_vs.axisb.com/CxWebClient/ViewerMain.aspx?scanid=105
8456&projectid=265&pathid=9
Status Recurrent
Detection Date 1/31/2022 5:27:34 PM
Method handleRequest at line 266 of src/mockServiceWorker.js gets user input from element
url. This element’s value flows through the code without being properly sanitized or validated,
and is eventually used in writing an audit log in handleRequest at line 266 of
src/mockServiceWorker.js.
This may enable Log Forging.
Source Destination
File src/mockServiceWorker.js src/mockServiceWorker.js
Line 270 267
Object url error
PAGE 31 OF 42
Code Snippet
File Name src/mockServiceWorker.js
Method handleRequest(event, requestId).catch((error) => {
....
270. request.url,
....
267. console.error(
Log Forging\Path 3:
Severity Low
Result State To Verify
Online Results https://checkmarkx_vs.axisb.com/CxWebClient/ViewerMain.aspx?scanid=105
8456&projectid=265&pathid=10
Status Recurrent
Detection Date 1/31/2022 5:27:34 PM
Method getResponse at line 140 of src/mockServiceWorker.js gets user input from element
method. This element’s value flows through the code without being properly sanitized or
validated, and is eventually used in writing an audit log in getResponse at line 140 of
src/mockServiceWorker.js.
This may enable Log Forging.
Source Destination
File src/mockServiceWorker.js src/mockServiceWorker.js
Line 231 221
Object method error
Code Snippet
File Name src/mockServiceWorker.js
Method async function getResponse(event, client, requestId) {
....
231. request.method,
....
221. console.error(
Log Forging\Path 4:
Severity Low
Result State To Verify
Online Results https://checkmarkx_vs.axisb.com/CxWebClient/ViewerMain.aspx?scanid=105
8456&projectid=265&pathid=11
Status Recurrent
Detection Date 1/31/2022 5:27:34 PM
Method getResponse at line 140 of src/mockServiceWorker.js gets user input from element url.
This element’s value flows through the code without being properly sanitized or validated, and
is eventually used in writing an audit log in getResponse at line 140 of
src/mockServiceWorker.js.
This may enable Log Forging.
Source Destination
PAGE 32 OF 42
File src/mockServiceWorker.js src/mockServiceWorker.js
Line 232 221
Object url error
Code Snippet
File Name src/mockServiceWorker.js
Method async function getResponse(event, client, requestId) {
....
232. request.url,
....
221. console.error(
React Deprecated
Query Path:
JavaScript\Cx\JavaScript Low Visibility\React Deprecated Version:2
Categories
OWASP Top 10 2017: A9-Using Components with Known Vulnerabilities
OWASP Top 10 2021: A6-Vulnerable and Outdated Components
Description
React Deprecated\Path 1:
Severity Low
Result State To Verify
Online Results https://checkmarkx_vs.axisb.com/CxWebClient/ViewerMain.aspx?scanid=105
8456&projectid=265&pathid=6
Status Recurrent
Detection Date 1/31/2022 5:27:33 PM
Method main in src/index.tsx, at line 25, calls an obsolete API, render. This has been
deprecated, and should not be used in a modern codebase.
Source Destination
File src/index.tsx src/index.tsx
Line 32 32
Object render render
Code Snippet
File Name src/index.tsx
Method function main(): void {
....
32. ReactDOM.render(<App />, root);
Categories
FISMA 2014: Configuration Management
PAGE 33 OF 42
NIST SP 800-53: SC-8 Transmission Confidentiality and Integrity (P1)
ASD STIG 4.10: APSC-DV-002330 - CAT II The application must protect the confidentiality and
integrity of stored information when required by DoD policy or the information owner.
Description
Potential Clickjacking on Legacy Browsers\Path 1:
Severity Low
Result State To Verify
Online Results https://checkmarkx_vs.axisb.com/CxWebClient/ViewerMain.aspx?scanid=105
8456&projectid=265&pathid=7
Status New
Detection Date 9/29/2022 7:37:08 PM
The application does not protect the web page src/index.html from clickjacking attacks in legacy
browsers, by using framebusting scripts.
Source Destination
File src/index.html src/index.html
Line 1 1
Object < <
Code Snippet
File Name src/index.html
Method <html>
....
1. <html>
Cause
How does it happen
Javascript files can be imported dynamically from remote hosts when they are embedded into HTML.
However, this reliance on a remote host for these scripts may diminish security, as web-application's
users are only ever as secure as the remote host serving these Javascript files.
General Recommendations
How to avoid it
Where possible, host all script files locally, rather than remotely. Ensure that locally hosted 3rd party
script files are constantly updated and maintained.
PAGE 34 OF 42
JavaScript
Remote Importation of A Script File
PAGE 35 OF 42
React Deprecated
Risk
What might happen
Referencing deprecated modules can cause an application to be exposed to known vulnerabilities, that
have been publicly reported and already fixed. A common attack technique is to scan applications for
these known vulnerabilities, and then exploit the application through these deprecated versions.
However, even if deprecated code is used in a way that is completely secure, its very use and inclusion in
the code base would encourage developers to re-use the deprecated element in the future, potentially
leaving the application vulnerable to attack, which is why deprecated code should be eliminated from the
code-base as a matter of practice.
Note that the actual risk involved depends on the specifics of any known vulnerabilities in older versions.
Use of a deprecated API on client code may leave users vulnerable to browser-based attacks; this is
exacerbated by the fact client-side code is available to any attacker with client access, who may be able
to trivially detect use of this deprecated API.
Cause
How does it happen
The application references code elements that have been declared as deprecated. This could include
classes, functions, methods, properties, modules, or obsolete library versions that are either out of date
by version, or have been entirely deprecated. It is likely that the code that references the obsolete
element was developed before it was declared as obsolete, and in the meantime the referenced code was
updated.
General Recommendations
How to avoid it
Always prefer to use the most updated versions of libraries, packages, and other dependancies.
Do not use or reference any class, method, function, property, or other element that has been
declared deprecated.
JavaScript
ReactJS - Using a Deprecated Method to Interact with DOM
PAGE 36 OF 42
var d = new Date();
var year = d.getFullYear();
/** @deprecated */
function myOldFunction() {
/* Code that is deprecated */
}
myOldFunction();
PAGE 37 OF 42
Potential Clickjacking on Legacy Browsers
Risk
What might happen
Clickjacking attacks allow an attacker to "hijack" a user's mouse clicks on a webpage, by invisibly framing
the application, and superimposing it in front of a bogus site. When the user is convinced to click on the
bogus website, e.g. on a link or a button, the user's mouse is actually clicking on the target webpage,
despite being invisible.
This could allow the attacker to craft an overlay that, when clicked, would lead the user to perform
undesirable actions in the vulnerable application, e.g. enabling the user's webcam, deleting all the
user's records, changing the user's settings, or causing clickfraud.
Cause
How does it happen
The root cause of vulnerability to a clickjacking attack, is that the application's web pages can be loaded
into a frame of another website. The application does not implement a proper frame-busting script, that
would prevent the page from being loaded into another frame. Note that there are many types of
simplistic redirection scripts that still leave the application vulnerable to clickjacking techniques, and
should not be used.
When dealing with modern browsers, applications mitigate this vulnerability by issuing appropriate
Content-Security-Policy or X-Frame-Options headers to indicate to the browser to disallow framing.
However, many legacy browsers do not support this feature, and require a more manual approach by
implementing a mitigation in Javascript. To ensure legacy support, a framebusting script is required.
General Recommendations
How to avoid it
Generic Guidance:
Define and implement a a Content Security Policy (CSP) on the server side, including a frame-
ancestors directive. Enforce the CSP on all relevant webpages.
If certain webpages are required to be loaded into a frame, define a specific, whitelisted target
URL.
Alternatively, return a "X-Frame-Options" header on all HTTP responses. If it is necessary to allow
a particular webpage to be loaded into a frame, define a specific, whitelisted target URL.
For legacy support, implement framebusting code using Javascript and CSS to ensure that, if a
page is framed, it is never displayed, and attempt to navigate into the frame to prevent attack.
Even if navigation fails, the page is not displayed and is therefore not interactive, mitigating
potential clickjacking attacks.
Specific Recommendations:
Implement a proper framebuster script on the client, that is not vulnerable to frame-buster-
busting attacks.
o Code should first disable the UI, such that even if frame-busting is successfully evaded, the
UI cannot be clicked. This can be done by setting the CSS value of the "display" attribute
to "none" on either the "body" or "html" tags. This is done because, if a frame attempts to
redirect and become the parent, the malicious parent can still prevent redirection via
various techniques.
o Code should then determine whether no framing occurs by comparing self === top; if the
result is true, can the UI be enabled. If it is false, attempt to navigate away from the
framing page by setting the top.location attribute to self.location.
JavaScript
Clickjackable Webpage
PAGE 38 OF 42
<html>
<body>
<button onclick="clicked();">
Click here if you love ducks
</button>
</body>
</html>
Bustable Framebuster
<html>
<head>
<script>
if ( window.self.location != window.top.location ) {
window.top.location = window.self.location;
}
</script>
</head>
<body>
<button onclick="clicked();">
Click here if you love ducks
</button>
</body>
</html>
Proper Framebusterbusterbusting
<html>
<head>
<style> html {display : none; } </style>
<script>
if ( self === top ) {
document.documentElement.style.display = 'block';
}
else {
top.location = self.location;
}
</script>
</head>
<body>
<button onclick="clicked();">
Click here if you love ducks
</button>
</body>
</html>
PAGE 39 OF 42
Log Forging
Risk
What might happen
An attacker could engineer audit logs of security-sensitive actions and lay a false audit trail, potentially
implicating an innocent user or hiding an incident.
Cause
How does it happen
The application writes audit logs upon security-sensitive actions. Since the audit log includes user input
that is neither checked for data type validity nor subsequently sanitized, the input could contain false
information made to look like legitimate audit log data,
General Recommendations
How to avoid it
1. Validate all input, regardless of source. Validation should be based on a whitelist: accept only data
fitting a specified structure, rather than reject bad patterns. Check for:
o Data type
o Size
o Range
o Format
o Expected values
2. Validation is not a replacement for encoding. Fully encode all dynamic data, regardless of source,
before embedding it in logs.
3. Use a secure logging mechanism.
JavaScript
Passing Unsanitized Values to HAPI server.log()
var id = request.query["id"];
try {
var val = tryGetById(id); // Assume this throws an exception if "id" is not found
// Handle val
}
catch(err) {
server.log(['error','id'],id); // Log unsanitized values, which could also not be
sanitized downstream, and could contain CRLF
}
var id = request.query["id"];
try {
var val = tryGetById(id); // Assume this throws an exception if "id" is not found
// Handle val
}
catch(err) {
server.log(['error','id'],encodeURI(id)); // encodeURI() is a sufficient sanitizer for
CRLF, as it URL-encodes the line break characters
PAGE 40 OF 42
}
PAGE 41 OF 42
Scanned Languages
Language Hash Number Change Date
PAGE 42 OF 42