ASP.NET ZERO Penetration Test Report
ASP.NET Zero (v8.1) has been scanned for vulnerabilities with the latest version of OWASP ZAP (v2.9.0). The OWASP Zed Attack Proxy (ZAP) is one of the world's most popular security tools and is actively maintained by hundreds of international volunteers.
The automated scanner has been reported several alerts. ASP.NET Zero Team has fixed the positive alerts regarding the report. On the other hand most of the alerts can be stated as false-positive. The reasons for the false-positive alerts that are subject to these issues are clearly stated below.
Summary of Alerts
Path Traversal
Risk: High
Description
The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory.
Comment
Url: http://localhost:62114/api/services/app/Role/GetRoles?permissions[X]=GetRoles
Parameter: permissions[3]
Attack: GetRoles
This request is false-positive because the tool is checking whether a request can get data with unexpected parameter. Since
admin
role has all permissions as a default, response always hasadmin
role.
Recommendation
If your application has to accept input file names, file paths, or URL paths, you need to validate that the path is in the correct format and that it points to a valid location within the context of your application. To prevent a malicious user manipulating your code's file operations, avoid writing code that accepts user-supplied file or path input.
- If you must accept file names as input, use the full name of the file by using System.IO.Path.GetFileName.
- If you must accept file paths as input, use the full file path by using System.IO.Path.GetFullPath.
If you use MapPath to map a supplied virtual path to a physical path on the server, use the overload of Request.MapPath that accepts a bool parameter so that you can prevent cross-application mapping.
Application Error Disclosure
Risk: Medium
Description
This page contains an error/warning message that may disclose sensitive information like the location of the file that produced the unhandled exception. This information can be used to launch further attacks against the web application. The alert could be a false positive if the error message is found inside a documentation page.
Comment
URL: http://localhost:62114/AbpScripts/GetScripts?v=637170099309929078
- Method:
GET
This request is false-positive because the tool is checking whether the response contains "internal error" text. The response of
GetScripts
contains translations which includes "internal error" text.- Method:
URL: http://localhost:62114/Error?statusCode=401
- Method:
Get
This request is false-positive because the tool is checking whether the response contains "internal error" text. The response contains that but without sensitive information.
- Method:
ASP.NET Zero never returns error details, if only developer sends it deliberatively. When the project runs on development, exceptions are being sent to client. But publishing application in release mode prevents exception details to be sent. While MVC
project shows a custom error page, Host
project sends a JSON with message "An internal error occurred during your request!"
Absence of Anti-CSRF Tokens
Risk: Low
Description
In short, CSRF abuses the trust relationship between browser and server. This means that anything that a server uses in order to establish trust with a browser (e.g., cookies, but also HTTP/Windows Authentication) is exactly what allows CSRF to take place - but this only the first piece for a successful CSRF attack.
Comment
ASP.NET Boilerplate has it's own built-in AntiForgery system. ASP.NET Zero uses ajax to post most of the forms. All URLs listed is false-positive. ASP.NET Zero post them via using ajax and their ajax requests has X-XSRF-TOKEN header.
Application Error Disclosure
Risk: Low
Description
This page contains an error/warning message that may disclose sensitive information like the location of the file that produced the unhandled exception. This information can be used to launch further attacks against the web application. The alert could be a false positive if the error message is found inside a documentation page.
Comment
ASP.NET Boilerplate has it's own built-in exception handling system. When an exception happens ASP.NET Boilerplate catches it and throws user friendly exception. This requests are false-positive because the tool is checking whether the response return "HTTP 501 (Internal Server Error)". But returned errors don't contains internal error.
URL: http://localhost:62114/api/services/app/Edition/CreateEdition
Method:
Post
Evidence: HTTP/1.1 500 Internal Server Error
Url: http://localhost:62114/api/services/app/Friendship/CreateFriendshipRequest
- Method:
Post
- Evidence: HTTP/1.1 500 Internal Server Error
- Method:
Url: http://localhost:62114/api/services/app/Tenant/CreateTenant
- Method:
Post
- Evidence: HTTP/1.1 500 Internal Server Error
- Method:
Url: http://localhost:62114/api/services/app/User/CreateOrUpdateUser
- Method:
Post
- Evidence: HTTP/1.1 500 Internal Server Error
- Method:
Url: http://localhost:62114/api/services/app/UserLink/LinkToUser
- Method:
Post
- Evidence: HTTP/1.1 500 Internal Server Error
- Method:
Cookie Without SameSite Attribute
Risk: Low
Description
A cookie has been set without the SameSite
attribute, which means that the cookie can be sent as a result of a 'cross-site' request. The SameSite
attribute is an effective counter measure to cross-site request forgery, cross-site script inclusion, and timing attacks.
Comment
Solved on https://github.com/aspnetzero/aspnet-zero-core/issues/2950
Web Browser XSS Protection Not Enabled
Risk: Low
Description
Web Browser XSS Protection is not enabled, or is disabled by the configuration of the 'X-XSS-Protection' HTTP response header on the web server
Comment
ASP.NET Boilerplate framework v3.4.X adds the X-XSS-Protection
header to all responses with the value 1; mode=block
. If you want to remove the header you can do it via UseAbp()
options in Configure
method of Startup
class.
This requests are false-positive because the tool is checking whether the response has X-XSS-Protection. Response don't have X-XSS-Protection because request gets 404.15 - Not Found.
Url: http://localhost:62114/api/services/app/Role/GetRoles?permissions...
But request without 404.15 error has that header.
Url: http://localhost:62114/api/services/app/Role/GetRoles?permissions...
Cookie No HttpOnly Flag
Low (Medium)
Description
A cookie has been set without the HttpOnly
flag, which means that the cookie can be accessed by JavaScript. If a malicious script can be run on this page then the cookie will be accessible and can be transmitted to another site. If this is a session cookie then session hijacking may be possible.
Comment
ASP.NET Zero uses HttpOnly
flag wherever it needs. In some cases the tool reports false-positive alerts. See the following instances to understand why they are false-positive.
-
- Method:
GET
- Parameter:
idsrv.session
- Evidence:
Set-Cookie: idsrv.session
In the above request,
idsrv.session
cookie is being set by Microsoft Identity Server. By design this is notHttpOnly
. It is required by the OIDC session management spec for SPA clients. For the related spec see https://openid.net/specs/openid-connect-session-1_0.html#ChangeNotification . - Method:
URL: http://localhost:62114/App/Dashboard, http://localhost:62114/App/AuditLogs, http://localhost:62114/App/DemoUiComponents, http://localhost:62114/App/Editions, http://localhost:62114/App/HostDashboard, http://localhost:62114/App/HostSettings, http://localhost:62114/App/Languages, http://localhost:62114/App/Languages/Texts?languageName=cy, http://localhost:62114/App/Maintenance, http://localhost:62114/App/OrganizationUnits, http://localhost:62114/App/Roles, http://localhost:62114/App/Tenants, http://localhost:62114/App/UiCustomization, http://localhost:62114/App/Users
- Method:
GET
- Parameter:
XSRF-TOKEN
- Evidence:
Set-Cookie: XSRF-TOKEN
Setting
XSRF-TOKEN
asHttpOnly
is pointless because in Angular UI client must access this cookie.- Method:
Reference
For all the other OWASP standardizations, download the OWASP sheet.