Sumeru Cyber Security
  • Sumeru Cyber Security
  • Workarounds for prevalent vulnerabilities
    • Version Disclosure
    • Host Header Attack
    • HttpOnly and Secure Flag
    • Security Headers
    • Clickjacking
    • Weak Password
    • Username Enumeration
    • jQuery Outdated
    • Cross-Origin Resource Sharing
    • AWS S3 Bucket Misconfiguration
    • Directory Listing
    • Laravel Debug Enabled
    • Autocomplete and Remember Password Enabled
    • Brute Force Attack
    • Cross Site Request Forgery
    • SQL Injection
    • PhpMyAdmin page Available Publicly
    • Implementation of BASIC Authentication
    • Cache Browsing
    • Insecure Direct Object Reference
    • Active mixed content over https
    • Improper forgot password implementation
    • ASP.NET Debug Enabled
    • Sensitive Data Sent in GET Request
    • Weak CAPTCHA Implementation
    • Csv Injection
    • Cross Site Scripting
    • Web Server Robot.txt Information Disclosure
    • SSL Related Issues
    • Local File Inclusion
    • Weak CAPTCHA Implementation
    • Automated Form Submission
    • Php.ini File Available Publicly
    • ITLP
    • Internal Path Disclosure
    • Insecure Direct Object Reference
    • Access Token Not Expiring After Logout
  • OWASP A09-Security Logging and Monitoring Failures
  • OWASP API09-Improper Inventory Management v1.0
Powered by GitBook
On this page
  • Introduction
  • Impact
  • How to Test
  • How to Fix
  • References

Was this helpful?

  1. Workarounds for prevalent vulnerabilities

ITLP

INSUFFICIENT TRANSPORT LAYER PROTECTION

PreviousPhp.ini File Available PubliclyNextInternal Path Disclosure

Last updated 5 years ago

Was this helpful?

Introduction

It is possible to sniff the data of the application including username/password since application is running on HTTP through which credentials like username and password and other sensitive data is sent and received in clear/plain text.

Impact

An attacker could sniff the username and password or other sensitive data and easily gain access to the victim’s account.

How to Test

Login to the application

Wireshark is the tool to sniff the packets using this tool we can able to see the packets.using this this tool we sniffed the credentials as shown in the below screenshot.

How to Fix

  • We recommended implementing HTTPS instead of using HTTP.

  • Sensitive information like credentials always be transferred via an encrypted channel (HTTPS) to avoid intercepted by malicious users. So it should be transferred to the server over an encrypted connection(HTTPS).

References

https://www.acunetix.com/vulnerabilities/web/user-credentials-are-sent-in-clear-text/