| Risk Level | Number of Alerts |
|---|---|
|
High
|
1
|
|
Medium
|
2
|
|
Low
|
6
|
|
Informational
|
4
|
|
False Positives:
|
0
|
| Name | Risk Level | Number of Instances |
|---|---|---|
| SQL Injection | High | 155 |
| CSP: Wildcard Directive | Medium | 5 |
| CSP: style-src unsafe-inline | Medium | 5 |
| A Server Error response code was returned by the server | Low | 255 |
| Application Error Disclosure | Low | 9 |
| Information Disclosure - Debug Error Messages | Low | 8 |
| Permissions Policy Header Not Set | Low | 5 |
| Timestamp Disclosure - Unix | Low | 1 |
| Unexpected Content-Type was returned | Low | 1211 |
| A Client Error response code was returned by the server | Informational | 21509 |
| Information Disclosure - Sensitive Information in URL | Informational | 12 |
| Non-Storable Content | Informational | 12 |
| Re-examine Cache-control Directives | Informational | 12 |
|
High |
SQL Injection |
|---|---|
| Description |
SQL injection may be possible.
|
| URL | https://app.ci.amalia.io/api/custom-reports-folders/id?keepFiles=true+AND+1%3D1+--+ |
| Method | DELETE |
| Parameter | keepFiles |
| Attack | true OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [true AND 1=1 -- ] and [true OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/statementId/datasets/datasetId/rows/rowExternalId |
| Method | DELETE |
| Parameter | definitionId |
| Attack | John Doe' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/teams/teamId/plan-assignments |
| Method | DELETE |
| Parameter | affectedUsersType |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/teams/teamId/plan-assignments |
| Method | DELETE |
| Parameter | planId |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/variable_values |
| Method | DELETE |
| Parameter | variableId |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/variables/variableId?planId=planId+AND+1%3D1+--+ |
| Method | DELETE |
| Parameter | planId |
| Attack | planId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [planId AND 1=1 -- ] and [planId AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/assignments?planId=planId&userId=userId+AND+1%3D1+--+ |
| Method | GET |
| Parameter | userId |
| Attack | userId OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [userId AND 1=1 -- ] and [userId OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/assignments?planId=planId+AND+1%3D1+--+&userId=userId |
| Method | GET |
| Parameter | planId |
| Attack | planId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [planId AND 1=1 -- ] and [planId AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/audit/filters?fromDate=fromDate+AND+1%3D1+--+&toDate=toDate |
| Method | GET |
| Parameter | fromDate |
| Attack | fromDate AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [fromDate AND 1=1 -- ] and [fromDate AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/badges/awards?planIds=planIds&periodId=periodId%27+AND+%271%27%3D%271%27+--+&userIds=userIds |
| Method | GET |
| Parameter | periodId |
| Attack | periodId' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [periodId' AND '1'='1' -- ] and [periodId' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/calculations/periodId?status=status&count=3+AND+1%3D1+--+ |
| Method | GET |
| Parameter | count |
| Attack | 3 AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [3 AND 1=1 -- ] and [3 AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/calculations/periodId?status=status+AND+1%3D1+--+&count=3 |
| Method | GET |
| Parameter | status |
| Attack | status AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [status AND 1=1 -- ] and [status AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/challenges?ruleId=ruleId&periodId=periodId%27+AND+%271%27%3D%271%27+--+ |
| Method | GET |
| Parameter | periodId |
| Attack | periodId' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [periodId' AND '1'='1' -- ] and [periodId' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/changelog-entries?cursor=cursor+AND+1%3D1+--+&new=true&from=from |
| Method | GET |
| Parameter | cursor |
| Attack | cursor AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [cursor AND 1=1 -- ] and [cursor AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/currencies?year=year&date=date%27+AND+%271%27%3D%271%27+--+ |
| Method | GET |
| Parameter | date |
| Attack | date' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [date' AND '1'='1' -- ] and [date' AND '1'='2' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/currencies?year=year+AND+1%3D1+--+&date=date |
| Method | GET |
| Parameter | year |
| Attack | year AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [year AND 1=1 -- ] and [year AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/dashboards/widget?periodId=periodId&year=1.2+AND+1%3D1+--+&planIds=planIds&teamIds=teamIds&userIds=userIds&limit=1.2 |
| Method | GET |
| Parameter | year |
| Attack | 1.2 AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2 AND 1=1 -- ] and [1.2 AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/notifications?page=1.2+AND+1%3D1+--+&limit=1.2 |
| Method | GET |
| Parameter | page |
| Attack | 1.2 OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2 AND 1=1 -- ] and [1.2 OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/objects/definition/quick-search?q=q+AND+1%3D1+--+ |
| Method | GET |
| Parameter | q |
| Attack | q OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [q AND 1=1 -- ] and [q OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/objects/definition?page=1.2&limit=1.2%27+AND+%271%27%3D%271%27+--+&sort=sort&desc=true&q=q&overwrite=true&externalIds=externalIds&filter=filter |
| Method | GET |
| Parameter | limit |
| Attack | 1.2' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2' AND '1'='1' -- ] and [1.2' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/objects/definition?page=1.2+AND+1%3D1+--+&limit=1.2&sort=sort&desc=true&q=q&overwrite=true&externalIds=externalIds&filter=filter |
| Method | GET |
| Parameter | page |
| Attack | 1.2 AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2 AND 1=1 -- ] and [1.2 AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/overwrites?page=1.2&limit=1.2+AND+1%3D1+--+&sort=sort&desc=desc&q=q&dataSourceIds=dataSourceIds&status=status&typeName=typeName&periodIds=periodIds&userIds=userIds&planIds=planIds&overwrittenByIds=overwrittenByIds |
| Method | GET |
| Parameter | limit |
| Attack | 1.2 AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2 AND 1=1 -- ] and [1.2 AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/overwrites?page=1.2+AND+1%3D1+--+&limit=1.2&sort=sort&desc=desc&q=q&dataSourceIds=dataSourceIds&status=status&typeName=typeName&periodIds=periodIds&userIds=userIds&planIds=planIds&overwrittenByIds=overwrittenByIds |
| Method | GET |
| Parameter | page |
| Attack | 1.2 OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2 AND 1=1 -- ] and [1.2 OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/payments/amounts?currentPeriodId=currentPeriodId%27+AND+%271%27%3D%271%27+--+&planIds=planIds&ruleIds=ruleIds&periodIds=periodIds&paymentPeriodIds=paymentPeriodIds&teamId=teamId&userIds=userIds&type=type |
| Method | GET |
| Parameter | currentPeriodId |
| Attack | currentPeriodId' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [currentPeriodId' AND '1'='1' -- ] and [currentPeriodId' OR '1'='1' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/payments/amounts?currentPeriodId=currentPeriodId&planIds=planIds%27+AND+%271%27%3D%271%27+--+&ruleIds=ruleIds&periodIds=periodIds&paymentPeriodIds=paymentPeriodIds&teamId=teamId&userIds=userIds&type=type |
| Method | GET |
| Parameter | planIds |
| Attack | planIds' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [planIds' AND '1'='1' -- ] and [planIds' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/payments/facets?userIds=userIds&planIds=planIds%27+AND+%271%27%3D%271%27+--+&teamIds=teamIds&ruleIds=ruleIds&periodIds=periodIds&paymentPeriodIds=paymentPeriodIds&q=q |
| Method | GET |
| Parameter | planIds |
| Attack | planIds' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [planIds' AND '1'='1' -- ] and [planIds' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/payments/facets?userIds=userIds+AND+1%3D1+--+&planIds=planIds&teamIds=teamIds&ruleIds=ruleIds&periodIds=periodIds&paymentPeriodIds=paymentPeriodIds&q=q |
| Method | GET |
| Parameter | userIds |
| Attack | userIds AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [userIds AND 1=1 -- ] and [userIds AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/payments/paginate?userIds=userIds&planIds=planIds%27+AND+%271%27%3D%271%27+--+&teamIds=teamIds&ruleIds=ruleIds&periodIds=periodIds&paymentPeriodIds=paymentPeriodIds&q=q&sort=sort&desc=desc&page=1.2&limit=1.2 |
| Method | GET |
| Parameter | planIds |
| Attack | planIds' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [planIds' AND '1'='1' -- ] and [planIds' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/payments/paginate?userIds=userIds+AND+1%3D1+--+&planIds=planIds&teamIds=teamIds&ruleIds=ruleIds&periodIds=periodIds&paymentPeriodIds=paymentPeriodIds&q=q&sort=sort&desc=desc&page=1.2&limit=1.2 |
| Method | GET |
| Parameter | userIds |
| Attack | userIds OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [userIds AND 1=1 -- ] and [userIds OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans/id/analyze?companyId=companyId&query-containers=true+AND+1%3D1+--+ |
| Method | GET |
| Parameter | query-containers |
| Attack | true AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [true AND 1=1 -- ] and [true AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans/id/analyze?companyId=companyId+AND+1%3D1+--+&query-containers=true |
| Method | GET |
| Parameter | companyId |
| Attack | companyId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [companyId AND 1=1 -- ] and [companyId AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/sa_calculations/last?page=1.2+AND+1%3D1+--+&companiesId=companiesId&filterErrors=true |
| Method | GET |
| Parameter | page |
| Attack | 1.2 OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2 AND 1=1 -- ] and [1.2 OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/sa_connectors?companiesId=companiesId+AND+1%3D1+--+ |
| Method | GET |
| Parameter | companiesId |
| Attack | companiesId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [companiesId AND 1=1 -- ] and [companiesId AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/sa_refreshments/last?page=1.2+AND+1%3D1+--+&companiesId=companiesId&filterErrors=true |
| Method | GET |
| Parameter | page |
| Attack | 1.2 AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2 AND 1=1 -- ] and [1.2 AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/sa_statements/with_errors?companiesId=companiesId+AND+1%3D1+--+ |
| Method | GET |
| Parameter | companiesId |
| Attack | companiesId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [companiesId AND 1=1 -- ] and [companiesId AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/findOneByCriteria?userId=userId&periodId=periodId+AND+1%3D1+--+&planId=planId |
| Method | GET |
| Parameter | periodId |
| Attack | periodId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [periodId AND 1=1 -- ] and [periodId AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/findOneByCriteria?userId=userId+AND+1%3D1+--+&periodId=periodId&planId=planId |
| Method | GET |
| Parameter | userId |
| Attack | userId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [userId AND 1=1 -- ] and [userId AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/listUsers?planIds=planIds+AND+1%3D1+--+&teamIds=teamIds |
| Method | GET |
| Parameter | planIds |
| Attack | planIds OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [planIds AND 1=1 -- ] and [planIds OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/statementId/forecasts/id?withObjectsToDisplay=true+AND+1%3D1+--+ |
| Method | GET |
| Parameter | withObjectsToDisplay |
| Attack | true OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [true AND 1=1 -- ] and [true OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements?userIds=userIds&periodId=periodId+AND+1%3D1+--+&planId=planId&teamId=teamId |
| Method | GET |
| Parameter | periodId |
| Attack | periodId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [periodId AND 1=1 -- ] and [periodId AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements?userIds=userIds+AND+1%3D1+--+&periodId=periodId&planId=planId&teamId=teamId |
| Method | GET |
| Parameter | userIds |
| Attack | userIds OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [userIds AND 1=1 -- ] and [userIds OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements_adjustments?statementId=statementId%27+AND+%271%27%3D%271%27+--+ |
| Method | GET |
| Parameter | statementId |
| Attack | statementId' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [statementId' AND '1'='1' -- ] and [statementId' OR '1'='1' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/team_assignments?teamId=teamId%27+AND+%271%27%3D%271%27+--+&userId=userId |
| Method | GET |
| Parameter | teamId |
| Attack | teamId' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [teamId' AND '1'='1' -- ] and [teamId' OR '1'='1' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/todos?filter=filter+AND+1%3D1+--+&page=1.2&limit=1.2&sort=sort&desc=desc&q=q |
| Method | GET |
| Parameter | filter |
| Attack | filter OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [filter AND 1=1 -- ] and [filter OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/userStatements/facets?periodId=periodId+AND+1%3D1+--+&planIds=planIds&teamId=teamId&isForecast=true |
| Method | GET |
| Parameter | periodId |
| Attack | periodId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [periodId AND 1=1 -- ] and [periodId AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/userStatements?periodId=periodId&planId=planId%27+AND+%271%27%3D%271%27+--+&teamId=teamId&searchQuery=ZAP&isForecast=true&page=1.2&limit=1.2&sortColumn=sortColumn&sortOrder=sortOrder&userIds=userIds |
| Method | GET |
| Parameter | planId |
| Attack | planId' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [planId' AND '1'='1' -- ] and [planId' AND '1'='2' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/userStatements?periodId=periodId+AND+1%3D1+--+&planId=planId&teamId=teamId&searchQuery=ZAP&isForecast=true&page=1.2&limit=1.2&sortColumn=sortColumn&sortOrder=sortOrder&userIds=userIds |
| Method | GET |
| Parameter | periodId |
| Attack | periodId OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [periodId AND 1=1 -- ] and [periodId OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/assignments |
| Method | PATCH |
| Parameter | effectiveAsOf |
| Attack | 1.2' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2' AND '1'='1' -- ] and [1.2' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/assignments |
| Method | PATCH |
| Parameter | planId |
| Attack | John Doe' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' AND '1'='2' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/assignments |
| Method | PATCH |
| Parameter | userId |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/calculations/calculationId |
| Method | PATCH |
| Parameter | status |
| Attack | John Doe' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/company_currencies |
| Method | PATCH |
| Parameter | symbol |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/connectors/id |
| Method | PATCH |
| Parameter | externalUrl |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/connectors/id |
| Method | PATCH |
| Parameter | status |
| Attack | John Doe' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' AND '1'='2' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/custom-reports/id |
| Method | PATCH |
| Parameter | folderId |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/custom-reports/id |
| Method | PATCH |
| Parameter | name |
| Attack | ZAP AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/objects/definition/records/externalId |
| Method | PATCH |
| Parameter | overwriteValue |
| Attack | John Doe' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' AND '1'='2' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/payments/id |
| Method | PATCH |
| Parameter | paymentPeriodId |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plan-agreements/planAgreementId |
| Method | PATCH |
| Parameter | associatedPlanId |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plan-agreements/planAgreementId |
| Method | PATCH |
| Parameter | confirmationMethod |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/relationships/relationshipId |
| Method | PATCH |
| Parameter | fromDefinitionMachineName |
| Attack | John Doe' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/relationships/relationshipId |
| Method | PATCH |
| Parameter | label |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/relationships/relationshipId |
| Method | PATCH |
| Parameter | name |
| Attack | ZAP AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/sa_companies/companyId |
| Method | PATCH |
| Parameter | type |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/sa_companies/companyId |
| Method | PATCH |
| Parameter | value |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/sa_settings |
| Method | PATCH |
| Parameter | MAINTENANCE |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/id?isNotify=true+AND+1%3D1+--+ |
| Method | PATCH |
| Parameter | isNotify |
| Attack | true OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [true AND 1=1 -- ] and [true OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements_adjustments/statementAdjustmentId |
| Method | PATCH |
| Parameter | name |
| Attack | ZAP AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/team_assignments/id |
| Method | PATCH |
| Parameter | effectiveAsOf |
| Attack | 1.2 AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2 AND 1=1 -- ] and [1.2 AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/team_assignments/id |
| Method | PATCH |
| Parameter | effectiveUntil |
| Attack | 1.2' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2' AND '1'='1' -- ] and [1.2' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/team_assignments/id |
| Method | PATCH |
| Parameter | teamRole |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/assignments |
| Method | POST |
| Parameter | @items[0] |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/assignments |
| Method | POST |
| Parameter | @items[1] |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/audit/records/_count |
| Method | POST |
| Parameter | users[0] |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/audit/records/_search |
| Method | POST |
| Parameter | types[0] |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/audit/records/_search |
| Method | POST |
| Parameter | users[0] |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/companies |
| Method | POST |
| Parameter | name |
| Attack | ZAP OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/companies |
| Method | POST |
| Parameter | slug |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/company_currencies |
| Method | POST |
| Parameter | symbol |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/connectors |
| Method | POST |
| Parameter | authType |
| Attack | John Doe' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/connectors |
| Method | POST |
| Parameter | category |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/connectors |
| Method | POST |
| Parameter | type |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/connectors/connectorId/refreshments |
| Method | POST |
| Parameter | dataConnectorObjectsNames[0] |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/connectors/connectorId/refreshments |
| Method | POST |
| Parameter | indexationType |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/connectors/connectorId/refreshments |
| Method | POST |
| Parameter | startOffset |
| Attack | 1.2' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2' AND '1'='1' -- ] and [1.2' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/custom-reports |
| Method | POST |
| Parameter | folderId |
| Attack | John Doe' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' OR '1'='1' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/custom-reports |
| Method | POST |
| Parameter | name |
| Attack | ZAP AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/custom-reports |
| Method | POST |
| Parameter | source |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/data_exports |
| Method | POST |
| Parameter | type |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/downloads |
| Method | POST |
| Parameter | type |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/filters/duplicateInContext?planId=planId+AND+1%3D1+--+&ruleId=ruleId |
| Method | POST |
| Parameter | planId |
| Attack | planId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [planId AND 1=1 -- ] and [planId AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/filters/id/previews |
| Method | POST |
| Parameter | planId |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/filters/id/previews |
| Method | POST |
| Parameter | userId |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/filters?ruleId=ruleId+AND+1%3D1+--+&planId=planId |
| Method | POST |
| Parameter | ruleId |
| Attack | ruleId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ruleId AND 1=1 -- ] and [ruleId AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/flows |
| Method | POST |
| Parameter | frequency |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/flows |
| Method | POST |
| Parameter | name |
| Attack | ZAP OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/objects/definition/records/bulk |
| Method | POST |
| Parameter | patches[0] |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/objects/definition/records/externalId/clear |
| Method | POST |
| Parameter | overwriteId |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/payments/id/clear |
| Method | POST |
| Parameter | overwriteId |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/payments/split/masterPaymentId |
| Method | POST |
| Parameter | splitParts[0] |
| Attack | John Doe' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' OR '1'='1' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plan-agreements |
| Method | POST |
| Parameter | name |
| Attack | ZAP OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans |
| Method | POST |
| Parameter | duplicateOf |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans |
| Method | POST |
| Parameter | name |
| Attack | ZAP' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP' AND '1'='1' -- ] and [ZAP' OR '1'='1' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/refreshments |
| Method | POST |
| Parameter | indexationType |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/relationships |
| Method | POST |
| Parameter | id |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/relationships |
| Method | POST |
| Parameter | label |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/relationships |
| Method | POST |
| Parameter | name |
| Attack | ZAP' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP' AND '1'='1' -- ] and [ZAP' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/rules/v2 |
| Method | POST |
| Parameter | name |
| Attack | ZAP AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/rules/v2 |
| Method | POST |
| Parameter | planId |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/statementId/datasets/datasetId/overwrites |
| Method | POST |
| Parameter | definitionId |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/statementId/datasets/datasetId/overwrites |
| Method | POST |
| Parameter | overwriteValue |
| Attack | John Doe' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' AND '1'='2' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/statementId/datasets/datasetId/overwrites |
| Method | POST |
| Parameter | rowExternalId |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/statementId/datasets/datasetId/overwrites |
| Method | POST |
| Parameter | ruleId |
| Attack | John Doe' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/statementId/datasets/datasetId/rows |
| Method | POST |
| Parameter | customObjectIds[0] |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/statementId/overwrites |
| Method | POST |
| Parameter | field |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/statementId/overwrites |
| Method | POST |
| Parameter | overwriteValue |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements/statementId/statementthreads |
| Method | POST |
| Parameter | type |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/statements_adjustments |
| Method | POST |
| Parameter | name |
| Attack | ZAP OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/team_assignments |
| Method | POST |
| Parameter | effectiveAsOf |
| Attack | 1.2 OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2 AND 1=1 -- ] and [1.2 OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/team_assignments |
| Method | POST |
| Parameter | effectiveUntil |
| Attack | 1.2' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2' AND '1'='1' -- ] and [1.2' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/team_assignments |
| Method | POST |
| Parameter | teamRole |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/teams |
| Method | POST |
| Parameter | name |
| Attack | ZAP OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/teams/teamId/plan-assignments |
| Method | POST |
| Parameter | affectedUsersType |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/teams/teamId/plan-assignments |
| Method | POST |
| Parameter | planId |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/users/invitations |
| Method | POST |
| Parameter | users[0] |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/users/registrations |
| Method | POST |
| Parameter | users[0] |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/users/searches |
| Method | POST |
| Parameter | ids[0] |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/variable_values |
| Method | POST |
| Parameter | variableId |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/variable_values/bulk |
| Method | POST |
| Parameter | quotas[0] |
| Attack | John Doe' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/variables/duplicateInContext?planId=planId&ruleId=ruleId+AND+1%3D1+--+&activeFilterId=activeFilterId |
| Method | POST |
| Parameter | ruleId |
| Attack | ruleId AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ruleId AND 1=1 -- ] and [ruleId AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/variables/duplicateInContext?planId=planId+AND+1%3D1+--+&ruleId=ruleId&activeFilterId=activeFilterId |
| Method | POST |
| Parameter | planId |
| Attack | planId OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [planId AND 1=1 -- ] and [planId OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/variables?ruleId=ruleId+AND+1%3D1+--+&planId=planId&activeFilterId=activeFilterId |
| Method | POST |
| Parameter | ruleId |
| Attack | ruleId OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ruleId AND 1=1 -- ] and [ruleId OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/workflows |
| Method | POST |
| Parameter | name |
| Attack | ZAP OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/workflows |
| Method | POST |
| Parameter | type |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/companies |
| Method | PUT |
| Parameter | name |
| Attack | ZAP OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/flows/flowId |
| Method | PUT |
| Parameter | frequency |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/flows/flowId |
| Method | PUT |
| Parameter | name |
| Attack | ZAP AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/flows/flowId |
| Method | PUT |
| Parameter | receivers[0] |
| Attack | John Doe' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plan_rule_categories/categoryId |
| Method | PUT |
| Parameter | index |
| Attack | 1.2' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [1.2' AND '1'='1' -- ] and [1.2' OR '1'='1' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plan_rule_categories/categoryId |
| Method | PUT |
| Parameter | name |
| Attack | ZAP AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans/%7BplanId%7D/forecasts/id |
| Method | PUT |
| Parameter | datasets |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans/%7BplanId%7D/forecasts/id |
| Method | PUT |
| Parameter | fields |
| Attack | John Doe' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' AND '1'='2' -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans/planId |
| Method | PUT |
| Parameter | badgeConfigurations[0] |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans/planId |
| Method | PUT |
| Parameter | name |
| Attack | ZAP OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans/planId |
| Method | PUT |
| Parameter | rules[0] |
| Attack | John Doe' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans/planId/highlighted-kpis/%7Bidentifier%7D |
| Method | PUT |
| Parameter | maximumVariableId |
| Attack | John Doe' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans/planId/highlighted-kpis/%7Bidentifier%7D |
| Method | PUT |
| Parameter | minimumVariableId |
| Attack | John Doe OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/plans/planId/highlighted-kpis/%7Bidentifier%7D |
| Method | PUT |
| Parameter | variableId |
| Attack | John Doe' OR '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' OR '1'='1' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/rules/id |
| Method | PUT |
| Parameter | name |
| Attack | ZAP OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/teams |
| Method | PUT |
| Parameter | id |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/teams |
| Method | PUT |
| Parameter | name |
| Attack | ZAP OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/teams/teamId/plan-assignments |
| Method | PUT |
| Parameter | planId |
| Attack | John Doe AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe AND 1=1 -- ] and [John Doe AND 1=2 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/variables?planId=planId |
| Method | PUT |
| Parameter | name |
| Attack | ZAP AND 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [ZAP AND 1=1 -- ] and [ZAP AND 1=2 -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/variables?planId=planId+AND+1%3D1+--+ |
| Method | PUT |
| Parameter | planId |
| Attack | planId OR 1=1 -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [planId AND 1=1 -- ] and [planId OR 1=1 -- ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was NOT returned for the original parameter. The vulnerability was detected by successfully retrieving more data than originally returned, by manipulating the parameter |
| URL | https://app.ci.amalia.io/api/workflows/id |
| Method | PUT |
| Parameter | type |
| Attack | John Doe' AND '1'='1' -- |
| Evidence | |
| Other Info | The page results were successfully manipulated using the boolean conditions [John Doe' AND '1'='1' -- ] and [John Doe' AND '1'='2' -- ] The parameter value being modified was stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |
| Instances | 155 |
| Solution |
Do not trust client side input, even if there is client side validation in place.
In general, type check all data on the server side.
If the application uses JDBC, use PreparedStatement or CallableStatement, with parameters passed by '?'
If the application uses ASP, use ADO Command Objects with strong type checking and parameterized queries.
If database Stored Procedures can be used, use them.
Do *not* concatenate strings into queries in the stored procedure, or use 'exec', 'exec immediate', or equivalent functionality!
Do not create dynamic SQL queries using simple string concatenation.
Escape all data received from the client.
Apply an 'allow list' of allowed characters, or a 'deny list' of disallowed characters in user input.
Apply the principle of least privilege by using the least privileged database user possible.
In particular, avoid using the 'sa' or 'db-owner' database users. This does not eliminate SQL injection, but minimizes its impact.
Grant the minimum database access that is necessary for the application.
|
| Reference | https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html |
| CWE Id | 89 |
| WASC Id | 19 |
| Plugin Id | 40018 |
|
Medium |
CSP: Wildcard Directive |
|---|---|
| Description |
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks. Including (but not limited to) Cross Site Scripting (XSS), and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
|
| URL | https://app.ci.amalia.io/api/todos/count |
| Method | GET |
| Parameter | content-security-policy |
| Attack | |
| Evidence | default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests |
| Other Info | The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined: style-src, font-src |
| URL | https://app.ci.amalia.io/api/sa_settings/impersonate |
| Method | PATCH |
| Parameter | content-security-policy |
| Attack | |
| Evidence | default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests |
| Other Info | The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined: style-src, font-src |
| URL | https://app.ci.amalia.io/api/users/avatar/randomize |
| Method | PATCH |
| Parameter | content-security-policy |
| Attack | |
| Evidence | default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests |
| Other Info | The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined: style-src, font-src |
| URL | https://app.ci.amalia.io/api/users/impersonate |
| Method | PATCH |
| Parameter | content-security-policy |
| Attack | |
| Evidence | default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests |
| Other Info | The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined: style-src, font-src |
| URL | https://app.ci.amalia.io/api/users/logout |
| Method | PATCH |
| Parameter | content-security-policy |
| Attack | |
| Evidence | default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests |
| Other Info | The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined: style-src, font-src |
| Instances | 5 |
| Solution |
Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.
|
| Reference |
http://www.w3.org/TR/CSP2/
http://www.w3.org/TR/CSP/ http://caniuse.com/#search=content+security+policy http://content-security-policy.com/ https://github.com/shapesecurity/salvation https://developers.google.com/web/fundamentals/security/csp#policy_applies_to_a_wide_variety_of_resources |
| CWE Id | 693 |
| WASC Id | 15 |
| Plugin Id | 10055 |
|
Medium |
CSP: style-src unsafe-inline |
|---|---|
| Description |
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks. Including (but not limited to) Cross Site Scripting (XSS), and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
|
| URL | https://app.ci.amalia.io/api/todos/count |
| Method | GET |
| Parameter | content-security-policy |
| Attack | |
| Evidence | default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests |
| Other Info | style-src includes unsafe-inline. |
| URL | https://app.ci.amalia.io/api/sa_settings/impersonate |
| Method | PATCH |
| Parameter | content-security-policy |
| Attack | |
| Evidence | default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests |
| Other Info | style-src includes unsafe-inline. |
| URL | https://app.ci.amalia.io/api/users/avatar/randomize |
| Method | PATCH |
| Parameter | content-security-policy |
| Attack | |
| Evidence | default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests |
| Other Info | style-src includes unsafe-inline. |
| URL | https://app.ci.amalia.io/api/users/impersonate |
| Method | PATCH |
| Parameter | content-security-policy |
| Attack | |
| Evidence | default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests |
| Other Info | style-src includes unsafe-inline. |
| URL | https://app.ci.amalia.io/api/users/logout |
| Method | PATCH |
| Parameter | content-security-policy |
| Attack | |
| Evidence | default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests |
| Other Info | style-src includes unsafe-inline. |
| Instances | 5 |
| Solution |
Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.
|
| Reference |
http://www.w3.org/TR/CSP2/
http://www.w3.org/TR/CSP/ http://caniuse.com/#search=content+security+policy http://content-security-policy.com/ https://github.com/shapesecurity/salvation https://developers.google.com/web/fundamentals/security/csp#policy_applies_to_a_wide_variety_of_resources |
| CWE Id | 693 |
| WASC Id | 15 |
| Plugin Id | 10055 |
|
Low |
Application Error Disclosure |
|---|---|
| Description |
This page contains an error/warning message that may disclose sensitive information like the location of the file that produced the unhandled exception. This information can be used to launch further attacks against the web application. The alert could be a false positive if the error message is found inside a documentation page.
|
| URL | https://app.ci.amalia.io/api/audit/filters?fromDate=fromDate&toDate=toDate |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | HTTP/1.1 500 Internal Server Error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/integrations/slack/channels |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | HTTP/1.1 500 Internal Server Error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/probe/replication |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | HTTP/1.1 500 Internal Server Error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/profile/id |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | HTTP/1.1 500 Internal Server Error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/audit/records/_search |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | HTTP/1.1 500 Internal Server Error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/flows/handle |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | HTTP/1.1 500 Internal Server Error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/plan_rule_categories |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | HTTP/1.1 500 Internal Server Error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/teams |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | HTTP/1.1 500 Internal Server Error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/profile/id/toggle-deactivation |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | HTTP/1.1 500 Internal Server Error |
| Other Info | |
| Instances | 9 |
| Solution |
Review the source code of this page. Implement custom error pages. Consider implementing a mechanism to provide a unique error reference/identifier to the client (browser) while logging the details on the server side and not exposing them to the user.
|
| Reference | |
| CWE Id | 200 |
| WASC Id | 13 |
| Plugin Id | 90022 |
|
Low |
Information Disclosure - Debug Error Messages |
|---|---|
| Description |
The response appeared to contain common error messages returned by platforms such as ASP.NET, and Web-servers such as IIS and Apache. You can configure the list of common debug messages.
|
| URL | https://app.ci.amalia.io/api/audit/filters?fromDate=fromDate&toDate=toDate |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | Internal server error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/integrations/slack/channels |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | Internal server error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/probe/replication |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | Internal server error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/profile/id |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | Internal server error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/audit/records/_search |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | Internal server error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/flows/handle |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | Internal server error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/plan_rule_categories |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | Internal server error |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/profile/id/toggle-deactivation |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | Internal server error |
| Other Info | |
| Instances | 8 |
| Solution |
Disable debugging messages before pushing to production.
|
| Reference | |
| CWE Id | 200 |
| WASC Id | 13 |
| Plugin Id | 10023 |
|
Low |
Permissions Policy Header Not Set |
|---|---|
| Description |
Permissions Policy Header is an added layer of security that helps to restrict from unauthorized access or usage of browser/client features by web resources. This policy ensures the user privacy by limiting or specifying the features of the browsers can be used by the web resources. Permissions Policy provides a set of standard HTTP headers that allow website owners to limit which features of browsers can be used by the page such as camera, microphone, location, full screen etc.
|
| URL | https://app.ci.amalia.io/api/todos/count |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/sa_settings/impersonate |
| Method | PATCH |
| Parameter | |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/avatar/randomize |
| Method | PATCH |
| Parameter | |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/impersonate |
| Method | PATCH |
| Parameter | |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/logout |
| Method | PATCH |
| Parameter | |
| Attack | |
| Evidence | |
| Other Info | |
| Instances | 5 |
| Solution |
Ensure that your web server, application server, load balancer, etc. is configured to set the Permissions-Policy header.
|
| Reference |
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy
https://developer.chrome.com/blog/feature-policy/ https://scotthelme.co.uk/a-new-security-header-feature-policy/ https://w3c.github.io/webappsec-feature-policy/ https://www.smashingmagazine.com/2018/12/feature-policy/ |
| CWE Id | 693 |
| WASC Id | 15 |
| Plugin Id | 10063 |
|
Low |
Timestamp Disclosure - Unix |
|---|---|
| Description |
A timestamp was disclosed by the application/web server - Unix
|
| URL | https://app.ci.amalia.io/api/scope |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | 1577836800 |
| Other Info | 1577836800, which evaluates to: 2020-01-01 00:00:00 |
| Instances | 1 |
| Solution |
Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.
|
| Reference | http://projects.webappsec.org/w/page/13246936/Information%20Leakage |
| CWE Id | 200 |
| WASC Id | 13 |
| Plugin Id | 10096 |
|
Informational |
Information Disclosure - Sensitive Information in URL |
|---|---|
| Description |
The request appeared to contain sensitive information leaked in the URL. This can violate PCI and most organizational compliance policies. You can configure the list of strings for this check to add or remove values specific to your environment.
|
| URL | https://app.ci.amalia.io/api/assignments?planId=planId&userId=userId |
| Method | GET |
| Parameter | userId |
| Attack | |
| Evidence | userId |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userId |
| URL | https://app.ci.amalia.io/api/dashboards/widget?periodId=periodId&year=1.2&planIds=planIds&teamIds=teamIds&userIds=userIds&limit=1.2 |
| Method | GET |
| Parameter | userIds |
| Attack | |
| Evidence | userIds |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userIds |
| URL | https://app.ci.amalia.io/api/overwrites?page=1.2&limit=1.2&sort=sort&desc=desc&q=q&dataSourceIds=dataSourceIds&status=status&typeName=typeName&periodIds=periodIds&userIds=userIds&planIds=planIds&overwrittenByIds=overwrittenByIds |
| Method | GET |
| Parameter | userIds |
| Attack | |
| Evidence | userIds |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userIds |
| URL | https://app.ci.amalia.io/api/payments/amounts?currentPeriodId=currentPeriodId&planIds=planIds&ruleIds=ruleIds&periodIds=periodIds&paymentPeriodIds=paymentPeriodIds&teamId=teamId&userIds=userIds&type=type |
| Method | GET |
| Parameter | userIds |
| Attack | |
| Evidence | userIds |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userIds |
| URL | https://app.ci.amalia.io/api/payments/facets?userIds=userIds&planIds=planIds&teamIds=teamIds&ruleIds=ruleIds&periodIds=periodIds&paymentPeriodIds=paymentPeriodIds&q=q |
| Method | GET |
| Parameter | userIds |
| Attack | |
| Evidence | userIds |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userIds |
| URL | https://app.ci.amalia.io/api/payments/paginate?userIds=userIds&planIds=planIds&teamIds=teamIds&ruleIds=ruleIds&periodIds=periodIds&paymentPeriodIds=paymentPeriodIds&q=q&sort=sort&desc=desc&page=1.2&limit=1.2 |
| Method | GET |
| Parameter | userIds |
| Attack | |
| Evidence | userIds |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userIds |
| URL | https://app.ci.amalia.io/api/plans?userIds=userIds&planIds=planIds&periodId=periodId |
| Method | GET |
| Parameter | userIds |
| Attack | |
| Evidence | userIds |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userIds |
| URL | https://app.ci.amalia.io/api/statements?userIds=userIds&periodId=periodId&planId=planId&teamId=teamId |
| Method | GET |
| Parameter | userIds |
| Attack | |
| Evidence | userIds |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userIds |
| URL | https://app.ci.amalia.io/api/team_assignments?teamId=teamId&userId=userId |
| Method | GET |
| Parameter | userId |
| Attack | |
| Evidence | userId |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userId |
| URL | https://app.ci.amalia.io/api/teams?userIds=userIds&planIds=planIds |
| Method | GET |
| Parameter | userIds |
| Attack | |
| Evidence | userIds |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userIds |
| URL | https://app.ci.amalia.io/api/variable_values?variableId=variableId&userId=userId&planId=planId&teamId=teamId |
| Method | GET |
| Parameter | userId |
| Attack | |
| Evidence | userId |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userId |
| URL | https://app.ci.amalia.io/api/variables?types=types&userIds=userIds&planIds=planIds |
| Method | GET |
| Parameter | userIds |
| Attack | |
| Evidence | userIds |
| Other Info | The URL contains potentially sensitive information. The following string was found via the pattern: user userIds |
| Instances | 12 |
| Solution |
Do not pass sensitive information in URIs.
|
| Reference | |
| CWE Id | 200 |
| WASC Id | 13 |
| Plugin Id | 10024 |
|
Informational |
Non-Storable Content |
|---|---|
| Description |
The response contents are not storable by caching components such as proxy servers. If the response does not contain sensitive, personal or user-specific information, it may benefit from being stored and cached, to improve performance.
|
| URL | https://app.ci.amalia.io/api/teams/teamId/plan-assignments |
| Method | DELETE |
| Parameter | |
| Attack | |
| Evidence | DELETE |
| Other Info | |
| URL | https://app.ci.amalia.io/api-json |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | authorization: |
| Other Info | |
| URL | https://app.ci.amalia.io/api/teams/team/id |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | authorization: |
| Other Info | |
| URL | https://app.ci.amalia.io/api/teams/teamId/plan-assignments |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | authorization: |
| Other Info | |
| URL | https://app.ci.amalia.io/api/teams?userIds=userIds&planIds=planIds |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | authorization: |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/id |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | authorization: |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/me |
| Method | GET |
| Parameter | |
| Attack | |
| Evidence | authorization: |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/impersonate |
| Method | PATCH |
| Parameter | |
| Attack | |
| Evidence | PATCH |
| Other Info | |
| URL | https://app.ci.amalia.io/api/teams |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | authorization: |
| Other Info | |
| URL | https://app.ci.amalia.io/api/teams/teamId/plan-assignments |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | authorization: |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/registrations |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | authorization: |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/searches |
| Method | POST |
| Parameter | |
| Attack | |
| Evidence | authorization: |
| Other Info | |
| Instances | 12 |
| Solution |
The content may be marked as storable by ensuring that the following conditions are satisfied:
The request method must be understood by the cache and defined as being cacheable ("GET", "HEAD", and "POST" are currently defined as cacheable)
The response status code must be understood by the cache (one of the 1XX, 2XX, 3XX, 4XX, or 5XX response classes are generally understood)
The "no-store" cache directive must not appear in the request or response header fields
For caching by "shared" caches such as "proxy" caches, the "private" response directive must not appear in the response
For caching by "shared" caches such as "proxy" caches, the "Authorization" header field must not appear in the request, unless the response explicitly allows it (using one of the "must-revalidate", "public", or "s-maxage" Cache-Control response directives)
In addition to the conditions above, at least one of the following conditions must also be satisfied by the response:
It must contain an "Expires" header field
It must contain a "max-age" response directive
For "shared" caches such as "proxy" caches, it must contain a "s-maxage" response directive
It must contain a "Cache Control Extension" that allows it to be cached
It must have a status code that is defined as cacheable by default (200, 203, 204, 206, 300, 301, 404, 405, 410, 414, 501).
|
| Reference |
https://datatracker.ietf.org/doc/html/rfc7234
https://datatracker.ietf.org/doc/html/rfc7231 https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html |
| CWE Id | 524 |
| WASC Id | 13 |
| Plugin Id | 10049 |
|
Informational |
Re-examine Cache-control Directives |
|---|---|
| Description |
The cache-control header has not been set properly or is missing, allowing the browser and proxies to cache content. For static assets like css, js, or image files this might be intended, however, the resources should be reviewed to ensure that no sensitive content will be cached.
|
| URL | https://app.ci.amalia.io/api-json |
| Method | GET |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/companies/api-keys |
| Method | GET |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/filters |
| Method | GET |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/plan_rule_categories |
| Method | GET |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/plans/search/ZAP |
| Method | GET |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/relationships |
| Method | GET |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/rules |
| Method | GET |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/scope |
| Method | GET |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/teams/hierarchy?showArchived=true |
| Method | GET |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/me |
| Method | GET |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/users/settings |
| Method | PATCH |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| URL | https://app.ci.amalia.io/api/audit/records/_count |
| Method | POST |
| Parameter | cache-control |
| Attack | |
| Evidence | |
| Other Info | |
| Instances | 12 |
| Solution |
For secure content, ensure the cache-control HTTP header is set with "no-cache, no-store, must-revalidate". If an asset should be cached consider setting the directives "public, max-age, immutable".
|
| Reference |
https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html#web-content-caching
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cache-Control https://grayduck.mn/2021/09/13/cache-control-recommendations/ |
| CWE Id | 525 |
| WASC Id | 13 |
| Plugin Id | 10015 |