Summary #

Invicti detected weak credentials.

Impact #
Depending on the nature of the password-protected resource, an attacker can mount one or more of the following types of attacks:
  • Access the contents of the password-protected resources.
  • Access password-protected administrative mechanisms such as "dashboard", "management console" and "admin panel," potentially progressing to gain full control of the application.
Remediation #
Do not use weak passwords, which are short, default, common or easy to guess. Implement a strong password policy.
Classifications #
PCI v3.1-6.5.10; PCI v3.2-6.5.10; CAPEC-16; CWE-521; ISO27001-A.9.4.3; WASC-15; OWASP 2013-A6; OWASP 2017-A3 , CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Dead accurate, fast & easy-to-use Web Application Security Scanner

Get a demo