Admin panel exposed

Description

During the scan, Kayran managed to find that the administrator’s login page is viewable and accessible through any IP address.

An attacker could exploit this finding to perform BruteForce attacks against users, or, to create a similar phishing page scamming users and more.

Recommendation

Define and restrict access which IP addresses are allowed to access the administrator’s login page.
Remember, only authorized personal should have access to this page, block access to anyone other than them.

References

https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/05-Enumerate_Infrastructure_and_Application_Admin_Interfaces

< Return to all Vulnerabilities

What is Kayran

Kayran scanner is helping all businesses, both SMBs and enterprises, to test their online assets and products for over 9000 vulnerabilities.Kayran’s mission is to make

Read More »

APT vs. ATP

In this article we will talk about APT vs. ATP. In other words, Advanced Persistent Threat and Advanced Threat Protection and the context between these

Read More »