Vulnerability Guide

This section lists all vulnerability buckets that can be detected by Bright and provides detailed information about each of them.

API attacks: Attacks targeting API-based infrastructure and attempting to override API mechanisms and logic or run backend code. Bucket ID for API usage: `client_side`.
Test NameDescriptionDetectable Vulnerabilities
AWS S3 TakeoverTests for S3 buckets that no longer exist to prevent data breaches and malware distributionAWS S3 Takeover
Broken JWT AuthenticationTests for secure implementation of JSON Web Token (JWT) in the applicationBroken JWT Authentication
Broken SAML AuthenticationTests for secure implementation of SAML authentication in the applicationBroken SAML Authentication
Business Constraint BypassTests if the limitation of the number of retrievable items via an API call is configured properlyBusiness Constraint Bypass
Cookie Security CheckTests if the application uses and implements cookies with secure attributesSensitive Cookie in HTTPS Session Without Secure Attribute

Sensitive Cookie Without Http-Only Flag

Sensitive Cookie Weak Session ID
Directory ListingTests if server-side directory listing is possibleDirectory Listing
Email Header InjectionTests if it is possible to send emails to other addresses through the target application mailing server, which can lead to spam and phishingEmail Header Injection
Open Cloud StorageContains Open Buckets, Azure Blob Storage, and Amazon S3 Bucket Takeover tests.Open Cloud Storage
Exposed Database Details
(Open Database)
Tests if exposed database connection strings are open to public connectionsExposed Database Details

Exposed Database Connection String
Excessive Data ExposureTests application for not screening sensitive information on the server sideExcessive Data Exposure
Full Path Disclosure (FPD)Tests if various application parameters are vulnerable to the exposure of errors that include full webroot pathFull Path Disclosure
GraphQL introspectionGraphQL data availability test for queries coming from external IP-addressGraphQL introspection
Headers Security CheckTests for proper Security Headers configurationMisconfigured Security Headers

Missing Security Headers

Insecure Content Secure Policy Configuration
HTML InjectionTests if various application parameters are vulnerable to HTML injectionHTML Injection
Improper Assets ManagementTests if older or development versions of API endpoints are exposed and can be used to get unauthorized access to data and privilegesImproper Assets Management
Insecure HTTP Method
(HTTP Method Fuzzer)
Tests enumeration of possible HTTP methods for vulnerabilitiesInsecure HTTP Method
Insecure TLS ConfigurationTests SSL/TLS ciphers and configurations for vulnerabilitiesInsecure TLS Configuration
Local File Inclusion (LFI)Tests if various application parameters are vulnerable to loading of unauthorized local system resourcesLocal File Inclusion (LFI)
Mass AssignmentTests if it is possible to create requests with additional parameters to gain privilege escalationMass Assignment
OS Command InjectionTests if various application parameters are vulnerable to Operation System (OS) command injectionOS Command Injection
Remote File Inclusion (RFI)Tests if various application parameters are vulnerable to loading of unauthorized remote system resourcesRemote File Inclusion (RFI)
Secret Tokens LeakTests for exposure of secret API tokens or keys in the target applicationSecret Tokens Leak
Server Side Template Injection (SSTI)Tests if various application parameters are vulnerable to server-side code executionServer Side Template Injection (SSTI)
Server Side Request Forgery (SSRF)Tests if various application parameters are vulnerable to internal resource accessServer Side Request Forgery (SSRF)
SQL Injection (SQLI)SQL Injection tests vulnerable parameters for SQL database accessSQL injection

SQL Injection: Blind Boolean Based

SQL Injection: Blind Time Based
Unrestricted File UploadTests if file upload mechanisms are validated properly and denies upload of malicious contentUnrestricted File Upload
Unsafe Date Range
(Date Manipulation)
Tests if date ranges are set and validated properlyUnsafe Date Range
User ID EnumerationTests if it is possible to collect valid user ID data by interacting with the target applicationEnumerable Integer-Based ID
Version Control System Data LeakTests if it is possible to access Version Control System (VCS) resourcesVersion Control System Data Leak
LDAP InjectionTests if various application parameters are vulnerable to unauthorized LDAP accessLDAP Injection
LDAP Error
MongoDBTests if an attacker is able to inject malicious input into a NoSQL database query.MongoDB
Known JavaScript Vulnerabilities
(JavaScript Vulnerabilities Scanning)
Tests for known JavaScript component vulnerabilitiesJavaScript Component with Known Vulnerabilities
XPath InjectionTests if unvalidated user input in XPath expressions can be exploited to manipulate queries, potentially leading to unauthorized access or unintended actionsXPath Injection
Business logic attacks: Attacks attempting to bypass application logic's constraints, manipulate legitimate functionality to achieve a malicious goal. Tests may lead to false positive findings. Bucket ID for API usage: `business_logic`.
Test NameDescriptionDetectable Vulnerabilities
Broken Object Property Level AuthorizationTests if the application properly enforces access controls on individual properties of an object.Broken Object Property Level Authorization
Business Constraint BypassTests if the limitation of the number of retrievable items via an API call is configured properlyBusiness Constraint Bypass
Excessive Data ExposureTests application for not screening sensitive information on the server sideExcessive Data Exposure
Improper Assets ManagementTests if older or development versions of API endpoints are exposed and can be used to get unauthorized access to data and privilegesImproper Assets Management
Insecure Output Handling TestTests for instances where a plugin or application fails to properly sanitize or validate LLM output before forwarding it to backend or client-side functions, leading to potential risks such as HTMLi, XSS, CSRF, SSRF, privilege escalation, or remote code execution.Insecure Output Handling Test
Mass AssignmentTests if it is possible to create requests with additional parameters to gain privilege escalationMass Assignment
Prompt InjectionTests for prompt injections assess the manipulation of LLMs through crafted prompts, which can result in unintended actions and security vulnerabilities like data leaks and unauthorized access.Prompt Injection
Unsafe Date Range
(Date Manipulation)
Tests if date ranges are set and validated properlyUnsafe Date Range
User ID EnumerationTests if it is possible to collect valid user ID data by interacting with the target applicationEnumerable Integer-Based ID
Client-side attacks: Attacks targeting client UI and client-side code to steal user cookies impersonate the user and perform actions on his behalf. Bucket ID for API usage: `client_side` .
Test NameDescriptionDetectable Vulnerabilities
Brute Force LoginTests for the availability of commonly used credentialsBrute Force Login
Cookie Security CheckTests if the application uses and implements cookies with secure attributesSensitive Cookie in HTTPS Session Without Secure Attribute

Sensitive Cookie Without Http-Only Flag

Sensitive Cookie Weak Session ID
AWS S3 TakeoverTests for S3 buckets that no longer exist to prevent data breaches and malware distributionAWS S3 Takeover
Cross-Site Scripting (XSS)Tests if various application DOM parameters are vulnerable to JavaScript injectionsStored Cross-site scripting (pXSS)
CSS InjectionTests for weaknesses that could allow hackers to inject malicious Cascading Style Sheets (CSS) code.CSS Injection
Default Login LocationTests if login form location in the target application is easy to guess and accessibleDefault Login Location
Open Cloud StorageContains Open Buckets, Azure Blob Storage, and Amazon S3 Bucket Takeover tests.Open Cloud Storage
HTML InjectionTests if various application parameters are vulnerable to HTML injectionHTML Injection
iFrame InjectionTests for frame injection attacks evaluate the embedding of deceptive elements on legitimate websites, tricking users into unintended interactions that lead to unauthorized actions, data theft, or malicious activities.iFrame Injection
Known JavaScript Vulnerabilities
(JavaScript Vulnerabilities Scanning)
Tests for known JavaScript component vulnerabilitiesJavaScript Component with Known Vulnerabilities
Prototype PollutionTests if it is possible to inject properties into existing JavaScript objectsPrototype Pollution
Secret Tokens LeakTests for exposure of secret API tokens or keys in the target applicationSecret Tokens Leak
Unsafe Redirect
(Unvalidated Redirect)
Tests if various application parameters are vulnerable to the injection of a malicious link that can redirect a user without validationUnsafe Redirect
Version Control System Data LeakTests if it is possible to access Version Control System (VCS) resourcesVersion Control System Data Leak
CVE tests: Passive CVE signature-based tests. Bucket ID for API usage: `cve`.
Test NameDescriptionDetectable Vulnerabilities
Known JavaScript Vulnerabilities
(JavaScript Vulnerabilities Scanning)
Tests for known JavaScript component vulnerabilitiesJavaScript Component with Known Vulnerabilities
CVE scanningTests for known third-party common vulnerability exposuresCommon Vulnerability Exposure
Legacy attacks: Attacks that haven't been widely exploited in the wild in recent time. Bucket ID for API usage: `legacy`.
Test NameDescriptionDetectable Vulnerabilities
CVE scanningTests for known third-party common vulnerability exposuresCommon Vulnerability Exposure
Known JavaScript Vulnerabilities
(JavaScript Vulnerabilities Scanning)
Tests for known JavaScript component vulnerabilitiesJavaScript Component with Known Vulnerabilities
WordPress ComponentTests for known vulnerabilities related to the WordPress platformWordPress
XML External Entity Injection (XXE)Tests if various XML parameters are vulnerable to XML parsing of unauthorized external entitiesXML External Entity Injection
LDAP InjectionTests if various application parameters are vulnerable to unauthorized LDAP accessLDAP Injection
LDAP Error
Multiple authentication attacks: Attacks leveraging multiple authentications to identify vulnerabilities that bypass security controls and expose unauthorized access. Bucket ID for API usage: `multiple_authentication_attacks`.
Test NameDescriptionDetectable Vulnerabilities
Broken Access ControlTests for improper access controls measures allowing users to perform actions beyond their permissionsBroken Access Control
Server-side attacks: Attacks trying to exploit server-side architecture and code. Bucket ID for API usage: `server_side`.
Test NameDescriptionDetectable Vulnerabilities
AWS S3 TakeoverTests for S3 buckets that no longer exist to prevent data breaches and malware distributionAWS S3 Takeover
Broken JWT AuthenticationTests for secure implementation of JSON Web Token (JWT) in the applicationBroken JWT Authentication
Broken SAML AuthenticationTests for secure implementation of SAML authentication in the applicationBroken SAML Authentication
Brute Force LoginTests for the availability of commonly used credentialsBrute Force Login
CVE scanningTests for known third-party common vulnerability exposuresCommon Vulnerability Exposure
MongoDBTests if an attacker is able to inject malicious input into a NoSQL database query.MongoDB
Common Files ExposureTests if common files that should not be accessible are accessibleExposed Common File
Cookie Security CheckTests if the application uses and implements cookies with secure attributesSensitive Cookie in HTTPS Session Without Secure Attribute

Sensitive Cookie Without Http-Only Flag

Sensitive Cookie Weak Session ID
Cross-Site Request Forgery (CSRF)Tests application forms for vulnerable cross-site filling and submittingUnauthorized Cross-Site Request Forgery (CSRF)

Authorized Cross-Site Request Forgery (CSRF)
Directory ListingTests if server-side directory listing is possibleDirectory Listing
Email Header InjectionTests if it is possible to send emails to other addresses through the target application mailing server, which can lead to spam and phishingEmail Header Injection
Open Cloud StorageContains Open Buckets, Azure Blob Storage, and Amazon S3 Bucket Takeover tests.Open Cloud Storage
Exposed Database Details
(Open Database)
Tests if exposed database connection strings are open to public connectionsExposed Database Details

Exposed Database Connection String
Full Path Disclosure (FPD)Tests if various application parameters are vulnerable to the exposure of errors that include full webroot pathFull Path Disclosure
Headers Security CheckTests for proper Security Headers configurationMisconfigured Security Headers

Missing Security Headers

Insecure Content Secure Policy Configuration
iFrame InjectionTests for frame injection attacks evaluate the embedding of deceptive elements on legitimate websites, tricking users into unintended interactions that lead to unauthorized actions, data theft, or malicious activities.iFrame Injection
Insecure HTTP Method
(HTTP Method Fuzzer)
Tests enumeration of possible HTTP methods for vulnerabilitiesInsecure HTTP Method
Insecure TLS ConfigurationTests SSL/TLS ciphers and configurations for vulnerabilitiesInsecure TLS Configuration
Known JavaScript Vulnerabilities
(JavaScript Vulnerabilities Scanning)
Tests for known JavaScript component vulnerabilitiesJavaScript Component with Known Vulnerabilities
Local File Inclusion (LFI)Tests if various application parameters are vulnerable to loading of unauthorized local system resourcesLocal File Inclusion (LFI)
OS Command InjectionTests if various application parameters are vulnerable to Operation System (OS) command injectionOS Command Injection
Remote File Inclusion (RFI)Tests if various application parameters are vulnerable to loading of unauthorized remote system resourcesRemote File Inclusion (RFI)
Secret Tokens LeakTests for exposure of secret API tokens or keys in the target applicationSecret Tokens Leak
Server Side Template Injection (SSTI)Tests if various application parameters are vulnerable to server-side code executionServer Side Template Injection (SSTI)
Server Side Request Forgery (SSRF)Tests if various application parameters are vulnerable to internal resource accessServer Side Request Forgery (SSRF)
SQL Injection (SQLI)SQL Injection tests vulnerable parameters for SQL database accessSQL injection

SQL Injection: Blind Boolean Based

SQL Injection: Blind Time Based
Unrestricted File UploadTests if file upload mechanisms are validated properly and denies upload of malicious contentUnrestricted File Upload
Version Control System Data LeakTests if it is possible to access Version Control System (VCS) resourcesVersion Control System Data Leak
WordPress ComponentTests for known vulnerabilities related to the WordPress platformWordPress
XML External Entity Injection (XXE)Tests if various XML parameters are vulnerable to XML parsing of unauthorized external entitiesXML External Entity Injection
XPath InjectionTests if unvalidated user input in XPath expressions can be exploited to manipulate queries, potentially leading to unauthorized access or unintended actionsXPath Injection
Advanced attacks: Attacks potentially causing a temporary disruption to the backend infrastructure. Use with caution and don’t target against production environments. Bucket ID for API usage: `advanced`.
Test NameDescriptionDetectable Vulnerabilities
Lack of Resources and Rate LimitingTests all API endpoints for rate-limiting or resource exhaustion protection in place.Lack of Resources and Rate Limiting