DenRomano
Verified User
The scan service we use reported the following
Description: HTML page uses cleartext form-based authentication (/)
www.domain-name.com xxx.xxx.xxx.xxx Feb 23 17:31:02 2011newS everity: Potential
Problem 2.62736new11Impact: Poor authentication practices may leave the web
application vulnerable to authentication attacks. Background: Some web applications
perform authentication by requiring a user to enter a login and password into an
HTML form. This type of authentication is achieved using the HTML INPUT element with
the type attribute set to password. Resolution To use HTML form-based authentication
more securely in web applications , do the following: Remove the value attribute from
the INPUT tag corresponding to the password field. Submit all forms to an SSL enabled
(https ) service using the form's action attribute. Place all protected web
directories on an SSL-enabled (https ) service. Use the autocomplete="off" attribute in
the INPUT tag corresponding to the password field. Vulnerability Details: Service:
2222:TCP Received: <input type=password name=password></td></tr>
Description: HTML page uses cleartext form-based authentication (/)
www.domain-name.com xxx.xxx.xxx.xxx Feb 23 17:31:02 2011newS everity: Potential
Problem 2.62736new11Impact: Poor authentication practices may leave the web
application vulnerable to authentication attacks. Background: Some web applications
perform authentication by requiring a user to enter a login and password into an
HTML form. This type of authentication is achieved using the HTML INPUT element with
the type attribute set to password. Resolution To use HTML form-based authentication
more securely in web applications , do the following: Remove the value attribute from
the INPUT tag corresponding to the password field. Submit all forms to an SSL enabled
(https ) service using the form's action attribute. Place all protected web
directories on an SSL-enabled (https ) service. Use the autocomplete="off" attribute in
the INPUT tag corresponding to the password field. Vulnerability Details: Service:
2222:TCP Received: <input type=password name=password></td></tr>