CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Project Report on Uncovering HTML Injection Vulnerabilities in Web Applications
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Agenda • Research • Data Collection • Impact Analysis • Recommendation • Abstract • Tools • Proof of Concept (PoC) • References
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Research • Website Details: • Name: Manage Engine • URL: https://manageengine.com • Category/Type: Computer-and-Internet-Info • Overall Ranking/Usage/Popularity: Low-Risk
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Data Collection: • Technology Stack: • Frontend: HTML, CSS, JavaScript • Backend: PHP • Database: MySQL • Web Server: Apache
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Impact Analysis: • HTML Injection vulnerabilities can have significant impacts, including: • Defacement: Attackers can modify the appearance of the website. • Phishing: Injected HTML can create fake login forms to steal user credentials. • Malicious Redirection: Users can be redirected to malicious sites. • Cookie Theft: JavaScript injection can steal cookies, leading to session hijacking.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Recommendation : To mitigate HTML Injection vulnerabilities, the following security measures should be implemented: • Input Validation: Validate and sanitize all user inputs on the server-side to ensure they do not contain any HTML tags or scripts. • Output Encoding: Encode data before displaying it on the web page to prevent the browser from interpreting it as HTML or JavaScript. • Content Security Policy (CSP): Implement a CSP to restrict the sources from which scripts and other resources can be loaded. • Regular Security Audits: Perform regular security audits and vulnerability assessments to identify and fix potential security issues. • Use Security Libraries: Utilize security libraries and frameworks that offer built-in protection against common web vulnerabilities.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Abstract: • The goal of this report is to identify and demonstrate the presence of an HTML Injection vulnerability on a specific website. HTML Injection occurs when an attacker can inject arbitrary HTML code into a web page due to improper input validation. This report includes a detailed analysis of the vulnerability, its impact, and recommendations for mitigating such security issues. Additionally, a Proof of Concept (PoC) is provided to demonstrate the exploit.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Tools: • Browser: Has used for manual testing • Burp Suite: has used for intercepting and modifying requests • Temp-mail: has used for generating temporary mails.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Proof of Concept (PoC): Capture Packets with BurpSuite:  open BurpSuite and set up the proxy.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.  Configure the browser to use BurpSuite’s proxy.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Navigate to the vulnerable website https://www.manageengine.com.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Go to support in that request a demo.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Now start the burp proxy to capture the http request from the website.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Turn on the intercept on the burp suite.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Get the temporary mail from https://temp-mail.org.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Fill all the required information in the given form and click on submit.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Go to the burp suite and search for the username in the captured request.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Copy this html line of code and paste it into the http request in burp suite.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Paste it in between the <h1></h1> in the username and replace “test.com” to “evil.com” send the request.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Turn off the interception in the burp suite.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Turn off the burp proxy.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Reload the vulnerable website page.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Go to the temp mail website and search for the inbox mail.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Open the mail which we received from vulnerable website.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Click on the given link address in the mail.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • And it redirected to the “evil.com”.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. References: OWASP HTML Injection HTML Injection Example
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Conclusion • The project successfully identified an HTML Injection vulnerability on the target website. The provided PoC demonstrates the exploit, and appropriate recommendations have been made to mitigate such vulnerabilities in the future. Proper input validation, output encoding, and security policies are crucial in protecting against HTML Injection attacks.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Questions ?
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Thank You!

Uncovering HTML Injection Vulnerabilities in Web Applications: A Comprehensive Analysis

  • 1.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Project Report on Uncovering HTML Injection Vulnerabilities in Web Applications
  • 2.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Agenda • Research • Data Collection • Impact Analysis • Recommendation • Abstract • Tools • Proof of Concept (PoC) • References
  • 3.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Research • Website Details: • Name: Manage Engine • URL: https://manageengine.com • Category/Type: Computer-and-Internet-Info • Overall Ranking/Usage/Popularity: Low-Risk
  • 4.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Data Collection: • Technology Stack: • Frontend: HTML, CSS, JavaScript • Backend: PHP • Database: MySQL • Web Server: Apache
  • 5.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Impact Analysis: • HTML Injection vulnerabilities can have significant impacts, including: • Defacement: Attackers can modify the appearance of the website. • Phishing: Injected HTML can create fake login forms to steal user credentials. • Malicious Redirection: Users can be redirected to malicious sites. • Cookie Theft: JavaScript injection can steal cookies, leading to session hijacking.
  • 6.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Recommendation : To mitigate HTML Injection vulnerabilities, the following security measures should be implemented: • Input Validation: Validate and sanitize all user inputs on the server-side to ensure they do not contain any HTML tags or scripts. • Output Encoding: Encode data before displaying it on the web page to prevent the browser from interpreting it as HTML or JavaScript. • Content Security Policy (CSP): Implement a CSP to restrict the sources from which scripts and other resources can be loaded. • Regular Security Audits: Perform regular security audits and vulnerability assessments to identify and fix potential security issues. • Use Security Libraries: Utilize security libraries and frameworks that offer built-in protection against common web vulnerabilities.
  • 7.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Abstract: • The goal of this report is to identify and demonstrate the presence of an HTML Injection vulnerability on a specific website. HTML Injection occurs when an attacker can inject arbitrary HTML code into a web page due to improper input validation. This report includes a detailed analysis of the vulnerability, its impact, and recommendations for mitigating such security issues. Additionally, a Proof of Concept (PoC) is provided to demonstrate the exploit.
  • 8.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Tools: • Browser: Has used for manual testing • Burp Suite: has used for intercepting and modifying requests • Temp-mail: has used for generating temporary mails.
  • 9.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Proof of Concept (PoC): Capture Packets with BurpSuite:  open BurpSuite and set up the proxy.
  • 10.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.  Configure the browser to use BurpSuite’s proxy.
  • 11.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 12.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Navigate to the vulnerable website https://www.manageengine.com.
  • 13.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Go to support in that request a demo.
  • 14.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Now start the burp proxy to capture the http request from the website.
  • 15.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Turn on the intercept on the burp suite.
  • 16.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Get the temporary mail from https://temp-mail.org.
  • 17.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Fill all the required information in the given form and click on submit.
  • 18.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Go to the burp suite and search for the username in the captured request.
  • 19.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Copy this html line of code and paste it into the http request in burp suite.
  • 20.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Paste it in between the <h1></h1> in the username and replace “test.com” to “evil.com” send the request.
  • 21.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Turn off the interception in the burp suite.
  • 22.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Turn off the burp proxy.
  • 23.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Reload the vulnerable website page.
  • 24.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Go to the temp mail website and search for the inbox mail.
  • 25.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Open the mail which we received from vulnerable website.
  • 26.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 27.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Click on the given link address in the mail.
  • 28.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • And it redirected to the “evil.com”.
  • 29.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. References: OWASP HTML Injection HTML Injection Example
  • 30.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Conclusion • The project successfully identified an HTML Injection vulnerability on the target website. The provided PoC demonstrates the exploit, and appropriate recommendations have been made to mitigate such vulnerabilities in the future. Proper input validation, output encoding, and security policies are crucial in protecting against HTML Injection attacks.
  • 31.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Questions ?
  • 32.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Thank You!