ScannerVersionBuildVendor
JSky (Commercial Edition)3.5.1905NoSec

Tested Against WAVSEP Version:
1.2

The SQL Injection Detection Accuracy of the Scanner:
Detection AccuracyChart
61.03% Detection Rate
0.00% False Positives
(83/136)
(0/10)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)20 out of 20Cases Detected: 1(1st&2nd)-19
Errorneous 500 ResponsesHTTP POST (Body Parameters)18 out of 20Cases Detected: 1(1st&2nd)-5,7-15,17-19 Cases Missed: 6,16
Errorneous 200 ResponsesHTTP GET (Query String Parameters)20 out of 20Cases Detected: 1(1st&2nd)-19
Errorneous 200 ResponsesHTTP POST (Body Parameters)18 out of 20Cases Detected: 1(1st&2nd)-5,7-15,17-19 Cases Missed: 6,16
Valid 200 ResponsesHTTP GET (Query String Parameters)4 out of 20Cases Detected: 6,7,16,17 Cases Missed: 1(1st&2nd)-5,8-15,18,19
Valid 200 ResponsesHTTP POST (Body Parameters)2 out of 20Cases Detected: 7,17 Cases Missed: 1(1st&2nd)-6,8-16,18,19
Identical 200 ResponsesHTTP GET (Query String Parameters)1 out of 8Cases Detected: 1 Cases Missed: 2-8
Identical 200 ResponsesHTTP POST (Body Parameters)0 out of 8Cases Missed: 1-8
False Positive SQLi Test CasesHTTP GET (Query String Parameters)0 out of 10None

The Reflected XSS Detection Accuracy of the Scanner:
Detection AccuracyChart
50.00% Detection Rate
0.00% False Positives
(33/66)
(0/7)
Response TypeInput VectorDetection RateDetails
Reflected XSSHTTP GET (Query String Parameters)17 out of 33Cases Detected: 1-5,9,22-30(1st&2nd),32 Cases Missed: 6-8,10-21,31
Reflected XSSHTTP POST (Body Parameters)16 out of 33Cases Detected: 1-5,9,22-30(1st&2nd) Cases Missed: 6-8,10-21,31,32
False Positive RXSS Test CasesHTTP GET (Query String Parameters)0 out of 7None

The Local File Inclusion Detection Accuracy of the Scanner:
Detection AccuracyChart
48.53% Detection Rate
12.50% False Positives
(396/816)
(1/8)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60
Errorneous 500 ResponsesHTTP POST (Body Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60 (vs a special tescase version with action defined in forms, otherwise will not crawl)
Errorneous 200 ResponsesHTTP GET (Query String Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60
Errorneous 200 ResponsesHTTP POST (Body Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60 (vs a special tescase version with action defined in forms, otherwise will not crawl)
Valid 200 ResponsesHTTP GET (Query String Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60
Valid 200 ResponsesHTTP POST (Body Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60 (vs a special tescase version with action defined in forms, otherwise will not crawl)
Identical 200 ResponsesHTTP GET (Query String Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60
Identical 200 ResponsesHTTP POST (Body Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60 (vs a special tescase version with action defined in forms, otherwise will not crawl)
Redirect (302) ResponsesHTTP GET (Query String Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60
Redirect (302) ResponsesHTTP POST (Body Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60 (vs a special tescase version with action defined in forms, otherwise will not crawl)
Erroneous 404 ResponsesHTTP GET (Query String Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60
Erroneous 404 ResponsesHTTP POST (Body Parameters)33 out of 68Detected: 1-6,9-12,15-18,21,22,24,37-44,53-60 (vs a special tescase version with action defined in forms, otherwise will not crawl)
False Positive Lfi Test CasesHTTP GET (Query String Parameters)1 out of 8RFI test cases detected as LFI.

The Remote File Inclusion Detection Accuracy of the Scanner:
Detection AccuracyChart
22.22% Detection Rate
0.00% False Positives
(24/108)
(0/6)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)2 out of 9Detected: 1,3 (as LFI)
Errorneous 500 ResponsesHTTP POST (Body Parameters)2 out of 9Detected: 1,3 (as LFI, vs a special tescase version with action defined in forms)
Errorneous 200 ResponsesHTTP GET (Query String Parameters)2 out of 9Detected: 1,3 (as LFI)
Errorneous 200 ResponsesHTTP POST (Body Parameters)2 out of 9Detected: 1,3 (as LFI, vs a special tescase version with action defined in forms)
Valid 200 ResponsesHTTP GET (Query String Parameters)2 out of 9Detected: 1,3 (as LFI)
Valid 200 ResponsesHTTP POST (Body Parameters)2 out of 9Detected: 1,3 (as LFI, vs a special tescase version with action defined in forms)
Identical 200 ResponsesHTTP GET (Query String Parameters)2 out of 9Detected: 1,3 (as LFI)
Identical 200 ResponsesHTTP POST (Body Parameters)2 out of 9Detected: 1,3 (as LFI, vs a special tescase version with action defined in forms)
Redirect (302) ResponsesHTTP GET (Query String Parameters)2 out of 9Detected: 1,3 (as LFI)
Redirect (302) ResponsesHTTP POST (Body Parameters)2 out of 9Detected: 1,3 (as LFI, vs a special tescase version with action defined in forms)
Erroneous 404 ResponsesHTTP GET (Query String Parameters)2 out of 9Detected: 1,3 (as LFI)
Erroneous 404 ResponsesHTTP POST (Body Parameters)2 out of 9Detected: 1,3 (as LFI, vs a special tescase version with action defined in forms)
False Positive Rfi Test CasesHTTP GET (Query String Parameters)0 out of 6None

WAVSEP Scan Log:
The scans were executed with the following configuration:
"can go up", "Urls are case sensitive", "extract urls from javascript", 1-8 threads (1 for WIVET), "Crawl first and then scan", "Deeply execute javascript", and designated scan policy for each directory (custom policies for XSS / SQLi / LFI, which include all the relevant plugins).
In the case of LFI/RFI vulnerabilities, JSky did not detect any POST exposures at first, until I discovered the problem was related to a bug in the crawling mechanism which did not submit forms without an action property (and then created a version of the test cases that did use the action property).

The WIVET Score of the Scanner:
Detection AccuracyChart
44.0% Detection Rate

WIVET Scan Log:
Initialized WIVET's session, limited the spider threads to 1 single thread and removed any directory location restrictions from the scanner, defined a valid session identifier using the scan wizard, instructed the scaner to "deeply execute javascript", and finally, I edited menu.php in WIVET and excluded the logout URL (100.php).
I verified the results twice, and they came out the same.

Copyright © 2010-2016 by Shay Chen. All rights reserved.
Click here to learn how this information may be published or reused.