Burp Scanner Report

Summary

The table below shows the numbers of issues identified in different categories. Issues are classified according to severity as High, Medium, Low or Information. This reflects the likely impact of each issue for a typical organization. Issues are also classified according to confidence as Certain, Firm or Tentative. This reflects the inherent reliability of the technique that was used to identify the issue.

    Confidence
    Certain Firm Tentative Total
Severity High 0 0 0 0
Medium 0 0 0 0
Low 12 8 1 21
Information 9 1 0 10

The chart below shows the aggregated numbers of issues identified in each category. Solid colored bars represent issues with a confidence level of Certain, and the bars fade as the confidence level falls.

    Number of issues
    0 5 10 15 20
Severity High
 
Medium
 
Low
 

Contents

1. Open redirection (DOM-based)

2. Password field with autocomplete enabled

3. Content type incorrectly stated

3.1. https://mp.ybx.greatcai.com/

3.2. https://mp.ybx.greatcai.com/CarApplication/CarApplicationQuery

3.3. https://mp.ybx.greatcai.com/ExpenseSettlement/Index

3.4. https://mp.ybx.greatcai.com/Login/LoginSMSCodeCheck

3.5. https://mp.ybx.greatcai.com/Login/SendLoginSMSCode

3.6. https://mp.ybx.greatcai.com/fonts/glyphicons-halflings-regular.woff2

3.7. https://mp.ybx.greatcai.com/login/tabmain

3.8. https://mp.ybx.greatcai.com/main

4. Strict transport security not enforced

4.1. https://file.ybx.greatcai.com/Attachments/G4000222/OrganizationFile/2022/09/21/426ab68ee8f84a8bbdb4245bcf39f858.png

4.2. https://mp.ybx.greatcai.com/

4.3. https://mp.ybx.greatcai.com/Assets/bootstrap-datetimepicker/js/bootstrap-datetimepicker.zh-CN.js

4.4. https://mp.ybx.greatcai.com/Content/base.css

4.5. https://mp.ybx.greatcai.com/Login

4.6. https://mp.ybx.greatcai.com/Login/LoginSMSCodeCheck

4.7. https://mp.ybx.greatcai.com/Login/Main

4.8. https://mp.ybx.greatcai.com/Login/SendLoginSMSCode

4.9. https://mp.ybx.greatcai.com/Scripts/Common.js

4.10. https://mp.ybx.greatcai.com/Scripts/fileinput_locale_zh.js

4.11. https://mp.ybx.greatcai.com/content/styles/admin.main.css

5. Frameable response (potential Clickjacking)

6. Cacheable HTTPS response

6.1. https://mp.ybx.greatcai.com/

6.2. https://mp.ybx.greatcai.com/Base/TimerMessage

6.3. https://mp.ybx.greatcai.com/Login

6.4. https://mp.ybx.greatcai.com/Login/LoginSMSCodeCheck

6.5. https://mp.ybx.greatcai.com/Login/Main

6.6. https://mp.ybx.greatcai.com/Login/SendLoginSMSCode

6.7. https://mp.ybx.greatcai.com/fonts/glyphicons-halflings-regular.woff2

6.8. https://mp.ybx.greatcai.com/login/tabmain

6.9. https://mp.ybx.greatcai.com/main


1. Open redirection (DOM-based)
Next

Summary

Severity:   Low
Confidence:   Tentative
Host:   https://mp.ybx.greatcai.com
Path:   /Login/Main

Issue detail

The application may be vulnerable to DOM-based open redirection. Data is read from location.href and passed to xhr.open.

Issue background

DOM-based vulnerabilities arise when a client-side script reads data from a controllable part of the DOM (for example, the URL) and processes this data in an unsafe way.

DOM-based open redirection arises when a script writes controllable data into the target of a redirection in an unsafe way. An attacker may be able to use the vulnerability to construct a URL that, if visited by another application user, will cause a redirection to an arbitrary external domain. This behavior can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targeting the correct domain and with a valid SSL certificate (if SSL is used), lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.

Note: If an attacker is able to control the start of the string that is passed to the redirection API, then it may be possible to escalate this vulnerability into a JavaScript injection attack, by using a URL with the javascript: pseudo-protocol to execute arbitrary script code when the URL is processed by the browser.

Burp Suite automatically identifies this issue using static code analysis, which may lead to false positives that are not actually exploitable. The relevant code and execution paths should be reviewed to determine whether this vulnerability is indeed present, or whether mitigations are in place that would prevent exploitation.

Issue remediation

The most effective way to avoid DOM-based open redirection vulnerabilities is not to dynamically set redirection targets using data that originated from any untrusted source. If the desired functionality of the application means that this behavior is unavoidable, then defenses must be implemented within the client-side code to prevent malicious data from introducing an arbitrary URL as a redirection target. In general, this is best achieved by using a whitelist of URLs that are permitted redirection targets, and strictly validating the target against this list before performing the redirection.

Vulnerability classifications

Request

GET /Login/Main HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:35 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: fd94206,-
X-Cache: bypass
Content-Length: 158903


<!DOCTYPE html>

<html lang="en" style="height: 100%;overflow-y: hidden;">
<head>
<meta charset="utf-8" />
<title>.....................</title>
<meta content="width=device-wi
...[SNIP]...

Dynamic analysis

Data is read from location.href and passed to xhr.open.

The following value was injected into the source:

https://mp.ybx.greatcai.com/Login/Main?temy40=temy40%27%22`'"/temy40/><temy40/\>wz937v&

The previous value reached the sink as:

https://mp.ybx.greatcai.com/Login/Main?temy40=temy40%27%22`'"/temy40/><temy40/\>wz937v&&X-Requested-With=XMLHttpRequest

The stack trace at the source was:

at Object.get href [as href] (<anonymous>:1695:56)
at ajax (https://mp.ybx.greatcai.com/Scripts/jquery-3.1.1.min.js:4:12029)
at Proxy.$.ajax (https://mp.ybx.greatcai.com/Scripts/Common.js:4554:16)
at asyncRequest (https://mp.ybx.greatcai.com/Scripts/jquery.unobtrusive-ajax.js:121:11)
at HTMLAnchorElement.<anonymous> (https://mp.ybx.greatcai.com/Scripts/jquery.unobtrusive-ajax.js:131:9)
at HTMLDocument.dispatch (https://mp.ybx.greatcai.com/Scripts/jquery-3.1.1.min.js:3:10315)
at HTMLDocument.q.handle (https://mp.ybx.greatcai.com/Scripts/jquery-3.1.1.min.js:3:8342)
at createMouseEvent (<anonymous>:2869:17)
at ready (<anonymous>:2986:25)

The stack trace at the sink was:

at XMLHttpRequest.win.XMLHttpRequest.open (<anonymous>:1788:21)
at Object.send (https://mp.ybx.greatcai.com/Scripts/jquery-3.1.1.min.js:4:16016)
at ajax (https://mp.ybx.greatcai.com/Scripts/jquery-3.1.1.min.js:4:13670)
at Proxy.$.ajax (https://mp.ybx.greatcai.com/Scripts/Common.js:4554:16)
at asyncRequest (https://mp.ybx.greatcai.com/Scripts/jquery.unobtrusive-ajax.js:121:11)
at HTMLAnchorElement.<anonymous> (https://mp.ybx.greatcai.com/Scripts/jquery.unobtrusive-ajax.js:131:9)
at HTMLDocument.dispatch (https://mp.ybx.greatcai.com/Scripts/jquery-3.1.1.min.js:3:10315)
at HTMLDocument.q.handle (https://mp.ybx.greatcai.com/Scripts/jquery-3.1.1.min.js:3:8342)
at createMouseEvent (<anonymous>:2869:17)
at ready (<anonymous>:2986:25)
2. Password field with autocomplete enabled
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Login

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Issue background

Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications that employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.

The stored credentials can be captured by an attacker who gains control over the user's computer. Further, an attacker who finds a separate application vulnerability such as cross-site scripting may be able to exploit this to retrieve a user's browser-stored credentials.

Issue remediation

To prevent browsers from storing credentials entered into HTML forms, include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).

Please note that modern web browsers may ignore this directive. In spite of this there is a chance that not disabling autocomplete may cause problems obtaining PCI compliance.

Vulnerability classifications

Request

POST /Login HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
Content-Length: 63
Cache-Control: max-age=0
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
Origin: https://mp.ybx.greatcai.com
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

userName=songjj%40YBX&password=E8F8A55DB55D265B7963468366037E06

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:20:51 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass
Content-Length: 8384


<!DOCTYPE html>

<html>
<head>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width" />
<meta http-equiv="X-UA-Compatible" content="IE=11" />
<titl
...[SNIP]...
<ul class="input_postion">
<form action="/Login" method="post"> <li>
...[SNIP]...
<img src="/images/password.png" style="width:24px;" />
<input class="m-wrap placeholder-no-fix" data-val="true" data-val-required=".................." id="password" name="password" placeholder="......" type="password" value="" />
</li>
...[SNIP]...
3. Content type incorrectly stated
Previous  Next

There are 8 instances of this issue:

Issue background

If a response specifies an incorrect content type then browsers may process the response in unexpected ways. If the content type is specified to be a renderable text-based format, then the browser will usually attempt to interpret the response as being in that format, regardless of the actual contents of the response. Additionally, some other specified content types might sometimes be interpreted as HTML due to quirks in particular browsers. This behavior might lead to otherwise "safe" content such as images being rendered as HTML, enabling cross-site scripting attacks in certain conditions.

The presence of an incorrect content type statement typically only constitutes a security flaw when the affected resource is dynamically generated, uploaded by a user, or otherwise contains user input. You should review the contents of affected responses, and the context in which they appear, to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header that correctly and unambiguously states the MIME type of the content in the response body.

Additionally, the response header "X-content-type-options: nosniff" should be returned in all responses to reduce the likelihood that browsers will interpret content in a way that disregards the Content-type header.

Vulnerability classifications



3.1. https://mp.ybx.greatcai.com/
Next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://mp.ybx.greatcai.com
Path:   /

Issue detail

The response states that the content type is text/html. However, it actually appears to contain unrecognized content.

All browsers may interpret the response as HTML.This issue was found in multiple locations under the reported path.

Request

GET /Policy/DownloadLog HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: text/html, */*; q=0.01
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/login/tabmain?url=%2fpolicy%2fdownloadlog
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:24:09 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 0be137b,-
X-Cache: bypass
Content-Length: 347652


<div id="divStatusSearchDoing" style="filter: alpha(opacity=30); -moz-opacity: 0.3; opacity: 0.3;
width: 100%; height: 100%; z-index: 1200; position: absolute;

...[SNIP]...
3.2. https://mp.ybx.greatcai.com/CarApplication/CarApplicationQuery
Previous  Next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://mp.ybx.greatcai.com
Path:   /CarApplication/CarApplicationQuery

Issue detail

The response states that the content type is text/html. However, it actually appears to contain unrecognized content.

All browsers may interpret the response as HTML.

Request

GET /CarApplication/CarApplicationQuery HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: text/html, */*; q=0.01
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/login/tabmain?url=%2fcarapplication%2fcarapplicationquery
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:59 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 0be137b,-
X-Cache: bypass
Content-Length: 135933


<script src="/Scripts/Common.js"></script>
<!--JS............-->
<script src="/Scripts/CryptoJS/rollups/aes.js"></script>
<script src="/Scripts/CryptoJS/components/mode-ecb-min.js"></script>
<
...[SNIP]...
3.3. https://mp.ybx.greatcai.com/ExpenseSettlement/Index
Previous  Next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://mp.ybx.greatcai.com
Path:   /ExpenseSettlement/Index

Issue detail

The response states that the content type is text/html. However, it actually appears to contain unrecognized content.

All browsers may interpret the response as HTML.

Request

GET /ExpenseSettlement/Index HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: text/html, */*; q=0.01
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/login/tabmain?url=%2fexpensesettlement%2findex
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:22:03 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass
Content-Length: 618879


<style>
.cusWarn {
background-color: yellow !IMPORTANT;
}

.bureauLabel {
text-align: right;
padding-top: 7px;
}
</style>


<d
...[SNIP]...
3.4. https://mp.ybx.greatcai.com/Login/LoginSMSCodeCheck
Previous  Next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://mp.ybx.greatcai.com
Path:   /Login/LoginSMSCodeCheck

Issue detail

The response states that the content type is text/html. However, it actually appears to contain unrecognized content.

All browsers may interpret the response as HTML.

Request

POST /Login/LoginSMSCodeCheck HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
Content-Length: 11
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: application/json, text/javascript, */*; q=0.01
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Origin: https://mp.ybx.greatcai.com
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

code=329586

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:34 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 43
Connection: close
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass

{"status":true,"message":"..............."}
3.5. https://mp.ybx.greatcai.com/Login/SendLoginSMSCode
Previous  Next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://mp.ybx.greatcai.com
Path:   /Login/SendLoginSMSCode

Issue detail

The response states that the content type is text/html. However, it actually appears to contain unrecognized content.

All browsers may interpret the response as HTML.

Request

POST /Login/SendLoginSMSCode HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
Content-Length: 0
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Origin: https://mp.ybx.greatcai.com
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:00 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 52
Connection: close
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 8b19e79,-
X-Cache: bypass

{"status":true,"message":"........................"}
3.6. https://mp.ybx.greatcai.com/fonts/glyphicons-halflings-regular.woff2
Previous  Next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://mp.ybx.greatcai.com
Path:   /fonts/glyphicons-halflings-regular.woff2

Issue detail

The response states that the content type is application/font-woff2. However, it actually appears to contain unrecognized content.

If the URL path can be manipulated to end with ".html", the following browsers may interpret the response as HTML:

Request

GET /fonts/glyphicons-halflings-regular.woff2 HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Origin: https://mp.ybx.greatcai.com
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Accept: */*
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: font
Referer: https://mp.ybx.greatcai.com/Content/bootstrap.min.css
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:38 GMT
Content-Type: application/font-woff2
Content-Length: 18028
Connection: close
Last-Modified: Thu, 16 Apr 2020 09:51:37 GMT
Accept-Ranges: bytes
ETag: "201f229fd413d61:0"
X-Via-JSL: 0be137b,-
X-Cache: bypass

wOF2......Fl.......\..F    ...M....................?FFTM.. .`..r....
..$..e.6.$..t..0.. .."..Q?webf..e.5.....@..?...
... ..t............,3+.2q.F..YO...&>...b.m.5.Z..H$..Y....{.H    jd.......%....y"......+
...[SNIP]...
3.7. https://mp.ybx.greatcai.com/login/tabmain
Previous  Next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://mp.ybx.greatcai.com
Path:   /login/tabmain

Issue detail

The response states that the content type is text/html. However, it actually appears to contain unrecognized content.

All browsers may interpret the response as HTML.

Request

GET /login/tabmain?url=%2fmain HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-Dest: iframe
Referer: https://mp.ybx.greatcai.com/Login/Main
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:40 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass
Content-Length: 13650


<link href="/Content/bootstrap.min.css" rel="stylesheet" />
<link href="/Content/bootstrapdiy.css" rel="stylesheet" />
<link href="/Content/base.css" rel="stylesheet" />
<link rel="stylesheet"
...[SNIP]...
3.8. https://mp.ybx.greatcai.com/main
Previous  Next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://mp.ybx.greatcai.com
Path:   /main

Issue detail

The response states that the content type is text/html. However, it actually appears to contain unrecognized content.

All browsers may interpret the response as HTML.

Request

GET /main HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: text/html, */*; q=0.01
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/login/tabmain?url=%2fmain
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:41 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass
Content-Length: 20352


<div class="col-md-12">
<div class="ol-header">
<i class="glyphicon glyphicon-th" style="top:1px"></i>
............
</div>
<div style="clear:both;"></div>
<di
...[SNIP]...
4. Strict transport security not enforced
Previous  Next

There are 11 instances of this issue:

Issue description

The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption, and use the application as a platform for attacks against its users. This attack is performed by rewriting HTTPS links as HTTP, so that if a targeted user follows a link to the site from an HTTP page, their browser never attempts to use an encrypted connection. The sslstrip tool automates this process.

To exploit this vulnerability, an attacker must be suitably positioned to intercept and modify the victim's network traffic.This scenario typically occurs when a client communicates with the server over an insecure connection such as public Wi-Fi, or a corporate or home network that is shared with a compromised computer. Common defenses such as switched networks are not sufficient to prevent this. An attacker situated in the user's ISP or the application's hosting infrastructure could also perform this attack. Note that an advanced adversary could potentially target any connection made over the Internet's core infrastructure.

Issue remediation

The application should instruct web browsers to only access the application using HTTPS. To do this, enable HTTP Strict Transport Security (HSTS) by adding a response header with the name 'Strict-Transport-Security' and the value 'max-age=expireTime', where expireTime is the time in seconds that browsers should remember that the site should only be accessed using HTTPS. Consider adding the 'includeSubDomains' flag if appropriate.

Note that because HSTS is a "trust on first use" (TOFU) protocol, a user who has never accessed the application will never have seen the HSTS header, and will therefore still be vulnerable to SSL stripping attacks. To mitigate this risk, you can optionally add the 'preload' flag to the HSTS header, and submit the domain for review by browser vendors.

References

Vulnerability classifications



4.1. https://file.ybx.greatcai.com/Attachments/G4000222/OrganizationFile/2022/09/21/426ab68ee8f84a8bbdb4245bcf39f858.png
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://file.ybx.greatcai.com
Path:   /Attachments/G4000222/OrganizationFile/2022/09/21/426ab68ee8f84a8bbdb4245bcf39f858.png

Request

GET /Attachments/G4000222/OrganizationFile/2022/09/21/426ab68ee8f84a8bbdb4245bcf39f858.png HTTP/1.1
Host: file.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Sec-Fetch-Site: same-site
Sec-Fetch-Mode: no-cors
Sec-Fetch-Dest: image
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=0ae1f4574daafc3cd9093e2f08ba08fc

Response

HTTP/1.1 404 Not Found
Date: Tue, 30 Apr 2024 03:20:51 GMT
Content-Type: text/html; charset=us-ascii
Connection: close
Vary: Accept-Encoding
X-Via-JSL: 0be137b,-
X-Cache: bypass
Content-Length: 315

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd">
<HTML><HEAD><TITLE>Not Found</TITLE>
<META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"><
...[SNIP]...
4.2. https://mp.ybx.greatcai.com/
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /

Issue detail

This issue was found in multiple locations under the reported path.

Request

GET /Scripts/Common/fileOpt.js HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Accept: */*
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: no-cors
Sec-Fetch-Dest: script
Referer: https://mp.ybx.greatcai.com/Login/Main
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:37 GMT
Content-Type: application/javascript
Content-Length: 27574
Connection: close
Vary: Accept-Encoding
Last-Modified: Thu, 20 Jul 2023 01:52:38 GMT
Accept-Ranges: bytes
ETag: "0f775dcacbad91:0"
Vary: Accept-Encoding
X-Via-JSL: 908f2cc,-
X-Cache: bypass

...//.....................
//.........:.........
//...............2018-9-6
//...............
//obj ...........................
//config ....................................... ...................
...[SNIP]...
4.3. https://mp.ybx.greatcai.com/Assets/bootstrap-datetimepicker/js/bootstrap-datetimepicker.zh-CN.js
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Assets/bootstrap-datetimepicker/js/bootstrap-datetimepicker.zh-CN.js

Request

GET /Assets/bootstrap-datetimepicker/js/bootstrap-datetimepicker.zh-CN.js HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Accept: */*
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: no-cors
Sec-Fetch-Dest: script
Referer: https://mp.ybx.greatcai.com/Login/Main
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:36 GMT
Content-Type: application/javascript
Connection: close
Vary: Accept-Encoding
Last-Modified: Thu, 16 Apr 2020 09:52:18 GMT
ETag: W/"856f24b7d413d61:0"
X-Via-JSL: fd94206,-
X-Cache: bypass
Content-Length: 850

/**
* Simplified Chinese translation for bootstrap-datetimepicker
* Yuan Cheung <advanimal@gmail.com>
*/
;(function($){
   $.fn.datetimepicker.dates['zh-CN'] = {
           days: [".........", ".........", "
...[SNIP]...
4.4. https://mp.ybx.greatcai.com/Content/base.css
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Content/base.css

Request

GET /Content/base.css HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Accept: text/css,*/*;q=0.1
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: no-cors
Sec-Fetch-Dest: style
Referer: https://mp.ybx.greatcai.com/Login/Main
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:35 GMT
Content-Type: text/css
Connection: close
Vary: Accept-Encoding
Last-Modified: Thu, 16 Apr 2020 09:52:22 GMT
ETag: W/"eb2c92b9d413d61:0"
X-Via-JSL: fd94206,-
X-Cache: bypass
Content-Length: 4625


/*
* Sidebar
*/

/* Hide for mobile, show later */
.ol-header{
background-color: #C9E2FD;
display: inline-block;
margin: 5px;
padding: 5px 10px;
box-shadow: 2px 2px 5
...[SNIP]...
4.5. https://mp.ybx.greatcai.com/Login
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Login

Request

POST /Login HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
Content-Length: 63
Cache-Control: max-age=0
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
Origin: https://mp.ybx.greatcai.com
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

userName=songjj%40YBX&password=E8F8A55DB55D265B7963468366037E06

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:20:51 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass
Content-Length: 8384


<!DOCTYPE html>

<html>
<head>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width" />
<meta http-equiv="X-UA-Compatible" content="IE=11" />
<titl
...[SNIP]...
4.6. https://mp.ybx.greatcai.com/Login/LoginSMSCodeCheck
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Login/LoginSMSCodeCheck

Request

POST /Login/LoginSMSCodeCheck HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
Content-Length: 11
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: application/json, text/javascript, */*; q=0.01
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Origin: https://mp.ybx.greatcai.com
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

code=329586

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:34 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 43
Connection: close
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass

{"status":true,"message":"..............."}
4.7. https://mp.ybx.greatcai.com/Login/Main
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Login/Main

Request

GET /Login/Main HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:35 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: fd94206,-
X-Cache: bypass
Content-Length: 158903


<!DOCTYPE html>

<html lang="en" style="height: 100%;overflow-y: hidden;">
<head>
<meta charset="utf-8" />
<title>.....................</title>
<meta content="width=device-wi
...[SNIP]...
4.8. https://mp.ybx.greatcai.com/Login/SendLoginSMSCode
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Login/SendLoginSMSCode

Request

POST /Login/SendLoginSMSCode HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
Content-Length: 0
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Origin: https://mp.ybx.greatcai.com
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:00 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 52
Connection: close
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 8b19e79,-
X-Cache: bypass

{"status":true,"message":"........................"}
4.9. https://mp.ybx.greatcai.com/Scripts/Common.js
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Scripts/Common.js

Request

GET /Scripts/Common.js HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Accept: */*
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: no-cors
Sec-Fetch-Dest: script
Referer: https://mp.ybx.greatcai.com/Login/Main
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:36 GMT
Content-Type: application/javascript
Content-Length: 213735
Connection: close
Vary: Accept-Encoding
Last-Modified: Thu, 02 Nov 2023 06:40:22 GMT
Accept-Ranges: bytes
ETag: "0ffb7357dda1:0"
Vary: Accept-Encoding
X-Via-JSL: 908f2cc,-
X-Cache: bypass

...
// JScript ......
var className = "ClassName";
var browseWidth = "300";
var browseHeight = "200";

//....................................
function GetCtrPageTop(ctr) {
var ctrPageTop =
...[SNIP]...
4.10. https://mp.ybx.greatcai.com/Scripts/fileinput_locale_zh.js
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Scripts/fileinput_locale_zh.js

Request

GET /Scripts/fileinput_locale_zh.js HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Accept: */*
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: no-cors
Sec-Fetch-Dest: script
Referer: https://mp.ybx.greatcai.com/Login/Main
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:37 GMT
Content-Type: application/javascript
Content-Length: 3248
Connection: close
Vary: Accept-Encoding
Last-Modified: Thu, 21 May 2020 09:22:52 GMT
Accept-Ranges: bytes
ETag: "0fef166512fd61:0"
Vary: Accept-Encoding
X-Via-JSL: ec63fa5,-
X-Cache: bypass

/*!
* FileInput Chinese Translations
*
* This file must be loaded after 'fileinput.js'. Patterns in braces '{}', or
* any HTML markup tags in the messages must not be converted or translated.
...[SNIP]...
4.11. https://mp.ybx.greatcai.com/content/styles/admin.main.css
Previous  Next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /content/styles/admin.main.css

Request

GET /content/styles/admin.main.css HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Accept: text/css,*/*;q=0.1
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: no-cors
Sec-Fetch-Dest: style
Referer: https://mp.ybx.greatcai.com/Login/Main
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:36 GMT
Content-Type: text/css
Connection: close
Vary: Accept-Encoding
Last-Modified: Thu, 16 Apr 2020 09:52:22 GMT
ETag: W/"ba292b9d413d61:0"
X-Via-JSL: 2d38dcb,-
X-Cache: bypass
Content-Length: 2021

...html, body, div, span, input, p,h1, h2, h3, h4, h5, h6, blockquote, a, abbr, acronym, address, strong, b, u, i, center,dl, dt, dd, ol, ul,td,tr
{
font-family:"Microsoft Yahei","............",
...[SNIP]...
5. Frameable response (potential Clickjacking)
Previous  Next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://mp.ybx.greatcai.com
Path:   /Login/Main

Issue description

If a page fails to set an appropriate X-Frame-Options or Content-Security-Policy HTTP header, it might be possible for a page controlled by an attacker to load it within an iframe. This may enable a clickjacking attack, in which the attacker's page overlays the target application's interface with a different interface provided by the attacker. By inducing victim users to perform actions such as mouse clicks and keystrokes, the attacker can cause them to unwittingly carry out actions within the application that is being targeted. This technique allows the attacker to circumvent defenses against cross-site request forgery, and may result in unauthorized actions.

Note that some applications attempt to prevent these attacks from within the HTML page itself, using "framebusting" code. However, this type of defense is normally ineffective and can usually be circumvented by a skilled attacker.

You should determine whether any functions accessible within frameable pages can be used by application users to perform any sensitive actions within the application.

Issue remediation

To effectively prevent framing attacks, the application should return a response header with the name X-Frame-Options and the value DENY to prevent framing altogether, or the value SAMEORIGIN to allow framing only by pages on the same origin as the response itself. Note that the SAMEORIGIN header can be partially bypassed if the application itself can be made to frame untrusted websites.

References

Vulnerability classifications

Request

GET /Login/Main HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:35 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: fd94206,-
X-Cache: bypass
Content-Length: 158903


<!DOCTYPE html>

<html lang="en" style="height: 100%;overflow-y: hidden;">
<head>
<meta charset="utf-8" />
<title>.....................</title>
<meta content="width=device-wi
...[SNIP]...
6. Cacheable HTTPS response
Previous

There are 9 instances of this issue:

Issue background

Unless directed otherwise, browsers may store a local cached copy of content received from web servers. Some browsers, including Internet Explorer, cache content accessed via HTTPS. If sensitive information in application responses is stored in the local cache, then this may be retrieved by other users who have access to the same computer at a future time.

Issue remediation

Applications should return caching directives instructing browsers not to store local copies of any sensitive data. Often, this can be achieved by configuring the web server to prevent caching for relevant paths within the web root. Alternatively, most web development platforms allow you to control the server's caching directives from within individual scripts. Ideally, the web server should return the following HTTP headers in all responses containing sensitive content:

Vulnerability classifications



6.1. https://mp.ybx.greatcai.com/
Previous  Next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /

Issue detail

This issue was found in multiple locations under the reported path.

Request 1

GET /Login/Main?X-Requested-With=XMLHttpRequest HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: */*
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/Login/Main
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response 1

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:44 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: fd94206,-
X-Cache: bypass
Content-Length: 158903


<!DOCTYPE html>

<html lang="en" style="height: 100%;overflow-y: hidden;">
<head>
<meta charset="utf-8" />
<title>.....................</title>
<meta content="width=device-wi
...[SNIP]...

Request 2

GET /login/tabmain?url=%2fmain&X-Requested-With=XMLHttpRequest HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: */*
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/login/tabmain?url=%2fmain
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response 2

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:44 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: fd94206,-
X-Cache: bypass
Content-Length: 13650


<link href="/Content/bootstrap.min.css" rel="stylesheet" />
<link href="/Content/bootstrapdiy.css" rel="stylesheet" />
<link href="/Content/base.css" rel="stylesheet" />
<link rel="stylesheet"
...[SNIP]...
6.2. https://mp.ybx.greatcai.com/Base/TimerMessage
Previous  Next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Base/TimerMessage

Request 1

POST /Base/TimerMessage HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
Content-Length: 0
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Origin: https://mp.ybx.greatcai.com
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/Login/Main
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response 1

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:42 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: ec63fa5,-
X-Cache: bypass
Content-Length: 260

{"status":true,"message":null,"flag":null,"data":{"contractList":[],"insuerBrandPassWordList":[],"batchOperationList":[],"orgBalanceList":[],"orgBalanceNotEnoughList":[],"appList":[],"msgList":[],"set
...[SNIP]...
6.3. https://mp.ybx.greatcai.com/Login
Previous  Next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Login

Request 1

POST /Login HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
Content-Length: 63
Cache-Control: max-age=0
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
Origin: https://mp.ybx.greatcai.com
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

userName=songjj%40YBX&password=E8F8A55DB55D265B7963468366037E06

Response 1

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:20:51 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass
Content-Length: 8384


<!DOCTYPE html>

<html>
<head>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width" />
<meta http-equiv="X-UA-Compatible" content="IE=11" />
<titl
...[SNIP]...
6.4. https://mp.ybx.greatcai.com/Login/LoginSMSCodeCheck
Previous  Next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Login/LoginSMSCodeCheck

Request 1

POST /Login/LoginSMSCodeCheck HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
Content-Length: 11
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: application/json, text/javascript, */*; q=0.01
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Origin: https://mp.ybx.greatcai.com
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

code=329586

Response 1

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:34 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 43
Connection: close
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass

{"status":true,"message":"..............."}
6.5. https://mp.ybx.greatcai.com/Login/Main
Previous  Next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Login/Main

Request 1

GET /Login/Main HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response 1

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:35 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: fd94206,-
X-Cache: bypass
Content-Length: 158903


<!DOCTYPE html>

<html lang="en" style="height: 100%;overflow-y: hidden;">
<head>
<meta charset="utf-8" />
<title>.....................</title>
<meta content="width=device-wi
...[SNIP]...
6.6. https://mp.ybx.greatcai.com/Login/SendLoginSMSCode
Previous  Next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /Login/SendLoginSMSCode

Request 1

POST /Login/SendLoginSMSCode HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
Content-Length: 0
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Origin: https://mp.ybx.greatcai.com
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/Login
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response 1

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:00 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 52
Connection: close
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 8b19e79,-
X-Cache: bypass

{"status":true,"message":"........................"}
6.7. https://mp.ybx.greatcai.com/fonts/glyphicons-halflings-regular.woff2
Previous  Next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /fonts/glyphicons-halflings-regular.woff2

Request 1

GET /fonts/glyphicons-halflings-regular.woff2 HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Origin: https://mp.ybx.greatcai.com
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Accept: */*
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: font
Referer: https://mp.ybx.greatcai.com/Content/bootstrap.min.css
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response 1

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:38 GMT
Content-Type: application/font-woff2
Content-Length: 18028
Connection: close
Last-Modified: Thu, 16 Apr 2020 09:51:37 GMT
Accept-Ranges: bytes
ETag: "201f229fd413d61:0"
X-Via-JSL: 0be137b,-
X-Cache: bypass

wOF2......Fl.......\..F    ...M....................?FFTM.. .`..r....
..$..e.6.$..t..0.. .."..Q?webf..e.5.....@..?...
... ..t............,3+.2q.F..YO...&>...b.m.5.Z..H$..Y....{.H    jd.......%....y"......+
...[SNIP]...
6.8. https://mp.ybx.greatcai.com/login/tabmain
Previous  Next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /login/tabmain

Request 1

GET /login/tabmain?url=%2fmain HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-Dest: iframe
Referer: https://mp.ybx.greatcai.com/Login/Main
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response 1

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:40 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass
Content-Length: 13650


<link href="/Content/bootstrap.min.css" rel="stylesheet" />
<link href="/Content/bootstrapdiy.css" rel="stylesheet" />
<link href="/Content/base.css" rel="stylesheet" />
<link rel="stylesheet"
...[SNIP]...
6.9. https://mp.ybx.greatcai.com/main
Previous

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mp.ybx.greatcai.com
Path:   /main

Request 1

GET /main HTTP/1.1
Host: mp.ybx.greatcai.com
Connection: close
sec-ch-ua: "Chromium";v="122", "Not(A:Brand";v="24", "Google Chrome";v="122"
Accept: text/html, */*; q=0.01
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36
sec-ch-ua-platform: "Windows"
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mp.ybx.greatcai.com/login/tabmain?url=%2fmain
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: __jsluid_s=33b5adbdd57a2a343d715bbc3e5108fd; ASP.NET_SessionId=nygxo3kujxbqjv4t05p4ld2i

Response 1

HTTP/1.1 200 OK
Date: Tue, 30 Apr 2024 03:21:41 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Via-JSL: 2d38dcb,-
X-Cache: bypass
Content-Length: 20352


<div class="col-md-12">
<div class="ol-header">
<i class="glyphicon glyphicon-th" style="top:1px"></i>
............
</div>
<div style="clear:both;"></div>
<di
...[SNIP]...

Report generated by Burp Suite web vulnerability scanner v2.0beta, at Tue Apr 30 11:27:34 CST 2024.