This report presents the results of a comprehensive vulnerability assessment conducted against Court Crate's public-facing infrastructure (courtcrate.com). The assessment was performed on August 6, 2024, utilizing industry-standard tools including Nmap for network reconnaissance, Tenable Nessus Essentials for vulnerability scanning, and Selenium for browser-based verification. Manual validation was conducted using curl and browser developer tools.
The assessment identified moderate but correctable security risks. No critical flaws were discovered that would allow immediate exploitation or system compromise. However, the presence of missing security headers (anti-clickjacking and HSTS), WordPress user enumeration capabilities, and permissive HTTP method configurations present exploitable weaknesses that warrant prompt remediation.
The primary medium-severity finding is the lack of clickjacking protections (X-Frame-Options and Content-Security-Policy frame-ancestors headers), which could allow attackers to overlay invisible iframes and trick users into unintended actions. The secondary medium finding is WordPress user enumeration via the ?author= parameter, exposing administrator usernames to potential brute-force attacks.
Implementation of the recommended configuration hardening measures will significantly strengthen the organization's security posture and align the system with OWASP Top 10 mitigations and CISA web-server baseline standards.
In Scope: Public-facing web host (courtcrate.com), externally reachable services, DNS resolution, TLS/SSL configuration, HTTP response headers, and WordPress application-level exposure.
Out of Scope: Internal network infrastructure, authenticated scanning, exploitation attempts, social engineering, physical security testing, and backend database systems.
| Item | Value |
|---|---|
| Domain | courtcrate.com |
| IP Address | 74.208.236.198 |
| Reverse DNS | 74-208-236-198.elastic-ssl.ui-r.com |
| OS (Scanner Reported) | AIX 5.3 (likely false positive; actual OS unavailable) |
| Hosting Provider | IONOS Hosting |
| CMS Platform | WordPress 6.x |
| Web Server | Apache / LiteSpeed |
| Application Environment | PHP 8.x / MySQL 5.7+ |
Nmap was used to perform non-intrusive host discovery and service enumeration. Scans identified all accessible TCP ports, running services, and service version information. Multiple scan profiles were executed including SYN stealth scans, service version detection (-sV), and top-1000 port enumeration.
Tenable Nessus Essentials conducted comprehensive vulnerability scanning, identifying 26 distinct findings across multiple severity levels. The scanner performed banner grabbing, service fingerprinting, and configuration analysis to detect known vulnerabilities, missing patches, and security misconfigurations.
Automated browser testing via Selenium was performed to verify the presence or absence of security headers and to confirm UI elements that could be vulnerable to frame-overlay attacks. This testing simulated real-world user interactions with the web application.
Manual verification using curl command-line requests and browser Developer Tools confirmed TLS protocol versions, cipher suites, HTTP response headers, session cookie attributes, and server banner information.
| Severity | Count | Key Findings |
|---|---|---|
| Critical | 0 | None identified |
| High | 0 | None identified |
| Medium | 2 | Clickjacking, WordPress User Enumeration |
| Low | 1 | Basic Authentication Without HTTPS |
| Informational | 23 | Missing HSTS, Insecure Cookie Flags, Server Version Disclosure, Permissive HTTP Methods |
| Severity | Count | Remediation Timeline |
|---|---|---|
| Medium | 2 | 30 days |
| Low | 1 | 60 days |
| Informational | 23 | 90 days (ongoing hardening) |
Network reconnaissance identified the following open TCP ports and associated services on the target host:
| Port | State | Service | Protocol |
|---|---|---|---|
| 20/tcp | Closed | FTP Data | TCP |
| 21/tcp | Open | FTP | TCP |
| 25/tcp | Open | SMTP | TCP |
| 53/tcp | Open | DNS | TCP |
| 80/tcp | Open | HTTP | TCP |
| 110/tcp | Open | POP3 | TCP |
| 143/tcp | Open | IMAP | TCP |
| 443/tcp | Open | HTTPS | TCP |
| 465/tcp | Open | SMTPS | TCP |
| 587/tcp | Open | Submission | TCP |
| 993/tcp | Open | IMAPS | TCP |
| 995/tcp | Open | POP3S | TCP |
Observation: The presence of open mail-related ports (SMTP, IMAP, POP3 and their encrypted variants) expands the attack surface and creates potential vectors for credential brute-forcing, relay abuse, and information gathering. The legacy FTP service (port 21) should be disabled in favor of SFTP/FTPS for secure file transfers.
Description: The web application fails to implement frame-restriction headers (X-Frame-Options or Content-Security-Policy frame-ancestors directives). This allows attackers to embed the target page within a malicious webpage using HTML iframes, enabling UI Redress or Clickjacking attacks.
Attack Vector: An attacker creates a malicious website that invisibly overlays the target site's interactive elements (buttons, links, forms) on top of attacker-controlled content. When a victim visits the malicious site, they unknowingly interact with the hidden target site, potentially causing them to:
Affected Pages: All pages with interactive elements including login forms, transaction interfaces, account settings, and administrative functions.
Root Cause: The web server is not sending appropriate HTTP response headers to restrict frame embedding. Both the X-Frame-Options header and the Content-Security-Policy frame-ancestors directive are absent from all observed responses.
X-Frame-Options: SAMEORIGINDENY – prevent framing entirely (most restrictive)SAMEORIGIN – allow framing only from same domain (recommended for most applications)ALLOW-FROM uri – allow framing only from specified domain (deprecated; use CSP instead)Content-Security-Policy: frame-ancestors 'self';Header always set X-Frame-Options "SAMEORIGIN"
Header always set Content-Security-Policy "frame-ancestors 'self';"header("X-Frame-Options: SAMEORIGIN");
header("Content-Security-Policy: frame-ancestors 'self';");curl -I https://courtcrate.comDescription: The WordPress installation exposes administrator usernames through the ?author= parameter. Attackers can enumerate valid user accounts by iterating through numeric author IDs, leaking information required for targeted brute-force or social engineering attacks.
Attack Vector: By accessing URLs such as courtcrate.com/?author=1, ?author=2, etc., attackers receive HTTP 301 redirects to author archive pages that disclose the actual username. This allows systematic enumeration of all WordPress user accounts.
RewriteCond %{QUERY_STRING} ^author=\d
RewriteRule ^(.*)$ – [L,F]Description: Legacy services on ports 110 (POP3) and potentially others accept Basic Authentication over unencrypted connections, allowing credential interception via man-in-the-middle (MITM) attacks.
Missing Headers: HTTP Strict-Transport-Security (HSTS), Secure/HttpOnly/SameSite cookie flags, X-Content-Type-Options, X-XSS-Protection
Impact: Cookies vulnerable to XSS and CSRF; browsers may downgrade to HTTP; server fingerprinting enables targeted attacks.
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline'
Court Crate's web infrastructure presents moderate but fully correctable security risks. No critical or high-severity vulnerabilities were identified that would allow immediate system compromise. However, the two medium-severity findings—clickjacking and WordPress user enumeration—warrant prompt remediation to prevent exploitation.
Conclusion: By implementing the recommended remediations, Court Crate can significantly enhance its security posture, align with industry best practices, and reduce exposure to common web-based attacks. Regular assessment and maintenance will ensure that improvements persist as the environment evolves.
| Term | Definition |
|---|---|
| CVSS | Common Vulnerability Scoring System – standardized method for rating severity of vulnerabilities (0–10 scale) |
| Clickjacking | UI redress attack where attacker overlays invisible iframes to trick users into unintended actions |
| CSP | Content Security Policy – HTTP header controlling which content sources (scripts, iframes) browsers can load |