Security Analysis On Websites Belonging To The Health Service Districts in Indonesia Based On The Open Web Application Security Project OWASP Top 10 2021
Security Analysis On Websites Belonging To The Health Service Districts in Indonesia Based On The Open Web Application Security Project OWASP Top 10 2021
Security Analysis On Websites Belonging To The Health Service Districts in Indonesia Based On The Open Web Application Security Project OWASP Top 10 2021
2023 International
ConferenceConference
on Information
on Information
TechnologyTechnology
and Computing
and Computing
(ICITCOM),(ICITCOM)
1-2 December 2023
[email protected] [email protected]
Abstract—In August 2022, the Directorate of Cyber Security 3.26 GB with the file name "sample medic", then this leak
Operations, National Cyber and Crypto Agency received the is valid and happened. Meanwhile, the hacker admitted that
most complaints about cybercrime. Of these complaints, there the data came from the central server of the Indonesian
were more than 100 hacking cases, which were dominated by Ministry of Health and it was also reported that the data
the local government sector. In the same year, there was a leak
was last taken on December 28, 2021 [3]. In August 2022,
of medical sample data belonging to the Central Government
of the Republic of Indonesia’s Ministry of Health. So, this the Directorate of Cyber Security Operations received the
research aims to analyze the security of a website belonging to most complaints about cybercrime, namely 5 complaints,
the health service of one of the districts in Indonesia. There with details about 2 complaints about ransomware,
were eleven vulnerabilities discovered and successfully followed by 2 complaints about phishing and 1 complaint
classified using the OWASP Top 10 2021. Of the eleven about web defacement [4]. There were 148 hacking cases,
vulnerabilities discovered, nine vulnerabilities were dominated by the local government sector. It is also known
successfully exploited by following the WSTG 4.2 guidelines. that the highest hacking activity occurred on 5 and 9
By using the OWASP Risk Assessment Calculator, four August 2022, reaching 18 cases [4].
vulnerabilities have a medium severity level and five others
The Ministry of Health has branches in each region
have a low severity level. Based on these findings,
recommendations for improving each vulnerability are given. called regional health offices. Each regional health service
has a website that contains information related to public
Keywords—security analysis, penetration testing, OWASP health, and several websites belonging to regional health
Top 10 2021, OWASP WSTG v4.2, vulnerability assessment, services are also still in the development stage because they
website have only just been integrated with the go.id domain. Apart
from that, the website that will be used as research belongs
I. INTRODUCTION to an area with a zone-h domain, namely a website that was
In 2021, there were 5,940 cases of attacks on websites hit by a web defacement attack in 2012. Based on several
in the form of web defacement, and in one year the most existing facts, it is necessary to detect vulnerabilities and
cases occurred in March, reaching 727 cases [1]. When understand what risks the website may face in the future.
receiving reports of web defacement cases in Indonesia, the This can be done with a security analysis to improve web
Cyber Security Operations Directorate conducted a security security and be an anticipatory step to identify early
gap analysis to find out what the defacer might have done. potential risks before they occur. Security analysis includes
The analysis was carried out by grouping based on sector two main stages, namely the Vulnerability Assessment
distribution consisting of academic, private, local (VA) stage and the Penetration Testing (PT) stage which is
government, central government, legal, personal, school, carried out to design, improve, and manage the security of a
organization, military, and health. Then, the time of website [5]. Vulnerability assessment will be carried out by
occurrence is throughout 2021, and the web page affected is scanning web vulnerabilities and then classifying them
generally the homepage [1]. From this analysis, the results based on the Open Web Application Security Project
showed that the regional government was ranked third with (OWASP) Top 10 2021. Next, penetration testing will be
1,097 web defacement cases [1]. According to data released carried out to prove the results of the vulnerabilities found.
by the Indonesia Security Incident Response Team on The results of this research are a list of vulnerabilities and
Internet Infrastructure (ID SIRTII) in 2017, government recommendations for improvement on the website of the
websites with the domain go.id were the most frequently regional health service (XYZ.go.id). So, this research can
attacked by hackers. Incidents of attacks on government be a guideline for improving and making the regional health
websites reached 3,783 times or 24.43% [2]. In early 2022, department's website better.
the alleged leak of data belonging to Indonesian health
patients occurred again. This data allegedly belongs to the II. LITERATURE REVIEW
Ministry of Health of Indonesia and according to the Chair A. Security Analysis
of the CISSReC Cyber Security and Communication
Security analysis on websites includes two main stages,
Research Institute, if we look at the data sample provided of
Vulnerability Assessment (VA) and Penetration Testing
Authorized licensed use limited to: Edinburgh Napier University. Downloaded on March 25,2024 at 10:43:49 UTC from IEEE Xplore. Restrictions apply.
979-8-3503-5963-3/23/$31.00 ©2023 IEEE 267
2023 International
2023 International
ConferenceConference
on Information
on Information
TechnologyTechnology
and Computing
and Computing
(ICITCOM),(ICITCOM)
1-2 December 2023
(PT) which are carried out to design, manage, and improve use of insecure default configurations or credentials, open
the security of a website [5]. Some tools that are usually clouds, improper configuration of HTTP headers, and error
used to carry out vulnerability assessments are Nmap and messages containing sensitive information.
OWASP ZAP [6]. Vulnerability assessment and penetration 6) A06:2021-Vulnerable and Outdated Components:
testing are done by referring to Patel [7]. This vulnerability can be exploited by attackers to retrieve
Some of the tools used in VA and PT are: sensitive data and even take over the server.
1) Whois: used to find out the domain ID, domain 7) A07:2021-Identification and Authentication
validity period, domain status, and number of servers [6] Failures: This vulnerability occurs when existing
2) Netcraft: Netcraft is used to view hosting history authentication and session management functionality is
records, network information, and web rackers related to implemented incorrectly.
this site and its technology [8] 8) A08:2021-Software and Data Integrity Failures:
3) Geo Data tool: used to determine the geographical This vulnerability is related to failure to ensure that the
location of a host software and data used in a system or application remain
4) Nmap: Nmap is used to find out which port services accurate, complete, reliable, and protected from threats or
are open damage.
5) OWASP ZAP: in the vulnerability scanning process, 9) A09:2021-Security Logging and Monitoring
the OWASP ZAP v 2.12.0 tool is used to help find Failures: If integration is not effective with incident
vulnerabilities automatically in web applications [6],[9] response, it can increase the risk of attacks that can occur
6) Nikto: Nikto is used to help scan for vulnerabilities because it will give attackers enough time to damage,
on the web server extract, or destroy data, and do things that have an impact
7) Burpsuite: is used for security testing of web on other serious.
applications by providing an overview of functionality and 10) A10:2021-Server-Side Request Forgery: This
content from related websites [9], [10] vulnerability occurs when a web application retrieves a
8) Sqlmap: is a tool that functions to identify and exploit remote resource without first validating the URL provided
SQL injection vulnerabilities in web applications by the user. This allows attackers to force applications to
9) Clickjacker.io: is a tool that allows users to test target send crafted requests to unexpected destinations, even when
websites to see if they are vulnerable to attacks clickjacking protected by a firewall, VPN, or other type of Access
[9] Control List (ACL).
10) Observatory Mozilla: This service does a series of
tests to evaluate several security aspects of a website,
C. Penetration Testing
including SSL/TLS configuration, HTTP security headers,
encryption content, and other security settings [11] Penetration testing can be interpreted as the process of
11) SSL Laboratory: this tool is used to check impersonating an attacker to look for security vulnerabilities
SSL/TLS certificates, protocols supported by servers, in a system or network [7]. Table I explains the comparative
encryption configurations, and several other security results of each penetration testing test method.
features on websites.
TABLE I. COMPARATIVE ANALYSIS OF PENETRATION TEST
B. Open Web Application Security Project (OWASP) METHODOLOGIES [13]
Top 10 2021
The OWASP Open Web Application Security Project
Integra-
Top 10 2021 is a standard that contains a list of Focus Ea tion of
vulnerabilities with a focus on identifying the most Last sy the
Metho- To
dangerous and most common web application security risks dology
revis
ols
to contect
in organizations [12]. The vulnerabilities according to the ed us of IS/IT
Mana e mana-
OWASP Top 10 2021 are explained as follows [12]: geme
High
Techn
level gement
1) A01:2021-Broken Access Control nt ical
This attack can be exploited by attackers to gain OSSTM
unauthorized access, including accessing and changing user 2010 No Yes No No No No
M
accounts, sensitive data, user data, and other things. ISSAF 2006
Parti-
Yes Yes Yes No Partially
ally
2) A02:2021-Cryptographic Failures: This
vulnerability occurs when web applications and APIs fail to PTES 2014 No Yes Yes Yes Yes No
protect sensitive data such as personal data, financial OWASP 2014 No Yes Yes Yes Yes No
information, health service data, and other crucial data. NIST SP
2008 No Yes No No Yes No
3) A03:2021-Injection: Injection attacks can occur on 800-115
databases, operating systems, or servers via protocols such
as LDAP. Based on these comparison results, PTES and OWASP
4) A04:2021-Insecure Design: One of the factors that are easy to use and the newest methods. For this reason,
can cause this attack to occur is the lack of a business risk penetration testing was carried out in this research using the
profile for the system being developed, which then becomes OWASP method. However, OWASP has released a newer
a failure to determine the level of security design required. method as a guide for penetration testing, namely OWASP
5) A05:2021-Security Misconfiguration: These WSTG v 4.2. so, the penetration testing stage is carried out
vulnerabilities are the most common, usually caused by the using the OWASP WSTG v 4.2 method [6], [9], [10].
Authorized licensed use limited to: Edinburgh Napier University. Downloaded on March 25,2024 at 10:43:49 UTC from IEEE Xplore. Restrictions apply.
268
2023 International
2023 International
ConferenceConference
on Information
on Information
TechnologyTechnology
and Computing
and Computing
(ICITCOM),(ICITCOM)
1-2 December 2023
6 to 9 6 to 9 High
PENETRATION TESTING
validating correctness against previously discovered
To estimate the overall impact of existing risks and vulnerabilities [20] using OWASP WSTG v 4.2
guideline and risk assessment referring to the OWASP
threats, an assessment is used which can be seen in Table III Risk Rating Methodology
[15].
TABLE III. RISK LEVEL LIKELIHOOD AND IMPACT
REPORTING
Report document containing proof of vulnerability in
Likelihood the form of a confusion matrix and recommendations
for repairing vulnerabilities
Low Medium High
Authorized licensed use limited to: Edinburgh Napier University. Downloaded on March 25,2024 at 10:43:49 UTC from IEEE Xplore. Restrictions apply.
269
2023 International
2023 International
ConferenceConference
on Information
on Information
TechnologyTechnology
and Computing
and Computing
(ICITCOM),(ICITCOM)
1-2 December 2023
Authorized licensed use limited to: Edinburgh Napier University. Downloaded on March 25,2024 at 10:43:49 UTC from IEEE Xplore. Restrictions apply.
270
2023 International
2023 International
ConferenceConference
on Information
on Information
TechnologyTechnology
and Computing
and Computing
(ICITCOM),(ICITCOM)
1-2 December 2023
Category
Category Tools Validation Severity
No. No. OWASP Vulnerability
OWASP Top 10 2021 OWASP ZAP Nikto status Level
Top
defined
10:2021
X-Content-Type- The X-Content- X-Content-Type- True-positive Low
Options Header Type-Options 9. A05:2021 Options
Missing header is not Header Missing
set
Server Leaks Server banner Cross-Domain True-positive Low
A08:2021
Version Information changed from 10. JavaScript
via "Server" HTTP "LiteSpeed" to
Source File Inclusion
Response Header "imunify360-
Field webshield/1.18" Server Leaks True-positive Low
A06:2021-Vulnerable Version
A05:2021 Information via
6. and Outdated - -
Components "Server"HTTP
A07:2021- 11. Response
Identification and Header
7. - -
Authentication Field
Failures
A08:2021-Software Cross-Domain
8. and Data Integrity JavaScript Source - Based on a risk assessment using the OWASP Risk
Failures File Inclusion Assessment Calculator on nine vulnerabilities that were
A09:2021-Security proven to be exploitable at the penetration testing stage, it
9. Logging and - -
Monitoring Failures
was found that four vulnerabilities had a medium severity
A10:2021-Server- level, and five vulnerabilities had a low severity level. This
10. - -
Side Request Forgery vulnerability level assessment aims to determine repair
priorities on the website belonging to the regional health
B. Penetration Testing service (XYZ.go.id) so that it can be repaired immediately.
The results obtained from the average likelihood factors C. Reporting
and impact factors are then matched as in Table VI Overall This stage contains recommendations for improvements
Risk Severity Level to obtain the final result in the form of based on the OWASP ZAP scanning report and the IT
the severity level of each vulnerability. Security Assessment Vulnerability Dictionary [18].
The following recommendations are listed in Table VII:
TABLE VI. VULNERABILITY FINDINGS VALIDATION RESULTS
TABLE VII. IMPROVEMENT RECOMMENDATIONS
Category
No. OWASP Vulnerability Validation Severity
status Level No. Vulnerability Recommendations
Top Implement Anti-CSRF Tokens by ensuring
10:2021 their use for every action that changes data or
has an impact on applications. Each user must
A03:2021 SQL Injection - SQLite False- - also have a unique, dynamically generated
1.
positive CSRF token for each session.
Store CSRF [1] tokens in the session server to
A03:2021 SQL Injection - False- -
prevent Cross-Site Scripting (XSS) attacks
2. Hypersonic positive that can retrieve CSRF tokens from cookies.
SQL - Time Based Absence of Validate CSRF tokens on requests where
1. Anti-CSRF every time a user sends a request that can
A01:2021 Absence of Anti-CSRF True-positive Medium Tokens change data, the server must verify the CSRF
3. Tokens token sent by the user with the CSRF token on
the server session.
A05:2021 Content Security Policy True-positive Medium Set the SameSite attribute on application
4. cookies to "Strict" or "Lax" to help protect
(CSP) Header Not Set
against CSRF attacks by limiting cookie
access to only requests originating from the
A05:2021 Missing Anti-clicjacking True-positive Medium same site. For example, by using the PHP
5. Header programming language
Set a CSP Header on the web server stating a
Content
Cookie without True-positive Medium clear security policy about what resources are
A01:2021 Security
and are not allowed to be loaded on the page.
6. SameSite 2. Policy (CSP)
Use CSP Report-Only Mode to report
Attribute Header Not
potential policy violations without
Set
Secure Pages Include True-positive Low implementing countermeasures.
A05:2021 Implement HTTP Content-Security-Policy and
7. Mixed Missing Anti-
X-Frame-Options headers.
3. clicjacking
Content Set the X-Frame-Options header with the
Header
value "SAMEORIGIN" or "DENY".
Strict-Transport- True-positive Low
A05:2021
8. Security
Header Not Set
Authorized licensed use limited to: Edinburgh Napier University. Downloaded on March 25,2024 at 10:43:49 UTC from IEEE Xplore. Restrictions apply.
271
2023 International
2023 International
ConferenceConference
on Information
on Information
TechnologyTechnology
and Computing
and Computing
(ICITCOM),(ICITCOM)
1-2 December 2023
Authorized licensed use limited to: Edinburgh Napier University. Downloaded on March 25,2024 at 10:43:49 UTC from IEEE Xplore. Restrictions apply.
272