Commissioned
RedTeam Pentesting GmbH
Time frame
February 2023
Overall assessment of the RedTeam
"The penetration test by verinice.veo comes to a positive result. Only very few vulnerabilities and anomalies could be uncovered. In the core system, there is only one anomaly: in the reporting area, it is possible to call up an endpoint without any authentication. However, the returned data is so general and not customer-specific that the behaviour does not pose a risk and is merely inconsistent and unexpected. All other vulnerabilities and irregularities were uncovered outside of the core system in external, connected systems. [...]
Overall, the tested system is secure and meets the requirements for the intended use and the data that will be managed with it. The vulnerabilities and irregularities uncovered should presumably be easy to address in the short term, in order to further increase the already high level of security."
Findings and reactions of SerNet
- Missing authorisation when accessing main user accounts
Risk: low
Status: Accessing the URL now requires a registered shop account to which the subscription is assigned, so it has been fixed.
- Information disclosure of user account email addresses
Risk: low
Status: Error messages for existing email addresses have been changed in line with the pentesters' advice.
- Client-side protection against changing user names
Risk: information only
Status: Change to the Keycloak configuration to prevent user names from being changed.
- Missing authentication for reports
Risk: Info only
Status: No action required. The fact that the available report templates can be queried does not pose a risk. These can be accessed in the same way via the public source code repository and are not confidential.