🌱 Beginner
Template

Finding Template

A standardized template for documenting individual vulnerabilities. Use this format consistently across all findings for professional, actionable reports.

Consistency is Key

Using a consistent format for all findings makes reports easier to read and ensures no critical information is missed.

Standard Finding Format

## [VLN-XXX] [Vulnerability Title]

### Overview
| Attribute | Value |
|-----------|-------|
| **Severity** | [Critical / High / Medium / Low / Info] |
| **CVSS Score** | X.X |
| **CVSS Vector** | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| **CWE** | CWE-XXX: [Name] |
| **OWASP** | A0X:2021 - [Category] |
| **Affected Asset** | [URL / IP / System] |
| **Status** | Open / Remediated / Risk Accepted |

### Description
[2-3 sentences describing the vulnerability in clear terms. What is it? 
Why does it exist? Avoid overly technical jargon.]

### Technical Details
[Detailed technical explanation for security/development teams. 
Include the root cause and attack vector.]

### Evidence

#### Request
```http
[HTTP request that demonstrates the vulnerability]
```

#### Response
```http
[Server response showing successful exploitation]
```

#### Screenshot
[Insert screenshot or reference to appendix]

### Impact
[Describe what an attacker could achieve by exploiting this vulnerability.
Be specific about data at risk, systems affected, and business impact.]

**Potential consequences:**
- [Impact 1]
- [Impact 2]
- [Impact 3]

### Proof of Concept
```
[Minimal PoC code/command to reproduce the issue]
[Keep it simple - just enough to prove the vulnerability]
```

### Remediation

#### Immediate Actions (Quick Wins)
1. [First quick fix]
2. [Second quick fix]

#### Long-term Solution
[Comprehensive fix that addresses the root cause]

#### Secure Code Example
```[language]
// Before (Vulnerable)
[vulnerable code]

// After (Secure)
[fixed code]
```

#### Remediation Effort
| Effort | Estimated Time |
|--------|---------------|
| Development | [X hours/days] |
| Testing | [X hours/days] |
| Deployment | [X hours/days] |

### References
- [Relevant OWASP page]
- [Relevant CWE entry]
- [Vendor documentation]
- [Additional resources]
      

Example Findings

Critical: SQL Injection

## [VLN-001] SQL Injection in Search Functionality

| Attribute | Value |
|-----------|-------|
| **Severity** | Critical |
| **CVSS Score** | 9.8 |
| **CVSS Vector** | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| **CWE** | CWE-89: SQL Injection |
| **OWASP** | A03:2021 - Injection |
| **Affected Asset** | https://app.example.com/search |

### Description
The search functionality is vulnerable to SQL injection via the 'q' parameter.
User input is concatenated directly into SQL queries without sanitization.

### Evidence
Request: GET /search?q=test' OR '1'='1 HTTP/1.1
Response: Returns all database records instead of filtered results

### Impact
- Complete database compromise
- Authentication bypass
- Potential RCE via database functions

### Remediation
Use parameterized queries:
```python
cursor.execute("SELECT * FROM products WHERE name LIKE %s", ("%" + query + "%",))
```
      

Medium: Missing Security Headers

## [VLN-007] Missing HTTP Security Headers

| Attribute | Value |
|-----------|-------|
| **Severity** | Medium |
| **CVSS Score** | 5.3 |
| **CWE** | CWE-693: Protection Mechanism Failure |
| **OWASP** | A05:2021 - Security Misconfiguration |
| **Affected Asset** | https://app.example.com/* |

### Description
The application does not implement recommended HTTP security headers,
reducing defense-in-depth against common web attacks.

### Missing Headers
- Content-Security-Policy
- X-Frame-Options
- X-Content-Type-Options
- Strict-Transport-Security

### Remediation
Add to web server configuration:
```nginx
add_header Content-Security-Policy "default-src 'self'";
add_header X-Frame-Options "DENY";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
```
      

Writing Checklist

✅ Before Submitting

  • ☐ Vulnerability is reproducible
  • ☐ CVSS score is accurate
  • ☐ Evidence clearly shows the issue
  • ☐ Impact is specific, not generic
  • ☐ Remediation is actionable
  • ☐ References are included
  • ☐ Screenshots are clear and annotated
  • ☐ No sensitive data exposed in report

⚠️ Common Mistakes

  • • Generic impact statements
  • • Missing reproduction steps
  • • Incorrect CVSS scoring
  • • No code examples in remediation
  • • Unclear screenshots
  • • Duplicate findings not merged
  • • Technical jargon without explanation
  • • Missing affected asset details