Skip to content

Commit f64ecc1

Browse files
committed
Merge branch 'cbbh-fix-approach' into 'main'
Update executive summary section in HTB CBBH design See merge request reportcreator/reportcreator!1034
2 parents ebdcb6c + 4e0604b commit f64ecc1

File tree

3 files changed

+74
-57
lines changed

3 files changed

+74
-57
lines changed

CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
## Upcoming
44
* Fix date field empty value not saved as null
55
* Markdown editor: fix pasted images not inserted correctly in some cases
6+
* Update executive summary section in HTB CBBH design
67

78

89
## v2025.69 - 2025-08-13

demo_data/htb-demo-projects/cbbh.toml

Lines changed: 21 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,24 @@ pentest_approach = "BLACKBOX"
5252
report_version = "TODO 1.0"
5353
customer_contacts = []
5454
executive_summary = """
55-
{{ report.customer_full }} (“{{ report.customer_short }}” herein) invited {{ report.candidate.name }} to a private bug bounty program to perform a targeted Web Application Penetration Test of {{ report.customer_short }}’s externally facing web applications to identify high-risk security weaknesses, determine the impact to {{ report.customer_short }}, document all findings in a clear and repeatable manner, and provide remediation recommendations. The following types of findings were in-scope for this private bug bounty program:
55+
{{ report.customer_full }} (“{{ report.customer_short }}” herein) invited {{ report.candidate.name }} to a private bug bounty program to perform a targeted Web Application Penetration Test of {{ report.customer_short }}’s externally facing web applications to identify high-risk security weaknesses, determine the impact to {{ report.customer_short }}, document all findings in a clear and repeatable manner, and provide remediation recommendations.
56+
"""
57+
approach = """
58+
{{ report.candidate.name }} performed testing under a “{{ report.pentest_approach.label }}” approach from {{ formatDate(report.pentest_start, 'long') }}, to {{ formatDate(report.pentest_end, 'long') }} without credentials or any advance knowledge of {{ report.customer_short }}’s web applications with the goal of identifying unknown weaknesses. Testing was performed from a non-evasive standpoint with the goal of uncovering as many misconfigurations and vulnerabilities as possible. Testing was performed remotely. Each weakness identified was documented and manually investigated to determine exploitation possibilities and escalation potential. {{ report.candidate.name }} sought to demonstrate the full impact of every vulnerability, up to and including internal network access.
59+
"""
60+
scope = """
61+
The scope of this assessment was as follows TODO *.trilocor.local and any and all open web server ports discovered on the target IP address provided at the start of the assessment.
62+
63+
| Host/URL/IP Address | Description |
64+
|:---|:---|
65+
| TODO www.triclor.local | Main Trilocor website/unauthenticated |
66+
| TODO exam IP address | PR website/unauthenticated |
67+
| TODO exam IP address | Jobs Portal/unauthenticated |
68+
| TODO exam IP address | HR website/unauthenticated |
69+
| TODO exam IP address | Trilocor online store/unauthenticated |
70+
71+
72+
The following types of findings were in-scope for this private bug bounty program:
5673
5774
* Sensitive or personally identifiable information disclosure
5875
* Cross-Site Scripting (XSS)
@@ -77,20 +94,6 @@ The following types of activities were considered out-of-scope for this bug boun
7794
* Issues with SSL certificates, open ports, TLS versions, or missing HTTP response headers
7895
* Vulnerabilities in third party libraries unless they can be leveraged to significantly impact the target
7996
* Any theoretical attacks or attacks that require significant user interaction or low risk
80-
81-
{{ report.candidate.name }} performed testing under a “{{ report.pentest_approach.label }}” approach from {{ formatDate(report.pentest_start, 'long') }}, to {{ formatDate(report.pentest_end, 'long') }} without credentials or any advance knowledge of {{ report.customer_short }}’s web applications with the goal of identifying unknown weaknesses. Testing was performed from a non-evasive standpoint with the goal of uncovering as many misconfigurations and vulnerabilities as possible. Testing was performed remotely. Each weakness identified was documented and manually investigated to determine exploitation possibilities and escalation potential. {{ report.candidate.name }} sought to demonstrate the full impact of every vulnerability, up to and including internal network access.
82-
"""
83-
scope = """
84-
The scope of this assessment was as follows TODO *.trilocor.local and any and all open web server ports discovered on the target IP address provided at the start of the assessment.
85-
86-
### In Scope Assets
87-
| Host/URL/IP Address | Description |
88-
|:---|:---|
89-
| TODO www.triclor.local | Main Trilocor website/unauthenticated |
90-
| TODO exam IP address | PR website/unauthenticated |
91-
| TODO exam IP address | Jobs Portal/unauthenticated |
92-
| TODO exam IP address | HR website/unauthenticated |
93-
| TODO exam IP address | Trilocor online store/unauthenticated |
9497
"""
9598
assessment_overview = """
9699
During the course of testing against {{ report.candidate.name }} identified ...
@@ -99,9 +102,9 @@ TODO SUMMARY OF FINDINGS AND RECOMMENDATIONS HERE
99102
"""
100103

101104
[report_data.candidate]
102-
a_name = "TODO Candidate Name"
103-
b_title = "TODO Candidate Title"
104-
c_email = "TODO Candidate Email"
105+
title = "TODO Candidate Title"
106+
name = "TODO Candidate Name"
107+
email = "TODO Candidate Email"
105108

106109
[[findings]]
107110
id = "dd47a6dd-5f26-4920-a48e-a1ff002e0a47"

demo_data/htb-designs/cbbh.toml

Lines changed: 52 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
format = "projecttypes/v2"
22
id = "8412f94b-7eb7-4508-9397-0e1b8da5f066"
3-
name = "HTB CBBH Report v1.1"
3+
name = "HTB CBBH Report v1.2"
44
language = "en-US"
55
status = "finished"
66
tags = [
@@ -875,7 +875,38 @@ type = "markdown"
875875
label = "Executive Summary"
876876
origin = "custom"
877877
default = """
878-
{{ report.customer_full }} (“{{ report.customer_short }}” herein) invited {{ report.candidate.name }} to a private bug bounty program to perform a targeted Web Application Penetration Test of {{ report.customer_short }}’s externally facing web applications to identify high-risk security weaknesses, determine the impact to {{ report.customer_short }}, document all findings in a clear and repeatable manner, and provide remediation recommendations. The following types of findings were in-scope for this private bug bounty program:
878+
{{ report.customer_full }} (“{{ report.customer_short }}” herein) invited {{ report.candidate.name }} to a private bug bounty program to perform a targeted Web Application Penetration Test of {{ report.customer_short }}’s externally facing web applications to identify high-risk security weaknesses, determine the impact to {{ report.customer_short }}, document all findings in a clear and repeatable manner, and provide remediation recommendations.
879+
"""
880+
required = true
881+
882+
[[report_sections.fields]]
883+
id = "approach"
884+
type = "markdown"
885+
label = "Approach"
886+
origin = "custom"
887+
default = """
888+
{{ report.candidate.name }} performed testing under a “{{ report.pentest_approach.label }}” approach from {{ formatDate(report.pentest_start, 'long') }}, to {{ formatDate(report.pentest_end, 'long') }} without credentials or any advance knowledge of {{ report.customer_short }}’s web applications with the goal of identifying unknown weaknesses. Testing was performed from a non-evasive standpoint with the goal of uncovering as many misconfigurations and vulnerabilities as possible. Testing was performed remotely. Each weakness identified was documented and manually investigated to determine exploitation possibilities and escalation potential. {{ report.candidate.name }} sought to demonstrate the full impact of every vulnerability, up to and including internal network access.
889+
"""
890+
required = true
891+
892+
[[report_sections.fields]]
893+
id = "scope"
894+
type = "markdown"
895+
label = "Scope"
896+
origin = "custom"
897+
default = """
898+
The scope of this assessment was as follows TODO *.trilocor.local and any and all open web server ports discovered on the target IP address provided at the start of the assessment.
899+
900+
| Host/URL/IP Address | Description |
901+
|:---|:---|
902+
| TODO www.triclor.local | Main Trilocor website/unauthenticated |
903+
| TODO exam IP address | PR website/unauthenticated |
904+
| TODO exam IP address | Jobs Portal/unauthenticated |
905+
| TODO exam IP address | HR website/unauthenticated |
906+
| TODO exam IP address | Trilocor online store/unauthenticated |
907+
908+
909+
The following types of findings were in-scope for this private bug bounty program:
879910
880911
* Sensitive or personally identifiable information disclosure
881912
* Cross-Site Scripting (XSS)
@@ -900,27 +931,6 @@ The following types of activities were considered out-of-scope for this bug boun
900931
* Issues with SSL certificates, open ports, TLS versions, or missing HTTP response headers
901932
* Vulnerabilities in third party libraries unless they can be leveraged to significantly impact the target
902933
* Any theoretical attacks or attacks that require significant user interaction or low risk
903-
904-
{{ report.candidate.name }} performed testing under a “{{ report.pentest_approach.label }}” approach from {{ formatDate(report.pentest_start, 'long') }}, to {{ formatDate(report.pentest_end, 'long') }} without credentials or any advance knowledge of {{ report.customer_short }}’s web applications with the goal of identifying unknown weaknesses. Testing was performed from a non-evasive standpoint with the goal of uncovering as many misconfigurations and vulnerabilities as possible. Testing was performed remotely. Each weakness identified was documented and manually investigated to determine exploitation possibilities and escalation potential. {{ report.candidate.name }} sought to demonstrate the full impact of every vulnerability, up to and including internal network access.
905-
"""
906-
required = true
907-
908-
[[report_sections.fields]]
909-
id = "scope"
910-
type = "markdown"
911-
label = "Scope"
912-
origin = "custom"
913-
default = """
914-
The scope of this assessment was as follows TODO *.trilocor.local and any and all open web server ports discovered on the target IP address provided at the start of the assessment.
915-
916-
### In Scope Assets
917-
| Host/URL/IP Address | Description |
918-
|:---|:---|
919-
| TODO www.triclor.local | Main Trilocor website/unauthenticated |
920-
| TODO exam IP address | PR website/unauthenticated |
921-
| TODO exam IP address | Jobs Portal/unauthenticated |
922-
| TODO exam IP address | HR website/unauthenticated |
923-
| TODO exam IP address | Trilocor online store/unauthenticated |
924934
"""
925935
required = true
926936

@@ -1124,7 +1134,24 @@ pentest_end = "2023-05-31"
11241134
report_date = "2023-05-31"
11251135
report_version = "1.0"
11261136
executive_summary = """
1127-
{{ report.customer_full }} (“{{ report.customer_short }}” herein) invited {{ report.candidate.name }} to a private bug bounty program to perform a targeted Web Application Penetration Test of Trilocor’s externally facing web applications to identify high-risk security weaknesses, determine the impact to Trilocor, document all findings in a clear and repeatable manner, and provide remediation recommendations. The following types of findings were in-scope for this private bug bounty program:
1137+
{{ report.customer_full }} (“{{ report.customer_short }}” herein) invited {{ report.candidate.name }} to a private bug bounty program to perform a targeted Web Application Penetration Test of {{ report.customer_short }}’s externally facing web applications to identify high-risk security weaknesses, determine the impact to {{ report.customer_short }}, document all findings in a clear and repeatable manner, and provide remediation recommendations.
1138+
"""
1139+
approach = """
1140+
{{ report.candidate.name }} performed testing under a “{{ report.pentest_approach.label }}” approach from {{ formatDate(report.pentest_start, 'long') }}, to {{ formatDate(report.pentest_end, 'long') }} without credentials or any advance knowledge of {{ report.customer_short }}’s web applications with the goal of identifying unknown weaknesses. Testing was performed from a non-evasive standpoint with the goal of uncovering as many misconfigurations and vulnerabilities as possible. Testing was performed remotely. Each weakness identified was documented and manually investigated to determine exploitation possibilities and escalation potential. {{ report.candidate.name }} sought to demonstrate the full impact of every vulnerability, up to and including internal network access.
1141+
"""
1142+
scope = """
1143+
The scope of this assessment was as follows TODO *.trilocor.local and any and all open web server ports discovered on the target IP address provided at the start of the assessment.
1144+
1145+
| Host/URL/IP Address | Description |
1146+
|:---|:---|
1147+
| TODO www.triclor.local | Main Trilocor website/unauthenticated |
1148+
| TODO exam IP address | PR website/unauthenticated |
1149+
| TODO exam IP address | Jobs Portal/unauthenticated |
1150+
| TODO exam IP address | HR website/unauthenticated |
1151+
| TODO exam IP address | Trilocor online store/unauthenticated |
1152+
1153+
1154+
The following types of findings were in-scope for this private bug bounty program:
11281155
11291156
* Sensitive or personally identifiable information disclosure
11301157
* Cross-Site Scripting (XSS)
@@ -1140,7 +1167,7 @@ executive_summary = """
11401167
The following types of activities were considered out-of-scope for this bug bounty program:
11411168
11421169
* Scanning and assessing any other IP in the Entry Point's network
1143-
* Physical attacks against Trilocor properties
1170+
* Physical attacks against {{ report.customer_short }} properties
11441171
* Unverified scanner output
11451172
* Man-in-the-Middle attacks
11461173
* Any vulnerabilities identified through DDoS or spam attacks
@@ -1149,20 +1176,6 @@ The following types of activities were considered out-of-scope for this bug boun
11491176
* Issues with SSL certificates, open ports, TLS versions, or missing HTTP response headers
11501177
* Vulnerabilities in third party libraries unless they can be leveraged to significantly impact the target
11511178
* Any theoretical attacks or attacks that require significant user interaction or low risk
1152-
1153-
{{ report.candidate.name }} performed testing under a “{{ report.pentest_approach.label }}” approach from {{ formatDate(report.pentest_start, 'long') }}, to {{ formatDate(report.pentest_end, 'long') }} without credentials or any advance knowledge of {{ report.customer_short }}’s web applications with the goal of identifying unknown weaknesses. Testing was performed from a non-evasive standpoint with the goal of uncovering as many misconfigurations and vulnerabilities as possible. Testing was performed remotely. Each weakness identified was documented and manually investigated to determine exploitation possibilities and escalation potential. {{ report.candidate.name }} sought to demonstrate the full impact of every vulnerability, up to and including internal network access.
1154-
"""
1155-
scope = """
1156-
The scope of this assessment was as follows TODO *.trilocor.local and any and all open web server ports discovered on the target IP address provided at the start of the assessment.
1157-
1158-
### In Scope Assets
1159-
| Host/URL/IP Address | Description |
1160-
|:---|:---|
1161-
| TODO www.trilocor.local | Main Trilocor website/unauthenticated |
1162-
| TODO exam IP address | PR website/unauthenticated |
1163-
| TODO exam IP address | Jobs Portal/unauthenticated |
1164-
| TODO exam IP address | HR website/unauthenticated |
1165-
| TODO exam IP address | Trilocor online store/unauthenticated |
11661179
"""
11671180
assessment_overview = """
11681181
During the course of testing against {{ report.candidate.name }} identified ...

0 commit comments

Comments
 (0)