Security Testing Checklist

Security Testing Checklist - Appian Platform

My personal pentesting checklist for Appian. Use this when you run into one of these things.

Pre-Assessment Phase

1. Information Gathering

  • Target Identification

    • Find Appian deployment URL(s)
    • Figure out if it's cloud/on-prem/hybrid
    • Map subdomains and related services
    • Get version and build info
  • Network Discovery

    • Port scan for default ports (8080, 8443, 5400, 5432, 389, 636)
    • Service enumeration and version detection
    • SSL/TLS config analysis
    • Network segmentation assessment
  • Technology Stack Analysis

    • Identify underlying tech (Java, Tomcat, databases)
    • Check for third-party components (Log4j2, Spring)
    • Analyze HTTP headers and error messages
    • Review JavaScript and client-side code

2. Vulnerability Research

  • CVE Analysis

    • Check CVE-2025-50434 (Access control vulnerability)
    • Check CVE-2007-6509 (DoS vulnerability)
    • Verify Log4j2 version and config
    • Check Spring Framework version for Spring4Shell
  • Security Advisories

    • Review Appian security bulletins
    • Check for recent security updates
    • Analyze patch levels and missing updates

Authentication & Authorization Testing

1. Authentication Mechanisms

  • Login Functionality

    • Test SQL injection in login forms
    • Check for auth bypass vulnerabilities
    • Test brute force protection
    • Verify password complexity requirements
  • Default Credentials

    • Test common defaults (admin/admin, etc.)
    • Check for hardcoded credentials
    • Verify default account status
  • Multi-Factor Authentication

    • Test MFA bypass techniques
    • Check for MFA enforcement
    • Verify MFA implementation security

2. Session Management

  • Session Security

    • Test for session fixation vulnerabilities
    • Check session timeout configuration
    • Verify session invalidation on logout
    • Test for concurrent session handling
  • Session Tokens

    • Analyze session token generation
    • Check for predictable session IDs
    • Test for session token manipulation
    • Verify secure token storage

3. Access Control Testing

  • Role-Based Access Control (RBAC)

    • Test for privilege escalation
    • Check for horizontal privilege escalation
    • Verify role assignment controls
    • Test for role manipulation
  • CVE-2025-50434 Testing

    • Test for unauthorized information access
    • Check access control bypass techniques
    • Verify proper authorization checks
    • Test for direct object reference vulnerabilities

Input Validation & Injection Testing

1. SQL Injection

  • Database Injection
    • Test for error-based SQL injection
    • Check for union-based SQL injection
    • Test for blind SQL injection
    • Verify parameterized query usage
  • NoSQL Injection
    • Test for MongoDB injection
    • Check for CouchDB injection
    • Test for other NoSQL databases

2. Cross-Site Scripting (XSS)

  • Reflected XSS

    • Test all input parameters
    • Check for XSS in error messages
    • Test for XSS in search functionality
    • Verify output encoding
  • Stored XSS

    • Test file upload functionality
    • Check user profile fields
    • Test comment/feedback systems
    • Verify data persistence
  • DOM-based XSS

    • Analyze client-side JavaScript
    • Test URL fragment manipulation
    • Check for unsafe DOM operations

3. Command Injection

  • System Command Injection
    • Test file upload functionality
    • Check system integration points
    • Test for command execution
    • Verify input sanitization

4. Other Injection Types

  • LDAP Injection

    • Test LDAP query parameters
    • Check for LDAP filter injection
    • Verify LDAP query construction
  • XML Injection

    • Test XML processing functionality
    • Check for XXE vulnerabilities
    • Test for XML bomb attacks

File Upload & Download Testing

1. File Upload Security

  • Malicious File Upload

    • Test for webshell uploads
    • Check file type validation
    • Test for double extension attacks
    • Verify file content scanning
  • Path Traversal

    • Test for directory traversal
    • Check for file inclusion vulnerabilities
    • Test for path manipulation
    • Verify file system access controls

2. File Download Security

  • Unauthorized File Access
    • Test for direct file access
    • Check for file enumeration
    • Test for sensitive file exposure
    • Verify download authorization

API Security Testing

1. REST API Testing

  • Authentication & Authorization

    • Test API authentication mechanisms
    • Check for API key security
    • Test for token-based authentication
    • Verify API access controls
  • Input Validation

    • Test for API parameter injection
    • Check for mass assignment vulnerabilities
    • Test for API rate limiting
    • Verify input sanitization
  • Insecure Direct Object References

    • Test for IDOR vulnerabilities
    • Check for resource enumeration
    • Test for unauthorized data access
    • Verify proper authorization checks

2. GraphQL Testing

  • GraphQL Security
    • Test for introspection queries
    • Check for query depth attacks
    • Test for query complexity attacks
    • Verify GraphQL authorization

Third-Party Component Testing

1. Log4j2 Vulnerability (CVE-2021-44228)

  • Version Detection

    • Check Log4j2 version in use
    • Verify if version is vulnerable
    • Check for Log4j2 configuration
  • Exploitation Testing

    • Test for JNDI injection
    • Check for LDAP payload execution
    • Test for RMI payload execution
    • Verify DNS payload execution
  • Mitigation Verification
    • Check for Log4j2 2.17.1+ version
    • Verify system property settings
    • Check for network restrictions
    • Test for WAF protection

2. Spring4Shell Vulnerability (CVE-2022-22965)

  • Version Detection

    • Check Spring Framework version
    • Verify if version is vulnerable
    • Check for Spring configuration
  • Exploitation Testing

    • Test for data binding exploitation
    • Check for class loader manipulation
    • Test for remote code execution
    • Verify payload execution

3. Other Third-Party Components

  • Component Inventory
    • Identify all third-party libraries
    • Check for known vulnerabilities
    • Verify component versions
    • Test for component-specific attacks

Denial of Service Testing

1. CVE-2007-6509 Testing

  • Port 5400 Testing
    • Test for crafted packet attacks
    • Check for DoS vulnerability
    • Verify service availability
    • Test for service recovery

2. Application-Level DoS

  • Resource Exhaustion

    • Test for memory exhaustion
    • Check for CPU exhaustion
    • Test for disk space exhaustion
    • Verify resource limits
  • Request Flooding

    • Test for HTTP flood attacks
    • Check for slowloris attacks
    • Test for large payload attacks
    • Verify rate limiting

Configuration & Infrastructure Testing

1. Security Misconfigurations

  • Default Configurations

    • Check for default credentials
    • Verify default service settings
    • Test for debug mode enabled
    • Check for verbose error messages
  • Directory Permissions

    • Check for world-readable files
    • Verify directory permissions
    • Test for sensitive file access
    • Check for backup file exposure

2. SSL/TLS Configuration

  • Certificate Analysis
    • Check certificate validity
    • Verify certificate chain
    • Test for weak ciphers
    • Check for SSL/TLS version support

3. Network Security

  • Firewall Configuration
    • Check for unnecessary open ports
    • Verify network segmentation
    • Test for internal network access
    • Check for DMZ configuration

Business Logic Testing

1. Workflow Security

  • Process Flow Testing
    • Test for workflow bypass
    • Check for step skipping
    • Test for approval bypass
    • Verify process integrity

2. Data Validation

  • Business Rule Testing
    • Test for data validation bypass
    • Check for business logic flaws
    • Test for data manipulation
    • Verify business rule enforcement

Post-Exploitation Testing

1. Privilege Escalation

  • System Privileges
    • Test for local privilege escalation
    • Check for sudo privileges
    • Test for SUID binaries
    • Verify user permissions

2. Data Access

  • Sensitive Data
    • Test for database access
    • Check for file system access
    • Test for configuration access
    • Verify data encryption

3. Persistence

  • Backdoor Installation
    • Test for user account creation
    • Check for service installation
    • Test for scheduled task creation
    • Verify persistence mechanisms

Reporting & Documentation

1. Vulnerability Documentation

  • Finding Documentation
    • Document all vulnerabilities found
    • Assign CVSS scores
    • Provide proof of concept
    • Include remediation steps

2. Risk Assessment

  • Risk Analysis
    • Assess business impact
    • Evaluate exploitability
    • Determine remediation priority
    • Provide risk mitigation strategies

3. Remediation Recommendations

  • Security Improvements
    • Provide specific remediation steps
    • Suggest security controls
    • Recommend monitoring solutions
    • Include best practices

Tools & Resources

1. Automated Testing Tools

  • Vulnerability Scanners
    • Nessus/OpenVAS
    • Burp Suite Professional
    • OWASP ZAP
    • Nikto

2. Manual Testing Tools

  • Network Tools

    • Nmap
    • Netcat
    • Wireshark
    • tcpdump
  • Web Application Tools

    • Burp Suite
    • OWASP ZAP
    • SQLMap
    • XSSer

3. Custom Scripts

  • Exploitation Scripts
    • Log4j2 exploitation
    • Spring4Shell exploitation
    • Access control testing
    • DoS testing

Compliance & Standards

1. Security Standards

  • OWASP Top 10
    • Test for all OWASP Top 10 vulnerabilities
    • Verify compliance with OWASP guidelines
    • Check for OWASP best practices

2. Industry Standards

  • PCI DSS (if applicable)
  • HIPAA (if applicable)
  • SOX (if applicable)
  • ISO 27001 (if applicable)

Continuous Monitoring

1. Security Monitoring

  • Log Analysis
    • Set up security event monitoring
    • Configure alerting for suspicious activities
    • Implement log correlation
    • Verify log integrity

2. Vulnerability Management

  • Regular Assessments
    • Schedule regular penetration tests
    • Implement vulnerability scanning
    • Monitor for new CVEs
    • Maintain patch management process

Disclaimer: This checklist is for authorized security testing only. Always ensure you have proper authorization before testing any systems.