π― clarin.com - Phase 4 Security Scan
Date: 2026-02-09 18:15 UTC
Scanner: Bounty Hunt CLI v4.0 (Phase 4)
Target: https://www.clarin.com
Metric
Result
Overall Risk Score
75/100 (High) π΄
Critical Issues
2
High Issues
1
Medium Issues
1
Low Issues
1
1. Dangerous HTTP Methods Enabled
Severity: CRITICAL π΄
Risk Score: 100/100
Method
Status
Severity
Impact
PUT
β
Allowed
CRITICAL
Allows uploading/modifying files on server
DELETE
β
Allowed
CRITICAL
Allows deleting resources on server
CONNECT
β
Allowed
HIGH
Allows tunneling (proxy abuse)
PATCH
β
Allowed
MEDIUM
Allows patching resources
All Allowed Methods: DELETE, OPTIONS, PUT, PATCH, GET, CONNECT, HEAD
Recommendation: Disable PUT, DELETE, CONNECT, and PATCH methods on production web servers. Only allow GET, HEAD, POST, and OPTIONS.
Metric
Value
Endpoints Found
8
Hidden/Sensitive
5
Risk Score
High
URL
Status
Notes
/login
200
Login page
/videos
200
Video section
/wp-login
200
WordPress login (interesting for news site)
/.env
403
Blocked (good)
/.git
403
Blocked (good)
/.svn
403
Blocked (good)
/.hg
403
Blocked (good)
/phpinfo.php
403
Blocked (good)
Positive: Sensitive files (.env, .git, etc.) return 403 Forbidden
Metric
Value
JS Files Scanned
20
Endpoints Extracted
8
API References
Found
Extracted Endpoints: FCCDCF, code, state, content-type, api
Check
Status
SPF Record
β
Valid
DKIM
β οΈ Not detected
DMARC
β οΈ Not detected
Risk Score
15 (Low)
Metric
Value
Cookies Set
1
Security Issues
0
Risk Score
0
π Serialization Testing
Metric
Value
Formats Detected
0
Vulnerabilities
0
Risk Score
0
Metric
Value
Buckets Found
0
Exposed Buckets
0
Metric
Value
JS Files Scanned
Multiple
Credentials Found
0
π‘οΈ Security Posture Summary
#
Issue
Severity
Status
1
PUT method enabled
CRITICAL
β οΈ Needs Fix
2
DELETE method enabled
CRITICAL
β οΈ Needs Fix
3
CONNECT method enabled
HIGH
β οΈ Needs Fix
4
PATCH method enabled
MEDIUM
β οΈ Needs Fix
5
Missing DKIM/DMARC
LOW
Recommended
Positive Security Controls
β
Sensitive files blocked (403)
β
SPF email authentication
β
No exposed API keys
β
No insecure deserialization
β
No exposed cloud buckets
β
Secure cookies
π― Remediation Priority
[CRITICAL] Disable PUT method on web server
[CRITICAL] Disable DELETE method on web server
[HIGH] Disable CONNECT method (prevents proxy abuse)
[MEDIUM] Disable PATCH method
[LOW] Configure DKIM and DMARC for email security
Server Response Headers
Blocks access to sensitive paths
Returns 403 for common sensitive files
Has WordPress installation (wp-login endpoint)
HTTP Methods: +100 (critical methods enabled)
Email: +15 (missing DKIM/DMARC)
Endpoints: +10 (wp-login exposed)
Mitigated: -50 (sensitive files blocked, no exposed secrets)
Final Score: 75/100
This scan was performed for educational and research purposes only. The findings should be reported through proper responsible disclosure channels.
Generated by Bounty Hunt CLI v4.0
https://github.com/ArielFuggini/bounty-hunter