Introduction
We express our gratitude to the Extsy team for the collaborative engagement that enabled the execution of this Pentest.
Extsy is a comprehensive cryptocurrency platform that enables users to swap, trade, buy and sell digital assets, and participate in raffles. Extsy offers features such as P2P trading, virtual cards, and the option to upgrade to Extsy Premium for enhanced services.
Document | |
|---|---|
| Name | Pentest and Security Analysis Report for Extsy |
| Audited By | Faizan Nehal |
| Approved By | Stephen Ajayi |
| Website | https://extsy.com→ |
| Changelog | 17/03/2025 - Preliminary Report |
| Changelog | 21/03/2025 - Final Report |
| Changelog | 25/03/2025 - Final Report II |
| Changelog | 26/03/2025 - Final Report III |
| Methodology | https://hackenio.cc/pentest_methodology→ |
Document
- Name
- Pentest and Security Analysis Report for Extsy
- Audited By
- Faizan Nehal
- Approved By
- Stephen Ajayi
- Website
- https://extsy.com→
- Changelog
- 17/03/2025 - Preliminary Report
- Changelog
- 21/03/2025 - Final Report
- Changelog
- 25/03/2025 - Final Report II
- Changelog
- 26/03/2025 - Final Report III
- Methodology
- https://hackenio.cc/pentest_methodology→
Review Scope | |
|---|---|
| Web URL | https://extsy.com→ |
Review Scope
- Web URL
- https://extsy.com→
Audit Summary
The system users should acknowledge all the risks summed up in the risks section of the report
Threat Model Overview
This model highlights key attack vectors and security concerns identified through both manual and automated penetration testing of Extsy’s staging web platform, APIs, authentication systems, and network architecture.
Manual Testing Highlights
Broken Access Control:
Scenario: Modifying user or account identifiers within API requests to gain unauthorized access to restricted data, possibly leading to unauthorized fund movements.
Authentication Issues:
Scenario: Weak password enforcement, absence of multi-factor authentication (MFA), and the use of outdated authentication libraries.
Sensitive Information Disclosure:
Scenario: API responses leaking private keys, wallet addresses, or personally identifiable information (PII) related to KYC processes.
Rate Limiting Weaknesses:
Scenario: Insufficient request rate restrictions, making the system susceptible to brute-force attacks or denial-of-service (DoS) attacks, such as repeated OTP request abuse.
Security Misconfigurations:
Scenario: Publicly accessible admin panels, default login credentials, and overly verbose error messages that disclose critical system information.
Injection Attacks:
Scenario: Failure to properly sanitize input fields, leaving the system vulnerable to SQL/NoSQL injection attacks and remote code execution.
XSS & CSRF Vulnerabilities:
Scenario: Malicious script injection or forged requests leading to unauthorized actions, session hijacking, or privilege escalation.
Race-Condition Exploits:
Scenario: Timing-based attack techniques used to manipulate transaction execution, potentially enabling double-spending or unauthorized fund withdrawals..
Automated Testing Highlights
Directory & File Enumeration:
Scenario: Tools like Dirsearch and FFuF revealing unprotected directories or configuration files containing sensitive information.
API Security Testing:
Scenario: Automated vulnerability scanning (e.g., using Burp Suite) exposing weak access controls and a lack of rate-limiting mechanisms.
Web Application Scanning:
Scenario: Security scanners such as Nessus and Nikto detecting injection flaws (SQLi, XSS) and improper security configurations.
Security Header & Port Analysis:
Scenario: Nmap scans uncovering absent security headers (e.g., X-Frame-Options, HSTS), increasing exposure to attacks like clickjacking.
Injection Testing:
Scenario: Tools such as SQLmap and Ghauri identifying injection vulnerabilities across multiple API endpoints.
System Overview
Extsy is a comprehensive cryptocurrency platform that enables users to swap, trade, buy and sell digital assets, and participate in raffles. Extsy offers features such as P2P trading, virtual cards, and the option to upgrade to Extsy Premium for enhanced services.
Extsy provides a comprehensive range of other services, including P2P trading, AML checks, virtual card management, and participation in raffles. Users can enhance their experience by upgrading to Extsy Elite, which unlocks premium features such as increased cashback.
Extsy provides a user-friendly platform where users can seamlessly buy, sell, swap, and trade cryptocurrencies. It allows you to manage your wallet, track transactions, and access the best market rates.
Findings
Code ― | Title | Status | Severity | |
|---|---|---|---|---|
| F-2025-9157 | Account Deletion Without Password or 2FA Verification | fixed | High | |
| F-2025-9022 | Insufficient Access Control Allows Unauthorized P2P Order Cancellations | fixed | High | |
| F-2025-9021 | Improper Access Control in Ad Posting Allows Unauthorized Listings Under Victim Accounts | fixed | High | |
| F-2025-9016 | Unauthorized Deletion of Ads via Manipulated API Requests | fixed | High | |
| F-2025-9014 | Unauthorized Payment Method Addition to Victim’s Account | fixed | High | |
| F-2025-9117 | Insufficient Rate Limiting on OTP Verification for Device Authentication | fixed | Medium | |
| F-2025-9113 | Persistent Active Sessions After Password Change | fixed | Medium | |
| F-2025-9024 | Improper File Upload Validation Allows Malicious SVG Files to be Stored | fixed | Medium | |
| F-2025-9023 | Exposure of Sensitive User Information in Raffle Update Response | fixed | Medium | |
| F-2025-9015 | Unauthorized Deletion of Victim’s Payment Method via ID Parameter Manipulation | fixed | Medium |
Appendix 1. Severity Definitions
Severity | Description |
|---|---|
Critical | These issues present a major security vulnerability that poses a severe risk to the system. They require immediate attention and must be resolved to prevent a potential security breach or other significant harm. |
High | These issues present a significant risk to the system, but may not require immediate attention. They should be addressed in a timely manner to reduce the risk of the potential security breach. |
Medium | These issues present a moderate risk to the system and cannot have a great impact on its function. They should be addressed in a reasonable time frame, but may not require immediate attention. |
Low | These issues present no risk to the system and typically relate to the code quality problems or general recommendations. They do not require immediate attention and should be viewed as a minor recommendation. |
Severity
- Critical
Description
- These issues present a major security vulnerability that poses a severe risk to the system. They require immediate attention and must be resolved to prevent a potential security breach or other significant harm.
Severity
- High
Description
- These issues present a significant risk to the system, but may not require immediate attention. They should be addressed in a timely manner to reduce the risk of the potential security breach.
Severity
- Medium
Description
- These issues present a moderate risk to the system and cannot have a great impact on its function. They should be addressed in a reasonable time frame, but may not require immediate attention.
Severity
- Low
Description
- These issues present no risk to the system and typically relate to the code quality problems or general recommendations. They do not require immediate attention and should be viewed as a minor recommendation.
Appendix 2. Scope
The testing was conducted in the staging environment but all the fixes were deployed to production as well. Scope of the project includes the following.
Scope Details | |
|---|---|
| Web App | https://extsy.com→ |
| Wallet Layer | https://prod-wallet-layer.extsy.com/→ |
| Exchange Layer | https://prod-exchange-layer.extsy.com/→ |
| App Layer | https://prod-app-layer.extsy.com/→ |
Scope Details
- Web App
- https://extsy.com→
- Wallet Layer
- https://prod-wallet-layer.extsy.com/→
- Exchange Layer
- https://prod-exchange-layer.extsy.com/→
- App Layer
- https://prod-app-layer.extsy.com/→