<p class="Body"><em>Open Journal System</em> (OJS) merupakan perangkat lunak yang berfungsi sebagai sarana publikasi ilmiah dan digunakan diseluruh dunia. OJS yang tidak dipantau beresiko diserang oleh <em>hacker</em>. Kerentanan yang di timbulkan oleh <em>hacker</em> akan berakibat buruk terhadap performa dari sebuah OJS. Permasalahan yang dihadapi pada sistem OJS meliputi <em>network</em>, <em>port discover</em>, proses audit <em>exploit</em> sistem OJS. Proses audit sistem pada OJS mencakup <em>SQL Injection</em>, melewati <em>firewall </em>pembobolan <em>password</em>. Parameter input yang digunakan adalah IP<em> </em><em>address</em> dan <em>p</em><em>ort open access</em>. Metode yang digunakan adalah <em>vulnerability assessment</em>. Yang terdiri dari beberapa tahapan seperti <em>information gathering</em> atau <em>footprinting</em>, <em>scanning vulnerability</em>, <em>reporting</em>. Kegiatan ini bertujuan untuk mengidentifikasi celah keamanan pada <em>website o</em><em>pen j</em><em>ournal s</em><em>ystem</em> (OJS). Penelitian ini menggunakan <em>o</em><em>pen w</em><em>eb a</em><em>pplication s</em><em>ecurity p</em><em>roject</em> (OWASP). Pengujian yang telah dilakukan berhasil mengidentifikasi 70 kerentanan<em> high</em>, 1929 <em>medium</em>,<em> </em>4050 <em>low</em> pada OJS, Total nilai <em>vulnerabilit</em>y pada OJS yang di uji coba sebesar 6049. Hasil pengujian yang dilakukan menunjukkan bahwa pada OJS versi 2.4.7 memiliki banyak celah kerentanan atau <em>vulnerability</em>, tidak di rekomendasi untuk digunakan. Gunakanlah versi terbaru yang dikeluarkan oleh pihak OJS <em>Public knowledge project</em> (PKP).</p><p class="Body"> </p><p class="Body"><em><strong>Abstract</strong></em></p><p class="Judul21"><em>The Open Journal System (OJS) is </em><em>A </em><em>software that functions as a means of scientific publication and is used throughout the world. OJS that is not monitored is at risk of being attacked by hackers. Vulnerabilities caused by hackers will adversely affect the performance of an OJS. The problems faced by the OJS system include the network, port discover, OJS system audit exploit process. The system audit process on the OJS includes SQL Injection, bypassing the firewall breaking passwords. The input parameters used are the IP address and open access port. The method used is a vulnerability assessment. Which consists of several stages such as information gathering or footprinting, scanning vulnerability, reporting. This activity aims to identify security holes on the open journal system (OJS) website. This study uses an open web application security project (OWASP). Tests that have been carried out successfully identified 70 vulnerabilities high, 1929 medium, 4050 low in OJS, the total value of vulnerability in OJS which was tested was 6049. The results of tests conducted showed that in OJS version 2.4.7 had many vulnerabilities or vulnerabilities, not on recommendations for use. Use the latest version issued by the OJS Public Knowledge Project (PKP).</em></p><p class="Body"><em><strong><br /></strong></em></p>