You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The analysis step that connects function-call arguments and function definition params is not executed. Thus, the data flow analysis does not traverse function calls. This affects both XSRF and DOM-Clobbering detection. I appended my testcase for XSRF detection. The fetch inside unsafe() is not reached according to the results.
# 1. which webapps to test?testbed:
## option 1: test a specifc websitesite: http://localhost## option 2: provide a top-site list (e.g., Alexa, Tranco, etc)#sitelist: /input/tranco_Y3JG_unique.csv#from_row: 1#to_row: 5000# 2. crawler configurationcrawler:
# max number of urls to visitmaxurls: 2# time budget for crawling each site in secondssitetimeout: 1800# 30 mins;# browser to use for crawlingbrowser:
name: chromeheadless: true# 3. static analysis configurationstaticpass:
# time budget for static analysis of each site in secondssitetimeout: 10800# 3 hrs# max amount of available memory for static analysis per processmemory: 32000# 4. dynamic analysis configurationdynamicpass:
# time budget for dynamic analysis of each site in secondssitetimeout: 10800# 3 hrs# which browser to usebrowser:
name: chrome# use remote browserstack browsers or notuse_browserstack: falsebrowserstack_username: xyzbrowserstack_password: xyzbrowserstack_access_key: xyz# 5. choose the vulnerability analysis component to run# only one component must have the `enable` option as truegeneral_vuln_analysis:
# performs a general vulnerability analysis (i.e., more than one vulnerability class)# when enabled, other vulnerability-specific components (as configured below) # will not run individually anymoreenable: falsedomclobbering:
enabled: false# enable or disable the passes, useful for large-scale analysis # e.g., first crawl all websites, then analyze them,# as opposed to crawling and analyzing sequentially at the same timepasses:
crawling: truestatic: truestatic_neo4j: truedynamic: truecs_csrf:
enabled: truepasses:
crawling: truestatic: truestatic_neo4j: true
As far as I can tell, this block is never executed. Thus, _get_all_call_values_of is never executed. Is it possible that the graph layout changed, and the traversal code must be adapted?
Hi, thanks a lot for your report. It seems that we encountered this issue before and had it fixed on a newer version of JAW, which will be released soon. Until then, I updated the affected file here with the latest version. Let me know if this change fixed the problem.
The analysis step that connects function-call arguments and function definition params is not executed. Thus, the data flow analysis does not traverse function calls. This affects both XSRF and DOM-Clobbering detection. I appended my testcase for XSRF detection. The
fetch
insideunsafe()
is not reached according to the results.website hosted at http://localhost:
config.yaml
sink.flows.out:
The text was updated successfully, but these errors were encountered: