From 5e200c0e0a282ab1a198dd465a5bc5e727246887 Mon Sep 17 00:00:00 2001 From: zapbot <12745184+zapbot@users.noreply.github.com> Date: Fri, 7 Nov 2025 15:03:17 +0000 Subject: [PATCH] Update site content From: zaproxy/zaproxy-website@e802a20f59b3f2a2896ec101f325715ea2b9d448 Signed-off-by: zapbot <12745184+zapbot@users.noreply.github.com> --- addons/index.html | 18 +- .../addons/automation-framework/index.html | 1 + .../addons/report-generation/index.xml | 8 +- .../report-traditional-json-plus/index.html | 3 + .../report-traditional-json/index.html | 3 + .../report-traditional-markdown/index.html | 3 + .../report-traditional-xml-plus/index.html | 3 + .../report-traditional-xml/index.html | 8 +- docs/sbom/authhelper/index.html | 6 +- docs/sbom/automation/index.html | 4 +- docs/sbom/index.html | 2 +- docs/sbom/reports/index.html | 256 +++++++++++++----- docs/statistics/index.xml | 2 +- .../top-addons-last-month/index.html | 2 +- index.xml | 19 +- search/index.json | 24 +- 16 files changed, 252 insertions(+), 110 deletions(-) diff --git a/addons/index.html b/addons/index.html index 8bff0da894..87338acc88 100644 --- a/addons/index.html +++ b/addons/index.html @@ -456,7 +456,7 @@

ZAP Marketplace

Repository - Download + Download @@ -469,7 +469,7 @@

ZAP Marketplace

authhelper - 0.31.0 + 0.32.0 beta @@ -478,7 +478,7 @@

ZAP Marketplace

ZAP Dev Team - 2025-11-05 + 2025-11-07 @@ -524,7 +524,7 @@

ZAP Marketplace

Repository - Download + Download @@ -537,7 +537,7 @@

ZAP Marketplace

automation - 0.55.0 + 0.56.0 beta @@ -546,7 +546,7 @@

ZAP Marketplace

ZAP Dev Team - 2025-11-05 + 2025-11-07 @@ -3075,7 +3075,7 @@

ZAP Marketplace

Repository - Download + Download @@ -3088,7 +3088,7 @@

ZAP Marketplace

reports - 0.41.0 + 0.42.0 release @@ -3097,7 +3097,7 @@

ZAP Marketplace

ZAP Dev Team - 2025-09-04 + 2025-11-07 diff --git a/docs/desktop/addons/automation-framework/index.html b/docs/desktop/addons/automation-framework/index.html index e50e995f8c..12c54068ba 100644 --- a/docs/desktop/addons/automation-framework/index.html +++ b/docs/desktop/addons/automation-framework/index.html @@ -1865,6 +1865,7 @@

Command Line Options Exit Codes

diff --git a/docs/desktop/addons/report-generation/index.xml b/docs/desktop/addons/report-generation/index.xml index cd50ccdcef..92130275a3 100644 --- a/docs/desktop/addons/report-generation/index.xml +++ b/docs/desktop/addons/report-generation/index.xml @@ -89,14 +89,14 @@ /docs/desktop/addons/report-generation/report-traditional-json/ Mon, 01 Jan 0001 00:00:00 +0000 /docs/desktop/addons/report-generation/report-traditional-json/ - <h1 id="traditional-json-report">Traditional JSON Report</h1> <h3 id="sample">Sample <a class="header-link" href="#sample"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h3> <pre tabindex="0"><code>{ &#34;@version&#34;: &#34;Dev Build&#34;, &#34;@generated&#34;: &#34;Fri, 4 Feb 2022 13:04:51&#34;, &#34;created&#34;: &#34;2022-02-04T13:04:51.236211400Z&#34;, &#34;site&#34;:[ { &#34;@name&#34;: &#34;http://localhost:8080&#34;, &#34;@host&#34;: &#34;localhost&#34;, &#34;@port&#34;: &#34;8080&#34;, &#34;@ssl&#34;: &#34;false&#34;, &#34;alerts&#34;: [ { &#34;pluginid&#34;: &#34;40012&#34;, &#34;alertRef&#34;: &#34;40012&#34;, &#34;alert&#34;: &#34;Cross Site Scripting (Reflected)&#34;, &#34;name&#34;: &#34;Cross Site Scripting (Reflected)&#34;, &#34;riskcode&#34;: &#34;3&#34;, &#34;confidence&#34;: &#34;2&#34;, &#34;riskdesc&#34;: &#34;High (Medium)&#34;, &#34;desc&#34;: &#34;&lt;p&gt;Cross-site Scripting (XSS) is an attack technique that involves ...&lt;/p&gt;&#34;, &#34;instances&#34;:[ { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E&#34;, &#34;method&#34;: &#34;GET&#34;, &#34;param&#34;: &#34;q&#34;, &#34;attack&#34;: &#34;&lt;/font&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;font&gt;&#34;, &#34;evidence&#34;: &#34;&lt;/font&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;font&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34; }, { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/contact.jsp&#34;, &#34;method&#34;: &#34;POST&#34;, &#34;param&#34;: &#34;comments&#34;, &#34;attack&#34;: &#34;&lt;/td&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;td&gt;&#34;, &#34;evidence&#34;: &#34;&lt;/td&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;td&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34; } ], &#34;count&#34;: &#34;2&#34;, &#34;solution&#34;: &#34;&lt;p&gt;Phase: Architecture and Design&lt;/p&gt;&lt;p&gt;Use a vetted library or framework that does not ...&lt;/p&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34;, &#34;reference&#34;: &#34;&lt;p&gt;http://projects.webappsec.org/Cross-Site-Scripting&lt;/p&gt;&lt;p&gt;http://cwe.mitre.org/data/definitions/79.html&lt;/p&gt;&#34;, &#34;cweid&#34;: &#34;79&#34;, &#34;wascid&#34;: &#34;8&#34;, &#34;sourceid&#34;: &#34;36977&#34; }, </code></pre><p>The report can also include details of Sequences and related active scanning results, for example:</p> + <h1 id="traditional-json-report">Traditional JSON Report</h1> <h3 id="sample">Sample <a class="header-link" href="#sample"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h3> <pre tabindex="0"><code>{ &#34;@version&#34;: &#34;Dev Build&#34;, &#34;@generated&#34;: &#34;Fri, 4 Feb 2022 13:04:51&#34;, &#34;created&#34;: &#34;2022-02-04T13:04:51.236211400Z&#34;, &#34;site&#34;:[ { &#34;@name&#34;: &#34;http://localhost:8080&#34;, &#34;@host&#34;: &#34;localhost&#34;, &#34;@port&#34;: &#34;8080&#34;, &#34;@ssl&#34;: &#34;false&#34;, &#34;alerts&#34;: [ { &#34;pluginid&#34;: &#34;40012&#34;, &#34;alertRef&#34;: &#34;40012&#34;, &#34;alert&#34;: &#34;Cross Site Scripting (Reflected)&#34;, &#34;name&#34;: &#34;Cross Site Scripting (Reflected)&#34;, &#34;riskcode&#34;: &#34;3&#34;, &#34;confidence&#34;: &#34;2&#34;, &#34;riskdesc&#34;: &#34;High (Medium)&#34;, &#34;desc&#34;: &#34;&lt;p&gt;Cross-site Scripting (XSS) is an attack technique that involves ...&lt;/p&gt;&#34;, &#34;instances&#34;:[ { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E&#34;, &#34;nodeName&#34;: &#34;http://localhost:8080/bodgeit/search.jsp (q)&#34;, &#34;method&#34;: &#34;GET&#34;, &#34;param&#34;: &#34;q&#34;, &#34;attack&#34;: &#34;&lt;/font&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;font&gt;&#34;, &#34;evidence&#34;: &#34;&lt;/font&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;font&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34; }, { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/contact.jsp&#34;, &#34;nodeName&#34;: &#34;http://localhost:8080/bodgeit/contact.jsp&#34;, &#34;method&#34;: &#34;POST&#34;, &#34;param&#34;: &#34;comments&#34;, &#34;attack&#34;: &#34;&lt;/td&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;td&gt;&#34;, &#34;evidence&#34;: &#34;&lt;/td&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;td&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34; } ], &#34;count&#34;: &#34;2&#34;, &#34;systemic&#34;: false, &#34;solution&#34;: &#34;&lt;p&gt;Phase: Architecture and Design&lt;/p&gt;&lt;p&gt;Use a vetted library or framework that does not ...&lt;/p&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34;, &#34;reference&#34;: &#34;&lt;p&gt;http://projects.webappsec.org/Cross-Site-Scripting&lt;/p&gt;&lt;p&gt;http://cwe.mitre.org/data/definitions/79.html&lt;/p&gt;&#34;, &#34;cweid&#34;: &#34;79&#34;, &#34;wascid&#34;: &#34;8&#34;, &#34;sourceid&#34;: &#34;36977&#34; }, </code></pre><p>The report can also include details of Sequences and related active scanning results, for example:</p> Traditional JSON Report with Requests and Responses /docs/desktop/addons/report-generation/report-traditional-json-plus/ Mon, 01 Jan 0001 00:00:00 +0000 /docs/desktop/addons/report-generation/report-traditional-json-plus/ - <h1 id="traditional-json-report-with-requests-and-responses">Traditional JSON Report with Requests and Responses</h1> <h3 id="sections">Sections <a class="header-link" href="#sections"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h3> <table> <thead> <tr> <th style="text-align: left">Section</th> <th style="text-align: left">ID</th> </tr> </thead> <tbody> <tr> <td style="text-align: left">Statistics</td> <td style="text-align: left">statistics</td> </tr> <tr> <td style="text-align: left">Sequence Details</td> <td style="text-align: left">sequencedetails</td> </tr> <tr> <td style="text-align: left">Automation Framework State</td> <td style="text-align: left">afstate</td> </tr> </tbody> </table> <h3 id="sample">Sample <a class="header-link" href="#sample"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h3> <pre tabindex="0"><code>{ &#34;@version&#34;: &#34;Dev Build&#34;, &#34;@generated&#34;: &#34;Fri, 4 Feb 2022 13:04:51&#34;, &#34;created&#34;: &#34;2022-02-04T13:04:51.236211400Z&#34;, &#34;site&#34;:[ { &#34;@name&#34;: &#34;http://localhost:8080&#34;, &#34;@host&#34;: &#34;localhost&#34;, &#34;@port&#34;: &#34;8080&#34;, &#34;@ssl&#34;: &#34;false&#34;, &#34;alerts&#34;: [ { &#34;pluginid&#34;: &#34;40012&#34;, &#34;alertRef&#34;: &#34;40012&#34;, &#34;alert&#34;: &#34;Cross Site Scripting (Reflected)&#34;, &#34;name&#34;: &#34;Cross Site Scripting (Reflected)&#34;, &#34;riskcode&#34;: &#34;3&#34;, &#34;confidence&#34;: &#34;2&#34;, &#34;riskdesc&#34;: &#34;High (Medium)&#34;, &#34;desc&#34;: &#34;&lt;p&gt;Cross-site Scripting (XSS) is an attack technique that involves ...&lt;/p&gt;&#34;, &#34;instances&#34;:[ { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E&#34;, &#34;method&#34;: &#34;GET&#34;, &#34;param&#34;: &#34;q&#34;, &#34;attack&#34;: &#34;&lt;/font&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;font&gt;&#34;, &#34;evidence&#34;: &#34;&lt;/font&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;font&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34;, &#34;request-header&#34;: &#34;GET http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E HTTP/1.1\r\n...&#34;, &#34;request-body&#34;: &#34;&#34;, &#34;response-header&#34;: &#34;HTTP/1.1 200\r\nContent-Type: text/html;charset=ISO-8859-1\r\nContent-Length: 2045\r\nDate: Fri, 04 Feb 2022 11:56:38 GMT\r\n\r\n&#34;, &#34;response-body&#34;: &#34;\n\n\n\n\n\n\n&lt;!DOCTYPE HTML PUBLIC \&#34;-//W3C//DTD HTML 3.2//EN\&#34;&gt;\n&lt;html&gt;...&#34; }, { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/contact.jsp&#34;, &#34;method&#34;: &#34;POST&#34;, &#34;param&#34;: &#34;comments&#34;, &#34;attack&#34;: &#34;&lt;/td&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;td&gt;&#34;, &#34;evidence&#34;: &#34;&lt;/td&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;td&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34;, &#34;request-header&#34;: &#34;POST http://localhost:8080/bodgeit/contact.jsp HTTP/1.1\r\nHost: localhost:8080\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0)...&#34;, &#34;request-body&#34;: &#34;null=&amp;anticsrf=0.7583553183173598&amp;comments=%3C%2Ftd%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Ctd%3E&#34;, &#34;response-header&#34;: &#34;HTTP/1.1 200\r\nContent-Type: text/html;charset=ISO-8859-1\r\nContent-Length: 2025\r\nDate: Fri, 04 Feb 2022 11:56:35 GMT\r\n\r\n&#34;, &#34;response-body&#34;: &#34;\n\n\n\n\n\n&lt;!DOCTYPE HTML PUBLIC \&#34;-//W3C//DTD HTML 3.2//EN\&#34;&gt;\n&lt;html&gt;...&#34; } ], &#34;count&#34;: &#34;2&#34;, &#34;solution&#34;: &#34;&lt;p&gt;Phase: Architecture and Design&lt;/p&gt;&lt;p&gt;Use a vetted library or framework that does not ...&lt;/p&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34;, &#34;reference&#34;: &#34;&lt;p&gt;http://projects.webappsec.org/Cross-Site-Scripting&lt;/p&gt;&lt;p&gt;http://cwe.mitre.org/data/definitions/79.html&lt;/p&gt;&#34;, &#34;cweid&#34;: &#34;79&#34;, &#34;wascid&#34;: &#34;8&#34;, &#34;sourceid&#34;: &#34;36977&#34;, &#34;tags&#34;:[ { &#34;tag&#34;: &#34;OWASP_2021_A03&#34;, &#34;link&#34;: &#34;https://owasp.org/Top10/A03_2021-Injection/&#34; }, { &#34;tag&#34;: &#34;WSTG-v42-INPV-01&#34;, &#34;link&#34;: &#34;https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting&#34; }, { &#34;tag&#34;: &#34;OWASP_2017_A07&#34;, &#34;link&#34;: &#34;https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS).html&#34; } ] }, ... ] } ] } </code></pre> <h4 id="statistics-section">Statistics Section <a class="header-link" href="#statistics-section"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h4> <p>The report can also include statistics, per site and global, for example:</p> + <h1 id="traditional-json-report-with-requests-and-responses">Traditional JSON Report with Requests and Responses</h1> <h3 id="sections">Sections <a class="header-link" href="#sections"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h3> <table> <thead> <tr> <th style="text-align: left">Section</th> <th style="text-align: left">ID</th> </tr> </thead> <tbody> <tr> <td style="text-align: left">Statistics</td> <td style="text-align: left">statistics</td> </tr> <tr> <td style="text-align: left">Sequence Details</td> <td style="text-align: left">sequencedetails</td> </tr> <tr> <td style="text-align: left">Automation Framework State</td> <td style="text-align: left">afstate</td> </tr> </tbody> </table> <h3 id="sample">Sample <a class="header-link" href="#sample"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h3> <pre tabindex="0"><code>{ &#34;@version&#34;: &#34;Dev Build&#34;, &#34;@generated&#34;: &#34;Fri, 4 Feb 2022 13:04:51&#34;, &#34;created&#34;: &#34;2022-02-04T13:04:51.236211400Z&#34;, &#34;site&#34;:[ { &#34;@name&#34;: &#34;http://localhost:8080&#34;, &#34;@host&#34;: &#34;localhost&#34;, &#34;@port&#34;: &#34;8080&#34;, &#34;@ssl&#34;: &#34;false&#34;, &#34;alerts&#34;: [ { &#34;pluginid&#34;: &#34;40012&#34;, &#34;alertRef&#34;: &#34;40012&#34;, &#34;alert&#34;: &#34;Cross Site Scripting (Reflected)&#34;, &#34;name&#34;: &#34;Cross Site Scripting (Reflected)&#34;, &#34;riskcode&#34;: &#34;3&#34;, &#34;confidence&#34;: &#34;2&#34;, &#34;riskdesc&#34;: &#34;High (Medium)&#34;, &#34;desc&#34;: &#34;&lt;p&gt;Cross-site Scripting (XSS) is an attack technique that involves ...&lt;/p&gt;&#34;, &#34;instances&#34;:[ { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E&#34;, &#34;nodeName&#34;: &#34;http://localhost:8080/bodgeit/search.jsp (q)&#34;, &#34;method&#34;: &#34;GET&#34;, &#34;param&#34;: &#34;q&#34;, &#34;attack&#34;: &#34;&lt;/font&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;font&gt;&#34;, &#34;evidence&#34;: &#34;&lt;/font&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;font&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34;, &#34;request-header&#34;: &#34;GET http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E HTTP/1.1\r\n...&#34;, &#34;request-body&#34;: &#34;&#34;, &#34;response-header&#34;: &#34;HTTP/1.1 200\r\nContent-Type: text/html;charset=ISO-8859-1\r\nContent-Length: 2045\r\nDate: Fri, 04 Feb 2022 11:56:38 GMT\r\n\r\n&#34;, &#34;response-body&#34;: &#34;\n\n\n\n\n\n\n&lt;!DOCTYPE HTML PUBLIC \&#34;-//W3C//DTD HTML 3.2//EN\&#34;&gt;\n&lt;html&gt;...&#34; }, { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/contact.jsp&#34;, &#34;nodeName&#34;: &#34;http://localhost:8080/bodgeit/contact.jsp&#34;, &#34;method&#34;: &#34;POST&#34;, &#34;param&#34;: &#34;comments&#34;, &#34;attack&#34;: &#34;&lt;/td&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;td&gt;&#34;, &#34;evidence&#34;: &#34;&lt;/td&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;td&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34;, &#34;request-header&#34;: &#34;POST http://localhost:8080/bodgeit/contact.jsp HTTP/1.1\r\nHost: localhost:8080\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0)...&#34;, &#34;request-body&#34;: &#34;null=&amp;anticsrf=0.7583553183173598&amp;comments=%3C%2Ftd%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Ctd%3E&#34;, &#34;response-header&#34;: &#34;HTTP/1.1 200\r\nContent-Type: text/html;charset=ISO-8859-1\r\nContent-Length: 2025\r\nDate: Fri, 04 Feb 2022 11:56:35 GMT\r\n\r\n&#34;, &#34;response-body&#34;: &#34;\n\n\n\n\n\n&lt;!DOCTYPE HTML PUBLIC \&#34;-//W3C//DTD HTML 3.2//EN\&#34;&gt;\n&lt;html&gt;...&#34; } ], &#34;count&#34;: &#34;2&#34;, &#34;systemic&#34;: false, &#34;solution&#34;: &#34;&lt;p&gt;Phase: Architecture and Design&lt;/p&gt;&lt;p&gt;Use a vetted library or framework that does not ...&lt;/p&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34;, &#34;reference&#34;: &#34;&lt;p&gt;http://projects.webappsec.org/Cross-Site-Scripting&lt;/p&gt;&lt;p&gt;http://cwe.mitre.org/data/definitions/79.html&lt;/p&gt;&#34;, &#34;cweid&#34;: &#34;79&#34;, &#34;wascid&#34;: &#34;8&#34;, &#34;sourceid&#34;: &#34;36977&#34;, &#34;tags&#34;:[ { &#34;tag&#34;: &#34;OWASP_2021_A03&#34;, &#34;link&#34;: &#34;https://owasp.org/Top10/A03_2021-Injection/&#34; }, { &#34;tag&#34;: &#34;WSTG-v42-INPV-01&#34;, &#34;link&#34;: &#34;https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting&#34; }, { &#34;tag&#34;: &#34;OWASP_2017_A07&#34;, &#34;link&#34;: &#34;https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS).html&#34; } ] }, ... ] } ] } </code></pre> <h4 id="statistics-section">Statistics Section <a class="header-link" href="#statistics-section"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h4> <p>The report can also include statistics, per site and global, for example:</p> Traditional Markdown Report @@ -117,14 +117,14 @@ /docs/desktop/addons/report-generation/report-traditional-xml/ Mon, 01 Jan 0001 00:00:00 +0000 /docs/desktop/addons/report-generation/report-traditional-xml/ - <h1 id="traditional-xml-report">Traditional XML Report</h1> <h3 id="sample">Sample <a class="header-link" href="#sample"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h3> <pre tabindex="0"><code>&lt;?xml version=&#34;1.0&#34;?&gt; &lt;OWASPZAPReport version=&#34;Dev Build&#34; generated=&#34;Fri, 4 Feb 2022 17:42:18&#34; created=&#34;2022-02-04T17:42:18.236211400Z&#34;&gt; &lt;site name=&#34;http://localhost:8080&#34; host=&#34;localhost&#34; port=&#34;8080&#34; ssl=&#34;false&#34;&gt; &lt;alerts&gt; &lt;alertitem&gt; &lt;pluginid&gt;20012&lt;/pluginid&gt; &lt;alertRef&gt;20012&lt;/alertRef&gt; &lt;alert&gt;Anti-CSRF Tokens Check&lt;/alert&gt; &lt;name&gt;Anti-CSRF Tokens Check&lt;/name&gt; &lt;riskcode&gt;3&lt;/riskcode&gt; &lt;confidence&gt;2&lt;/confidence&gt; &lt;riskdesc&gt;High (Medium)&lt;/riskdesc&gt; &lt;confidencedesc&gt;Medium&lt;/confidencedesc&gt; &lt;desc&gt;&lt;p&gt;A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge...&lt;/desc&gt; &lt;instances&gt; &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/advanced.jsp&lt;/uri&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;form id=&#34;advanced&#34; name=&#34;advanced&#34; method=&#34;POST&#34; onsubmit=&#34;return validateForm(this);false;&#34;&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;/instance&gt; &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/advanced.jsp&lt;/uri&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;form id=&#34;query&#34; name=&#34;advanced&#34; method=&#34;POST&#34;&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;/instance&gt; &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/basket.jsp&lt;/uri&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;form action=&#34;basket.jsp&#34; method=&#34;post&#34;&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;/instance&gt; </code></pre> + <h1 id="traditional-xml-report">Traditional XML Report</h1> <h3 id="sample">Sample <a class="header-link" href="#sample"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h3> <pre tabindex="0"><code>&lt;?xml version=&#34;1.0&#34;?&gt; &lt;OWASPZAPReport version=&#34;Dev Build&#34; generated=&#34;Fri, 4 Feb 2022 17:42:18&#34; created=&#34;2022-02-04T17:42:18.236211400Z&#34;&gt; &lt;site name=&#34;http://localhost:8080&#34; host=&#34;localhost&#34; port=&#34;8080&#34; ssl=&#34;false&#34;&gt; &lt;alerts&gt; &lt;alertitem&gt; &lt;pluginid&gt;20012&lt;/pluginid&gt; &lt;alertRef&gt;20012&lt;/alertRef&gt; &lt;alert&gt;Anti-CSRF Tokens Check&lt;/alert&gt; &lt;name&gt;Anti-CSRF Tokens Check&lt;/name&gt; &lt;riskcode&gt;3&lt;/riskcode&gt; &lt;confidence&gt;2&lt;/confidence&gt; &lt;riskdesc&gt;High (Medium)&lt;/riskdesc&gt; &lt;confidencedesc&gt;Medium&lt;/confidencedesc&gt; &lt;desc&gt;&lt;p&gt;A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge...&lt;/desc&gt; &lt;instances&gt; &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/advanced.jsp&lt;/uri&gt; &lt;nodeName&gt;http://localhost:8080/bodgeit/advanced.jsp&lt;/nodeName&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;form id=&#34;advanced&#34; name=&#34;advanced&#34; method=&#34;POST&#34; onsubmit=&#34;return validateForm(this);false;&#34;&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;/instance&gt; &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/advanced.jsp&lt;/uri&gt; &lt;nodeName&gt;http://localhost:8080/bodgeit/advanced.jsp&lt;/nodeName&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;form id=&#34;query&#34; name=&#34;advanced&#34; method=&#34;POST&#34;&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;/instance&gt; &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/basket.jsp&lt;/uri&gt; &lt;nodeName&gt;http://localhost:8080/bodgeit/basket.jsp&lt;/nodeName&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;form action=&#34;basket.jsp&#34; method=&#34;post&#34;&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;/instance&gt; &lt;count&gt;2&lt;/count&gt; &lt;systemic&gt;false&lt;/systemic&gt; &lt;solution&gt;The solution&lt;/solution&gt; &lt;otherinfo&gt;The other info&lt;/otherinfo&gt; </code></pre> Traditional XML Report with Requests and Responses /docs/desktop/addons/report-generation/report-traditional-xml-plus/ Mon, 01 Jan 0001 00:00:00 +0000 /docs/desktop/addons/report-generation/report-traditional-xml-plus/ - <h1 id="traditional-xml-report-with-requests-and-responses">Traditional XML Report with Requests and Responses</h1> <h3 id="sample">Sample <a class="header-link" href="#sample"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h3> <pre tabindex="0"><code> &lt;?xml version=&#34;1.0&#34;?&gt; &lt;OWASPZAPReport version=&#34;2.11.1&#34; generated=&#34;Fr., 30 Sep. 2022 08:40:35&#34; created=&#34;2022-09-30T08:40:35.236211400Z&#34;&gt; &lt;site name=&#34;http://localhost:8080&#34; host=&#34;localhost&#34; port=&#34;8080&#34; ssl=&#34;false&#34;&gt; &lt;alerts&gt; &lt;alertitem&gt; &lt;pluginid&gt;90027&lt;/pluginid&gt; &lt;alertRef&gt;90027&lt;/alertRef&gt; &lt;alert&gt;Cookie Slack Detector&lt;/alert&gt; &lt;name&gt;Cookie Slack Detector&lt;/name&gt; &lt;riskcode&gt;1&lt;/riskcode&gt; &lt;confidence&gt;1&lt;/confidence&gt; &lt;riskdesc&gt;Low (Low)&lt;/riskdesc&gt; &lt;confidencedesc&gt;Low&lt;/confidencedesc&gt; &lt;desc&gt;Repeated GET requests: drop a different cookie each time, followed by normal request with all cookies to stabilize session, compare responses against original baseline GET. This can reveal areas where cookie based authentication/attributes are not actually enforced.&lt;/desc&gt; &lt;instances&gt; &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/js&lt;/uri&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;requestheader&gt;GET http://localhost:8080/bodgeit/js HTTP/1.1 Host: localhost:8080 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:105.0) Gecko/20100101 Firefox/105.0 Accept: */* Accept-Language: de,en-US;q=0.7,en;q=0.3 Connection: keep-alive Referer: https://localhost:8080/bodgeit/ Cookie: JSESSIONID=9E75E26E50F681208096FFAA0B566901 Sec-Fetch-Dest: script Sec-Fetch-Mode: no-cors Sec-Fetch-Site: same-origin Content-Length: 0 &lt;/requestheader&gt; &lt;requestbody&gt;&lt;/requestbody&gt; &lt;responseheader&gt;HTTP/1.1 302 Found Server: Apache-Coyote/1.1 Location: /bodgeit/js/ Content-Length: 0 Date: Fri, 30 Sep 2022 06:40:17 GMT &lt;/responseheader&gt; &lt;responsebody&gt;&lt;/responsebody&gt; &lt;/instance&gt; &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/js/util.js&lt;/uri&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;requestheader&gt;GET http://localhost:8080/bodgeit/js/util.js HTTP/1.1 Host: localhost:8080 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:105.0) Gecko/20100101 Firefox/105.0 Accept: */* Accept-Language: de,en-US;q=0.7,en;q=0.3 Connection: keep-alive Referer: https://localhost:8080/bodgeit/ Cookie: JSESSIONID=9E75E26E50F681208096FFAA0B566901 Sec-Fetch-Dest: script Sec-Fetch-Mode: no-cors Sec-Fetch-Site: same-origin Content-Length: 0 &lt;/requestheader&gt; &lt;requestbody&gt;&lt;/requestbody&gt; &lt;responseheader&gt;HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/&amp;quot;1812-1343651578000&amp;quot; Last-Modified: Mon, 30 Jul 2012 12:32:58 GMT Content-Type: application/javascript Content-Length: 1812 Date: Fri, 30 Sep 2022 06:40:17 GMT &lt;/responseheader&gt; &lt;responsebody&gt; function loadfile(filename){ var filetype = filename.split(&amp;apos;.&amp;apos;).pop(); switch (filetype){ case &amp;quot;js&amp;quot;: var insert=document.createElement(&amp;apos;script&amp;apos;) insert.setAttribute(&amp;quot;type&amp;quot;,&amp;quot;text/javascript&amp;quot;) insert.setAttribute(&amp;quot;src&amp;quot;, filename) break; case &amp;apos;css&amp;apos;: var insert=document.createElement(&amp;quot;link&amp;quot;); insert.setAttribute(&amp;quot;type&amp;quot;, &amp;quot;text/css&amp;quot;) insert.setAttribute(&amp;quot;href&amp;quot;, filename) insert.setAttribute(&amp;quot;rel&amp;quot;, &amp;quot;stylesheet&amp;quot;) break; } if (typeof insert!=&amp;quot;undefined&amp;quot;) document.getElementsByTagName(&amp;quot;head&amp;quot;)[0].appendChild(insert); return false; } ////The following is from: //http://stackoverflow.com/questions/316781/how-to-build-query-string-with-javascript function form_to_params( form ) { var output = &amp;quot;&amp;quot;; var length = form.elements.length for( var i = 0; i &amp;lt; length; i++ ) { element = form.elements[i] if(element.tagName == &amp;apos;TEXTAREA&amp;apos; ) { output += &amp;quot;|&amp;quot; + element.name + &amp;quot;:&amp;quot; + element.value; } else if( element.tagName == &amp;apos;INPUT&amp;apos; ) { switch(element.type){ case &amp;apos;radio&amp;apos;: case &amp;apos;checkbox&amp;apos;: if(element.checked &amp;amp;&amp;amp; !element.value){ output += &amp;quot;|&amp;quot; + element.name + &amp;quot;:on&amp;quot;; break; } case &amp;apos;text&amp;apos;: case &amp;apos;hidden&amp;apos;: case &amp;apos;password&amp;apos;: if(element.value) output += &amp;quot;|&amp;quot; + element.name + &amp;quot;:&amp;quot; + element.value; break; } } } return output.substring(1); } function htmlEntities(str) { return String(str).replace(/&amp;amp;/g, &amp;apos;&amp;amp;amp;&amp;apos;).replace(/&amp;lt;/g, &amp;apos;&amp;amp;lt;&amp;apos;).replace(/&amp;gt;/g, &amp;apos;&amp;amp;gt;&amp;apos;).replace(/&amp;quot;/g, &amp;apos;&amp;amp;quot;&amp;apos;); }&lt;/responsebody&gt; &lt;/instance&gt; &lt;/instances&gt; &lt;count&gt;3&lt;/count&gt; &lt;solution&gt;&lt;/solution&gt; &lt;otherinfo&gt;NOTE: Because of its name this cookie may be important, but dropping it appears to have no effect: [JSESSIONID] Cookies that don&amp;apos;t have expected effects can reveal flaws in application logic. In the worst case, this can reveal where authentication via cookie token(s) is not actually enforced. These cookies affected the response: These cookies did NOT affect the response: JSESSIONID &lt;/otherinfo&gt; &lt;reference&gt;http://projects.webappsec.org/Fingerprinting &lt;/reference&gt; &lt;cweid&gt;200&lt;/cweid&gt; &lt;wascid&gt;45&lt;/wascid&gt; &lt;sourceid&gt;2420&lt;/sourceid&gt; &lt;tags&gt; &lt;tag&gt; &lt;tag&gt;OWASP_2017_A06 &lt;/tag&gt; &lt;link&gt;https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration.html &lt;/link&gt; &lt;/tag&gt; &lt;tag&gt; &lt;tag&gt;OWASP_2021_A05 &lt;/tag&gt; &lt;link&gt;https://owasp.org/Top10/A05_2021-Security_Misconfiguration/ &lt;/link&gt; &lt;/tag&gt; &lt;tag&gt; &lt;tag&gt;WSTG-v42-SESS-02 &lt;/tag&gt; &lt;link&gt;https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/06-Session_Management_Testing/02-Testing_for_Cookies_Attributes &lt;/link&gt; &lt;/tag&gt; &lt;/tags&gt; &lt;/alertitem&gt; &lt;/alerts&gt; &lt;statistics&gt; &lt;statistic&gt; &lt;key&gt;site.specific.stat.a&lt;/key&gt; &lt;value&gt;1&lt;/value&gt; &lt;/statistic&gt; &lt;statistic&gt; &lt;key&gt;site.specific.stat.b&lt;/key&gt; &lt;value&gt;2&lt;/value&gt; &lt;/statistic&gt; &lt;/statistics&gt; &lt;/site&gt; &lt;statistics&gt; &lt;statistic&gt; &lt;key&gt;global.stat.a&lt;/key&gt; &lt;value&gt;1&lt;/value&gt; &lt;/statistic&gt; &lt;statistic&gt; &lt;key&gt;global.stat.b&lt;/key&gt; &lt;value&gt;2&lt;/value&gt; &lt;/statistic&gt; &lt;/statistics&gt; &lt;/OWASPZAPReport&gt; </code></pre> + <h1 id="traditional-xml-report-with-requests-and-responses">Traditional XML Report with Requests and Responses</h1> <h3 id="sample">Sample <a class="header-link" href="#sample"><svg class="fill-current o-60 hover-accent-color-light" height="22px" viewBox="0 0 24 24" width="22px" xmlns="http://www.w3.org/2000/svg"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z" fill="currentColor"/></svg></a></h3> <pre tabindex="0"><code> &lt;?xml version=&#34;1.0&#34;?&gt; &lt;OWASPZAPReport version=&#34;2.11.1&#34; generated=&#34;Fr., 30 Sep. 2022 08:40:35&#34; created=&#34;2022-09-30T08:40:35.236211400Z&#34;&gt; &lt;site name=&#34;http://localhost:8080&#34; host=&#34;localhost&#34; port=&#34;8080&#34; ssl=&#34;false&#34;&gt; &lt;alerts&gt; &lt;alertitem&gt; &lt;pluginid&gt;90027&lt;/pluginid&gt; &lt;alertRef&gt;90027&lt;/alertRef&gt; &lt;alert&gt;Cookie Slack Detector&lt;/alert&gt; &lt;name&gt;Cookie Slack Detector&lt;/name&gt; &lt;riskcode&gt;1&lt;/riskcode&gt; &lt;confidence&gt;1&lt;/confidence&gt; &lt;riskdesc&gt;Low (Low)&lt;/riskdesc&gt; &lt;confidencedesc&gt;Low&lt;/confidencedesc&gt; &lt;desc&gt;Repeated GET requests: drop a different cookie each time, followed by normal request with all cookies to stabilize session, compare responses against original baseline GET. This can reveal areas where cookie based authentication/attributes are not actually enforced.&lt;/desc&gt; &lt;instances&gt; &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/js&lt;/uri&gt; &lt;nodeName&gt;http://localhost:8080/bodgeit/js&lt;/nodeName&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;requestheader&gt;GET http://localhost:8080/bodgeit/js HTTP/1.1 Host: localhost:8080 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:105.0) Gecko/20100101 Firefox/105.0 Accept: */* Accept-Language: de,en-US;q=0.7,en;q=0.3 Connection: keep-alive Referer: https://localhost:8080/bodgeit/ Cookie: JSESSIONID=9E75E26E50F681208096FFAA0B566901 Sec-Fetch-Dest: script Sec-Fetch-Mode: no-cors Sec-Fetch-Site: same-origin Content-Length: 0 &lt;/requestheader&gt; &lt;requestbody&gt;&lt;/requestbody&gt; &lt;responseheader&gt;HTTP/1.1 302 Found Server: Apache-Coyote/1.1 Location: /bodgeit/js/ Content-Length: 0 Date: Fri, 30 Sep 2022 06:40:17 GMT &lt;/responseheader&gt; &lt;responsebody&gt;&lt;/responsebody&gt; &lt;/instance&gt; &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/js/util.js&lt;/uri&gt; &lt;nodeName&gt;http://localhost:8080/bodgeit/js/util.js&lt;/nodeName&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;requestheader&gt;GET http://localhost:8080/bodgeit/js/util.js HTTP/1.1 Host: localhost:8080 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:105.0) Gecko/20100101 Firefox/105.0 Accept: */* Accept-Language: de,en-US;q=0.7,en;q=0.3 Connection: keep-alive Referer: https://localhost:8080/bodgeit/ Cookie: JSESSIONID=9E75E26E50F681208096FFAA0B566901 Sec-Fetch-Dest: script Sec-Fetch-Mode: no-cors Sec-Fetch-Site: same-origin Content-Length: 0 &lt;/requestheader&gt; &lt;requestbody&gt;&lt;/requestbody&gt; &lt;responseheader&gt;HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/&amp;quot;1812-1343651578000&amp;quot; Last-Modified: Mon, 30 Jul 2012 12:32:58 GMT Content-Type: application/javascript Content-Length: 1812 Date: Fri, 30 Sep 2022 06:40:17 GMT &lt;/responseheader&gt; &lt;responsebody&gt; function loadfile(filename){ var filetype = filename.split(&amp;apos;.&amp;apos;).pop(); switch (filetype){ case &amp;quot;js&amp;quot;: var insert=document.createElement(&amp;apos;script&amp;apos;) insert.setAttribute(&amp;quot;type&amp;quot;,&amp;quot;text/javascript&amp;quot;) insert.setAttribute(&amp;quot;src&amp;quot;, filename) break; case &amp;apos;css&amp;apos;: var insert=document.createElement(&amp;quot;link&amp;quot;); insert.setAttribute(&amp;quot;type&amp;quot;, &amp;quot;text/css&amp;quot;) insert.setAttribute(&amp;quot;href&amp;quot;, filename) insert.setAttribute(&amp;quot;rel&amp;quot;, &amp;quot;stylesheet&amp;quot;) break; } if (typeof insert!=&amp;quot;undefined&amp;quot;) document.getElementsByTagName(&amp;quot;head&amp;quot;)[0].appendChild(insert); return false; } ////The following is from: //http://stackoverflow.com/questions/316781/how-to-build-query-string-with-javascript function form_to_params( form ) { var output = &amp;quot;&amp;quot;; var length = form.elements.length for( var i = 0; i &amp;lt; length; i++ ) { element = form.elements[i] if(element.tagName == &amp;apos;TEXTAREA&amp;apos; ) { output += &amp;quot;|&amp;quot; + element.name + &amp;quot;:&amp;quot; + element.value; } else if( element.tagName == &amp;apos;INPUT&amp;apos; ) { switch(element.type){ case &amp;apos;radio&amp;apos;: case &amp;apos;checkbox&amp;apos;: if(element.checked &amp;amp;&amp;amp; !element.value){ output += &amp;quot;|&amp;quot; + element.name + &amp;quot;:on&amp;quot;; break; } case &amp;apos;text&amp;apos;: case &amp;apos;hidden&amp;apos;: case &amp;apos;password&amp;apos;: if(element.value) output += &amp;quot;|&amp;quot; + element.name + &amp;quot;:&amp;quot; + element.value; break; } } } return output.substring(1); } function htmlEntities(str) { return String(str).replace(/&amp;amp;/g, &amp;apos;&amp;amp;amp;&amp;apos;).replace(/&amp;lt;/g, &amp;apos;&amp;amp;lt;&amp;apos;).replace(/&amp;gt;/g, &amp;apos;&amp;amp;gt;&amp;apos;).replace(/&amp;quot;/g, &amp;apos;&amp;amp;quot;&amp;apos;); }&lt;/responsebody&gt; &lt;/instance&gt; &lt;/instances&gt; &lt;count&gt;3&lt;/count&gt; &lt;systemic&gt;false&lt;/systemic&gt; &lt;solution&gt;&lt;/solution&gt; &lt;otherinfo&gt;NOTE: Because of its name this cookie may be important, but dropping it appears to have no effect: [JSESSIONID] Cookies that don&amp;apos;t have expected effects can reveal flaws in application logic. In the worst case, this can reveal where authentication via cookie token(s) is not actually enforced. These cookies affected the response: These cookies did NOT affect the response: JSESSIONID &lt;/otherinfo&gt; &lt;reference&gt;http://projects.webappsec.org/Fingerprinting &lt;/reference&gt; &lt;cweid&gt;200&lt;/cweid&gt; &lt;wascid&gt;45&lt;/wascid&gt; &lt;sourceid&gt;2420&lt;/sourceid&gt; &lt;tags&gt; &lt;tag&gt; &lt;tag&gt;OWASP_2017_A06 &lt;/tag&gt; &lt;link&gt;https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration.html &lt;/link&gt; &lt;/tag&gt; &lt;tag&gt; &lt;tag&gt;OWASP_2021_A05 &lt;/tag&gt; &lt;link&gt;https://owasp.org/Top10/A05_2021-Security_Misconfiguration/ &lt;/link&gt; &lt;/tag&gt; &lt;tag&gt; &lt;tag&gt;WSTG-v42-SESS-02 &lt;/tag&gt; &lt;link&gt;https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/06-Session_Management_Testing/02-Testing_for_Cookies_Attributes &lt;/link&gt; &lt;/tag&gt; &lt;/tags&gt; &lt;/alertitem&gt; &lt;/alerts&gt; &lt;statistics&gt; &lt;statistic&gt; &lt;key&gt;site.specific.stat.a&lt;/key&gt; &lt;value&gt;1&lt;/value&gt; &lt;/statistic&gt; &lt;statistic&gt; &lt;key&gt;site.specific.stat.b&lt;/key&gt; &lt;value&gt;2&lt;/value&gt; &lt;/statistic&gt; &lt;/statistics&gt; &lt;/site&gt; &lt;statistics&gt; &lt;statistic&gt; &lt;key&gt;global.stat.a&lt;/key&gt; &lt;value&gt;1&lt;/value&gt; &lt;/statistic&gt; &lt;statistic&gt; &lt;key&gt;global.stat.b&lt;/key&gt; &lt;value&gt;2&lt;/value&gt; &lt;/statistic&gt; &lt;/statistics&gt; &lt;/OWASPZAPReport&gt; </code></pre> diff --git a/docs/desktop/addons/report-generation/report-traditional-json-plus/index.html b/docs/desktop/addons/report-generation/report-traditional-json-plus/index.html index 2e518e8681..db35aa84af 100644 --- a/docs/desktop/addons/report-generation/report-traditional-json-plus/index.html +++ b/docs/desktop/addons/report-generation/report-traditional-json-plus/index.html @@ -1908,6 +1908,7 @@

Sample Sample Sample Sample Sample Sample Header Risk (Confidence) Sample Sample Sample Sample Sample Sample Authentication Helper Add-on SBOM

Authentication Helper
-

This page contains a list of all the libraries involved in building version 0.31.0 of the +

This page contains a list of all the libraries involved in building version 0.32.0 of the "Authentication Helper" add-on. -

You may download the full Software Bill Of Materials (SBOM) JSON file +

You may download the full Software Bill Of Materials (SBOM) JSON file for this add-on.

@@ -203,7 +203,7 @@

Authentication Helper Add-on SBOM

- + diff --git a/docs/sbom/automation/index.html b/docs/sbom/automation/index.html index 5ede7ce37c..a5f6c5d212 100644 --- a/docs/sbom/automation/index.html +++ b/docs/sbom/automation/index.html @@ -122,9 +122,9 @@

Automation Framework Add-on SBOM

Automation Framework
-

This page contains a list of all the libraries involved in building version 0.55.0 of the +

This page contains a list of all the libraries involved in building version 0.56.0 of the "Automation Framework" add-on. -

You may download the full Software Bill Of Materials (SBOM) JSON file +

You may download the full Software Bill Of Materials (SBOM) JSON file for this add-on.

automation0.55.00.56.0
diff --git a/docs/sbom/index.html b/docs/sbom/index.html index 892914f47a..e595d0638a 100644 --- a/docs/sbom/index.html +++ b/docs/sbom/index.html @@ -548,7 +548,7 @@

Software Bill of Materials

Report Generation Add-on SBOM diff --git a/docs/sbom/reports/index.html b/docs/sbom/reports/index.html index 9053700354..c2ee6ad243 100644 --- a/docs/sbom/reports/index.html +++ b/docs/sbom/reports/index.html @@ -122,9 +122,9 @@

Report Generation Add-on SBOM

Report Generation
-

This page contains a list of all the libraries involved in building version 0.41.0 of the +

This page contains a list of all the libraries involved in building version 0.42.0 of the "Report Generation" add-on. -

You may download the full Software Bill Of Materials (SBOM) JSON file +

You may download the full Software Bill Of Materials (SBOM) JSON file for this add-on.

- 145 + 163
@@ -191,55 +191,133 @@

Report Generation Add-on SBOM

- + - - - + + + - - - + + + - - - + + + - - - + + + - - - + + + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - + + - - + + @@ -251,7 +329,7 @@

Report Generation Add-on SBOM

- + @@ -263,13 +341,13 @@

Report Generation Add-on SBOM

- + - + @@ -281,13 +359,13 @@

Report Generation Add-on SBOM

- + - + @@ -303,6 +381,12 @@

Report Generation Add-on SBOM

+ + + + + + @@ -311,7 +395,7 @@

Report Generation Add-on SBOM

- + @@ -323,13 +407,13 @@

Report Generation Add-on SBOM

- + - + @@ -341,7 +425,7 @@

Report Generation Add-on SBOM

- + @@ -351,6 +435,12 @@

Report Generation Add-on SBOM

+ + + + + + @@ -365,7 +455,7 @@

Report Generation Add-on SBOM

- + @@ -389,31 +479,25 @@

Report Generation Add-on SBOM

- + - + - + - - - - - - - + @@ -425,7 +509,7 @@

Report Generation Add-on SBOM

- + @@ -443,43 +527,43 @@

Report Generation Add-on SBOM

- + - + - + - + - + - + - + @@ -520,26 +604,26 @@

Report Generation Add-on SBOM

- - - + + + - + - + - + @@ -551,31 +635,31 @@

Report Generation Add-on SBOM

- + - + - + - + - + @@ -653,49 +737,49 @@

Report Generation Add-on SBOM

- + - + - + - + - + - + - + - + @@ -743,19 +827,19 @@

Report Generation Add-on SBOM

- + - + - + @@ -873,6 +957,12 @@

Report Generation Add-on SBOM

+ + + + + + @@ -983,7 +1073,7 @@

Report Generation Add-on SBOM

- + @@ -999,6 +1089,24 @@

Report Generation Add-on SBOM

+ + + + + + + + + + + + + + + + + + diff --git a/docs/statistics/index.xml b/docs/statistics/index.xml index bca910ea01..48eef67ad1 100644 --- a/docs/statistics/index.xml +++ b/docs/statistics/index.xml @@ -40,7 +40,7 @@ /docs/statistics/top-addons-last-month/Mon, 01 Jan 0001 00:00:00 +0000/docs/statistics/top-addons-last-month/ - <p>These were the most frequently installed <strong>optional</strong> add-ons last month.</p> <p>Note that this does not mean they were the most <strong>used</strong> add-ons - that is harder to quantify.</p> <table class="table market-table"> <thead align="left"> <tr> <th >Position</th> <th >Add-On</th> <th >Status</th> <th>ID</th> <th >Last Updated</th> </tr> </thead> <tr> <td > 1 </td> <td > <a href="/docs/desktop/addons/import-export/">Import/Export</a> </td> <td > beta </td> <td > exim </td> <td > 2025-09-02 </td> </tr> <tr> <td > 2 </td> <td > <a href="/docs/desktop/addons/database/">Database</a> </td> <td > alpha </td> <td > database </td> <td > 2025-03-04 </td> </tr> <tr> <td > 3 </td> <td > <a href="/docs/desktop/addons/requester/">Requester</a> </td> <td > beta </td> <td > requester </td> <td > 2025-01-10 </td> </tr> <tr> <td > 4 </td> <td > <a href="/docs/desktop/addons/spider/">Spider</a> </td> <td > release </td> <td > spider </td> <td > 2025-11-04 </td> </tr> <tr> <td > 5 </td> <td > <a href="/docs/desktop/addons/authentication-helper/">Authentication Helper</a> </td> <td > beta </td> <td > authhelper </td> <td > 2025-11-05 </td> </tr> <tr> <td > 6 </td> <td > <a href="/docs/desktop/addons/postman-support/">Postman Support</a> </td> <td > alpha </td> <td > postman </td> <td > 2025-09-02 </td> </tr> <tr> <td > 7 </td> <td > <a href="/docs/desktop/addons/passive-scanner/">Passive Scanner</a> </td> <td > alpha </td> <td > pscan </td> <td > 2025-09-10 </td> </tr> <tr> <td > 8 </td> <td > <a href="/docs/desktop/addons/passive-scan-rules-beta/">Passive scanner rules (beta)</a> </td> <td > beta </td> <td > pscanrulesBeta </td> <td > 2025-11-04 </td> </tr> <tr> <td > 9 </td> <td > <a href="/docs/desktop/addons/client-side-integration/">Client Side Integration</a> </td> <td > alpha </td> <td > client </td> <td > 2025-11-04 </td> </tr> <tr> <td > 10 </td> <td > <a href="/docs/desktop/addons/scan-policies/">Scan Policies</a> </td> <td > alpha </td> <td > scanpolicies </td> <td > 2025-11-04 </td> </tr> <tr> <td > 11 </td> <td > <a href="/docs/desktop/addons/sequence-scanner/">Sequence</a> </td> <td > beta </td> <td > sequence </td> <td > 2025-01-10 </td> </tr> <tr> <td > 12 </td> <td > <a href="/docs/desktop/addons/active-scan-rules-beta/">Active scanner rules (beta)</a> </td> <td > beta </td> <td > ascanrulesBeta </td> <td > 2025-11-04 </td> </tr> <tr> <td > 13 </td> <td > <a href="/docs/desktop/addons/passive-scan-rules-alpha/">Passive scanner rules (alpha)</a> </td> <td > alpha </td> <td > pscanrulesAlpha </td> <td > 2025-11-04 </td> </tr> <tr> <td > 14 </td> <td > <a href="/docs/desktop/addons/access-control-testing/">Access Control Testing</a> </td> <td > alpha </td> <td > accessControl </td> <td > 2024-03-25 </td> </tr> <tr> <td > 15 </td> <td > <a href="/docs/desktop/addons/plug-n-hack/">Plug-n-Hack Configuration</a> </td> <td > beta </td> <td > plugnhack </td> <td > 2022-10-27 </td> </tr> <tr> <td > 16 </td> <td > <a href="/docs/desktop/addons/grpc-support/">gRPC Support</a> </td> <td > alpha </td> <td > grpc </td> <td > 2024-07-02 </td> </tr> <tr> <td > 17 </td> <td > <a href="/docs/desktop/addons/custom-payloads/">Custom Payloads</a> </td> <td > release </td> <td > custompayloads </td> <td > 2025-09-02 </td> </tr> <tr> <td > 18 </td> <td > <a href="/docs/desktop/addons/technology-detection/">Technology Detection</a> </td> <td > release </td> <td > wappalyzer </td> <td > 2025-11-04 </td> </tr> <tr> <td > 19 </td> <td > <a href="/docs/desktop/addons/advanced-sqlinjection-scanner/">Advanced SQLInjection Scanner</a> </td> <td > beta </td> <td > sqliplugin </td> <td > 2025-04-30 </td> </tr> <tr> <td > 20 </td> <td > <a href="/docs/desktop/addons/active-scan-rules-alpha/">Active scanner rules (alpha)</a> </td> <td > alpha </td> <td > ascanrulesAlpha </td> <td > 2025-11-04 </td> </tr> </table> + <p>These were the most frequently installed <strong>optional</strong> add-ons last month.</p> <p>Note that this does not mean they were the most <strong>used</strong> add-ons - that is harder to quantify.</p> <table class="table market-table"> <thead align="left"> <tr> <th >Position</th> <th >Add-On</th> <th >Status</th> <th>ID</th> <th >Last Updated</th> </tr> </thead> <tr> <td > 1 </td> <td > <a href="/docs/desktop/addons/import-export/">Import/Export</a> </td> <td > beta </td> <td > exim </td> <td > 2025-09-02 </td> </tr> <tr> <td > 2 </td> <td > <a href="/docs/desktop/addons/database/">Database</a> </td> <td > alpha </td> <td > database </td> <td > 2025-03-04 </td> </tr> <tr> <td > 3 </td> <td > <a href="/docs/desktop/addons/requester/">Requester</a> </td> <td > beta </td> <td > requester </td> <td > 2025-01-10 </td> </tr> <tr> <td > 4 </td> <td > <a href="/docs/desktop/addons/spider/">Spider</a> </td> <td > release </td> <td > spider </td> <td > 2025-11-04 </td> </tr> <tr> <td > 5 </td> <td > <a href="/docs/desktop/addons/authentication-helper/">Authentication Helper</a> </td> <td > beta </td> <td > authhelper </td> <td > 2025-11-07 </td> </tr> <tr> <td > 6 </td> <td > <a href="/docs/desktop/addons/postman-support/">Postman Support</a> </td> <td > alpha </td> <td > postman </td> <td > 2025-09-02 </td> </tr> <tr> <td > 7 </td> <td > <a href="/docs/desktop/addons/passive-scanner/">Passive Scanner</a> </td> <td > alpha </td> <td > pscan </td> <td > 2025-09-10 </td> </tr> <tr> <td > 8 </td> <td > <a href="/docs/desktop/addons/passive-scan-rules-beta/">Passive scanner rules (beta)</a> </td> <td > beta </td> <td > pscanrulesBeta </td> <td > 2025-11-04 </td> </tr> <tr> <td > 9 </td> <td > <a href="/docs/desktop/addons/client-side-integration/">Client Side Integration</a> </td> <td > alpha </td> <td > client </td> <td > 2025-11-04 </td> </tr> <tr> <td > 10 </td> <td > <a href="/docs/desktop/addons/scan-policies/">Scan Policies</a> </td> <td > alpha </td> <td > scanpolicies </td> <td > 2025-11-04 </td> </tr> <tr> <td > 11 </td> <td > <a href="/docs/desktop/addons/sequence-scanner/">Sequence</a> </td> <td > beta </td> <td > sequence </td> <td > 2025-01-10 </td> </tr> <tr> <td > 12 </td> <td > <a href="/docs/desktop/addons/active-scan-rules-beta/">Active scanner rules (beta)</a> </td> <td > beta </td> <td > ascanrulesBeta </td> <td > 2025-11-04 </td> </tr> <tr> <td > 13 </td> <td > <a href="/docs/desktop/addons/passive-scan-rules-alpha/">Passive scanner rules (alpha)</a> </td> <td > alpha </td> <td > pscanrulesAlpha </td> <td > 2025-11-04 </td> </tr> <tr> <td > 14 </td> <td > <a href="/docs/desktop/addons/access-control-testing/">Access Control Testing</a> </td> <td > alpha </td> <td > accessControl </td> <td > 2024-03-25 </td> </tr> <tr> <td > 15 </td> <td > <a href="/docs/desktop/addons/plug-n-hack/">Plug-n-Hack Configuration</a> </td> <td > beta </td> <td > plugnhack </td> <td > 2022-10-27 </td> </tr> <tr> <td > 16 </td> <td > <a href="/docs/desktop/addons/grpc-support/">gRPC Support</a> </td> <td > alpha </td> <td > grpc </td> <td > 2024-07-02 </td> </tr> <tr> <td > 17 </td> <td > <a href="/docs/desktop/addons/custom-payloads/">Custom Payloads</a> </td> <td > release </td> <td > custompayloads </td> <td > 2025-09-02 </td> </tr> <tr> <td > 18 </td> <td > <a href="/docs/desktop/addons/technology-detection/">Technology Detection</a> </td> <td > release </td> <td > wappalyzer </td> <td > 2025-11-04 </td> </tr> <tr> <td > 19 </td> <td > <a href="/docs/desktop/addons/advanced-sqlinjection-scanner/">Advanced SQLInjection Scanner</a> </td> <td > beta </td> <td > sqliplugin </td> <td > 2025-04-30 </td> </tr> <tr> <td > 20 </td> <td > <a href="/docs/desktop/addons/active-scan-rules-alpha/">Active scanner rules (alpha)</a> </td> <td > alpha </td> <td > ascanrulesAlpha </td> <td > 2025-11-04 </td> </tr> </table> diff --git a/docs/statistics/top-addons-last-month/index.html b/docs/statistics/top-addons-last-month/index.html index af3b66c983..aab56eed2b 100644 --- a/docs/statistics/top-addons-last-month/index.html +++ b/docs/statistics/top-addons-last-month/index.html @@ -252,7 +252,7 @@

Top ZAP Add-Ons Last Month

authhelper diff --git a/index.xml b/index.xml index 4a2b7ec3f3..a5688a992e 100644 --- a/index.xml +++ b/index.xml @@ -17303,7 +17303,7 @@ This is particularly useful for comparing 2 sessions which access the same appli authhelper </td> <td > - 2025-11-05 + 2025-11-07 </td> </tr> @@ -17778,6 +17778,7 @@ This is particularly useful for comparing 2 sessions which access the same appli &#34;instances&#34;:[ { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E&#34;, + &#34;nodeName&#34;: &#34;http://localhost:8080/bodgeit/search.jsp (q)&#34;, &#34;method&#34;: &#34;GET&#34;, &#34;param&#34;: &#34;q&#34;, &#34;attack&#34;: &#34;&lt;/font&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;font&gt;&#34;, @@ -17786,6 +17787,7 @@ This is particularly useful for comparing 2 sessions which access the same appli }, { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/contact.jsp&#34;, + &#34;nodeName&#34;: &#34;http://localhost:8080/bodgeit/contact.jsp&#34;, &#34;method&#34;: &#34;POST&#34;, &#34;param&#34;: &#34;comments&#34;, &#34;attack&#34;: &#34;&lt;/td&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;td&gt;&#34;, @@ -17794,6 +17796,7 @@ This is particularly useful for comparing 2 sessions which access the same appli } ], &#34;count&#34;: &#34;2&#34;, + &#34;systemic&#34;: false, &#34;solution&#34;: &#34;&lt;p&gt;Phase: Architecture and Design&lt;/p&gt;&lt;p&gt;Use a vetted library or framework that does not ...&lt;/p&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34;, &#34;reference&#34;: &#34;&lt;p&gt;http://projects.webappsec.org/Cross-Site-Scripting&lt;/p&gt;&lt;p&gt;http://cwe.mitre.org/data/definitions/79.html&lt;/p&gt;&#34;, @@ -17860,6 +17863,7 @@ This is particularly useful for comparing 2 sessions which access the same appli &#34;instances&#34;:[ { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E&#34;, + &#34;nodeName&#34;: &#34;http://localhost:8080/bodgeit/search.jsp (q)&#34;, &#34;method&#34;: &#34;GET&#34;, &#34;param&#34;: &#34;q&#34;, &#34;attack&#34;: &#34;&lt;/font&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;font&gt;&#34;, @@ -17872,6 +17876,7 @@ This is particularly useful for comparing 2 sessions which access the same appli }, { &#34;uri&#34;: &#34;http://localhost:8080/bodgeit/contact.jsp&#34;, + &#34;nodeName&#34;: &#34;http://localhost:8080/bodgeit/contact.jsp&#34;, &#34;method&#34;: &#34;POST&#34;, &#34;param&#34;: &#34;comments&#34;, &#34;attack&#34;: &#34;&lt;/td&gt;&lt;scrIpt&gt;alert(1);&lt;/scRipt&gt;&lt;td&gt;&#34;, @@ -17884,6 +17889,7 @@ This is particularly useful for comparing 2 sessions which access the same appli } ], &#34;count&#34;: &#34;2&#34;, + &#34;systemic&#34;: false, &#34;solution&#34;: &#34;&lt;p&gt;Phase: Architecture and Design&lt;/p&gt;&lt;p&gt;Use a vetted library or framework that does not ...&lt;/p&gt;&#34;, &#34;otherinfo&#34;: &#34;&#34;, &#34;reference&#34;: &#34;&lt;p&gt;http://projects.webappsec.org/Cross-Site-Scripting&lt;/p&gt;&lt;p&gt;http://cwe.mitre.org/data/definitions/79.html&lt;/p&gt;&#34;, @@ -17991,9 +17997,9 @@ This is particularly useful for comparing 2 sessions which access the same appli &lt;confidencedesc&gt;Medium&lt;/confidencedesc&gt; &lt;desc&gt;&lt;p&gt;A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge...&lt;/desc&gt; &lt;instances&gt; - &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/advanced.jsp&lt;/uri&gt; + &lt;nodeName&gt;http://localhost:8080/bodgeit/advanced.jsp&lt;/nodeName&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; @@ -18003,6 +18009,7 @@ This is particularly useful for comparing 2 sessions which access the same appli &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/advanced.jsp&lt;/uri&gt; + &lt;nodeName&gt;http://localhost:8080/bodgeit/advanced.jsp&lt;/nodeName&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; @@ -18012,12 +18019,17 @@ This is particularly useful for comparing 2 sessions which access the same appli &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/basket.jsp&lt;/uri&gt; + &lt;nodeName&gt;http://localhost:8080/bodgeit/basket.jsp&lt;/nodeName&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; &lt;evidence&gt;&lt;form action=&#34;basket.jsp&#34; method=&#34;post&#34;&gt;&lt;/evidence&gt; &lt;otherinfo&gt;&lt;/otherinfo&gt; &lt;/instance&gt; + &lt;count&gt;2&lt;/count&gt; + &lt;systemic&gt;false&lt;/systemic&gt; + &lt;solution&gt;The solution&lt;/solution&gt; + &lt;otherinfo&gt;The other info&lt;/otherinfo&gt; </code></pre> @@ -18049,6 +18061,7 @@ This is particularly useful for comparing 2 sessions which access the same appli &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/js&lt;/uri&gt; + &lt;nodeName&gt;http://localhost:8080/bodgeit/js&lt;/nodeName&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; @@ -18082,6 +18095,7 @@ This is particularly useful for comparing 2 sessions which access the same appli &lt;instance&gt; &lt;uri&gt;http://localhost:8080/bodgeit/js/util.js&lt;/uri&gt; + &lt;nodeName&gt;http://localhost:8080/bodgeit/js/util.js&lt;/nodeName&gt; &lt;method&gt;GET&lt;/method&gt; &lt;param&gt;&lt;/param&gt; &lt;attack&gt;&lt;/attack&gt; @@ -18178,6 +18192,7 @@ This is particularly useful for comparing 2 sessions which access the same appli &lt;/instances&gt; &lt;count&gt;3&lt;/count&gt; + &lt;systemic&gt;false&lt;/systemic&gt; &lt;solution&gt;&lt;/solution&gt; &lt;otherinfo&gt;NOTE: Because of its name this cookie may be important, but dropping it appears to have no effect: [JSESSIONID] Cookies that don&amp;apos;t have expected effects can reveal flaws in application logic. In the worst case, this can reveal where authentication via cookie token(s) is not actually enforced. diff --git a/search/index.json b/search/index.json index 85656c2c05..a9a9783568 100644 --- a/search/index.json +++ b/search/index.json @@ -7964,8 +7964,8 @@ "title": "Top ZAP Add-Ons Last Month", "keywords": ["","add-ons","last","month","top","zap"], "tags": null, - "summary": "\u003cp\u003eThese were the most frequently installed \u003cstrong\u003eoptional\u003c/strong\u003e add-ons last month.\u003c/p\u003e\n\u003cp\u003eNote that this does not mean they were the most \u003cstrong\u003eused\u003c/strong\u003e add-ons - that is harder to quantify.\u003c/p\u003e\n\u003ctable class=\"table market-table\"\u003e\n \u003cthead align=\"left\"\u003e\n \u003ctr\u003e\n \u003cth \u003ePosition\u003c/th\u003e\n \u003cth \u003eAdd-On\u003c/th\u003e\n \u003cth \u003eStatus\u003c/th\u003e\n \u003cth\u003eID\u003c/th\u003e\n \u003cth \u003eLast Updated\u003c/th\u003e\n \u003c/tr\u003e\n \u003c/thead\u003e\n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 1\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/import-export/\"\u003eImport/Export\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n exim\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-09-02\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 2\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/database/\"\u003eDatabase\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n database\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-03-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 3\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/requester/\"\u003eRequester\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n requester\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-01-10\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 4\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/spider/\"\u003eSpider\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n release\n \u003c/td\u003e\n \u003ctd \u003e\n spider\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 5\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/authentication-helper/\"\u003eAuthentication Helper\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n authhelper\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-05\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 6\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/postman-support/\"\u003ePostman Support\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n postman\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-09-02\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 7\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/passive-scanner/\"\u003ePassive Scanner\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n pscan\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-09-10\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 8\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/passive-scan-rules-beta/\"\u003ePassive scanner rules (beta)\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n pscanrulesBeta\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 9\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/client-side-integration/\"\u003eClient Side Integration\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n client\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 10\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/scan-policies/\"\u003eScan Policies\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n scanpolicies\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 11\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/sequence-scanner/\"\u003eSequence\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n sequence\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-01-10\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 12\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/active-scan-rules-beta/\"\u003eActive scanner rules (beta)\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n ascanrulesBeta\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 13\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/passive-scan-rules-alpha/\"\u003ePassive scanner rules (alpha)\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n pscanrulesAlpha\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 14\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/access-control-testing/\"\u003eAccess Control Testing\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n accessControl\n \u003c/td\u003e\n \u003ctd \u003e\n 2024-03-25\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 15\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/plug-n-hack/\"\u003ePlug-n-Hack Configuration\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n plugnhack\n \u003c/td\u003e\n \u003ctd \u003e\n 2022-10-27\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 16\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/grpc-support/\"\u003egRPC Support\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n grpc\n \u003c/td\u003e\n \u003ctd \u003e\n 2024-07-02\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 17\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/custom-payloads/\"\u003eCustom Payloads\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n release\n \u003c/td\u003e\n \u003ctd \u003e\n custompayloads\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-09-02\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 18\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/technology-detection/\"\u003eTechnology Detection\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n release\n \u003c/td\u003e\n \u003ctd \u003e\n wappalyzer\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 19\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/advanced-sqlinjection-scanner/\"\u003eAdvanced SQLInjection Scanner\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n sqliplugin\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-04-30\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 20\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/active-scan-rules-alpha/\"\u003eActive scanner rules (alpha)\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n ascanrulesAlpha\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n\u003c/table\u003e", - "content": "these were most frequently installed optional addons last month note that does not mean they used harder quantify position addon status id updated importexport beta exim 20250902 database alpha 20250304 requester 20250110 spider release 20251104 authentication helper authhelper 20251105 postman support passive scanner pscan 20250910 rules pscanrulesbeta client side integration 10 scan policies scanpolicies 11 sequence 12 active ascanrulesbeta 13 pscanrulesalpha 14 access control testing accesscontrol 20240325 15 plugnhack configuration 20221027 16 grpc 20240702 17 custom payloads custompayloads 18 technology detection wappalyzer 19 advanced sqlinjection sqliplugin 20250430 20 ascanrulesalpha " + "summary": "\u003cp\u003eThese were the most frequently installed \u003cstrong\u003eoptional\u003c/strong\u003e add-ons last month.\u003c/p\u003e\n\u003cp\u003eNote that this does not mean they were the most \u003cstrong\u003eused\u003c/strong\u003e add-ons - that is harder to quantify.\u003c/p\u003e\n\u003ctable class=\"table market-table\"\u003e\n \u003cthead align=\"left\"\u003e\n \u003ctr\u003e\n \u003cth \u003ePosition\u003c/th\u003e\n \u003cth \u003eAdd-On\u003c/th\u003e\n \u003cth \u003eStatus\u003c/th\u003e\n \u003cth\u003eID\u003c/th\u003e\n \u003cth \u003eLast Updated\u003c/th\u003e\n \u003c/tr\u003e\n \u003c/thead\u003e\n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 1\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/import-export/\"\u003eImport/Export\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n exim\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-09-02\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 2\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/database/\"\u003eDatabase\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n database\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-03-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 3\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/requester/\"\u003eRequester\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n requester\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-01-10\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 4\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/spider/\"\u003eSpider\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n release\n \u003c/td\u003e\n \u003ctd \u003e\n spider\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 5\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/authentication-helper/\"\u003eAuthentication Helper\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n authhelper\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-07\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 6\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/postman-support/\"\u003ePostman Support\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n postman\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-09-02\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 7\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/passive-scanner/\"\u003ePassive Scanner\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n pscan\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-09-10\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 8\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/passive-scan-rules-beta/\"\u003ePassive scanner rules (beta)\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n pscanrulesBeta\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 9\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/client-side-integration/\"\u003eClient Side Integration\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n client\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 10\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/scan-policies/\"\u003eScan Policies\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n scanpolicies\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 11\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/sequence-scanner/\"\u003eSequence\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n sequence\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-01-10\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 12\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/active-scan-rules-beta/\"\u003eActive scanner rules (beta)\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n ascanrulesBeta\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 13\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/passive-scan-rules-alpha/\"\u003ePassive scanner rules (alpha)\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n pscanrulesAlpha\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 14\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/access-control-testing/\"\u003eAccess Control Testing\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n accessControl\n \u003c/td\u003e\n \u003ctd \u003e\n 2024-03-25\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 15\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/plug-n-hack/\"\u003ePlug-n-Hack Configuration\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n plugnhack\n \u003c/td\u003e\n \u003ctd \u003e\n 2022-10-27\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 16\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/grpc-support/\"\u003egRPC Support\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n grpc\n \u003c/td\u003e\n \u003ctd \u003e\n 2024-07-02\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 17\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/custom-payloads/\"\u003eCustom Payloads\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n release\n \u003c/td\u003e\n \u003ctd \u003e\n custompayloads\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-09-02\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 18\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/technology-detection/\"\u003eTechnology Detection\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n release\n \u003c/td\u003e\n \u003ctd \u003e\n wappalyzer\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 19\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/advanced-sqlinjection-scanner/\"\u003eAdvanced SQLInjection Scanner\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n beta\n \u003c/td\u003e\n \u003ctd \u003e\n sqliplugin\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-04-30\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n \n \u003ctr\u003e\n \u003ctd \u003e\n 20\n \u003c/td\u003e\n \u003ctd \u003e\n \n \u003ca href=\"/docs/desktop/addons/active-scan-rules-alpha/\"\u003eActive scanner rules (alpha)\u003c/a\u003e\n \n \u003c/td\u003e\n \u003ctd \u003e\n alpha\n \u003c/td\u003e\n \u003ctd \u003e\n ascanrulesAlpha\n \u003c/td\u003e\n \u003ctd \u003e\n 2025-11-04\n \u003c/td\u003e\n \u003c/tr\u003e\n \n \n\u003c/table\u003e", + "content": "these were most frequently installed optional addons last month note that does not mean they used harder quantify position addon status id updated importexport beta exim 20250902 database alpha 20250304 requester 20250110 spider release 20251104 authentication helper authhelper 20251107 postman support passive scanner pscan 20250910 rules pscanrulesbeta client side integration 10 scan policies scanpolicies 11 sequence 12 active ascanrulesbeta 13 pscanrulesalpha 14 access control testing accesscontrol 20240325 15 plugnhack configuration 20221027 16 grpc 20240702 17 custom payloads custompayloads 18 technology detection wappalyzer 19 advanced sqlinjection sqliplugin 20250430 20 ascanrulesalpha " }, { "url": "/docs/alerts/40029/", @@ -7996,16 +7996,16 @@ "title": "Traditional JSON Report", "keywords": ["","json","report","traditional"], "tags": null, - "summary": "\u003ch1 id=\"traditional-json-report\"\u003eTraditional JSON Report\u003c/h1\u003e\n\n\u003ch3 id=\"sample\"\u003eSample \u003ca class=\"header-link\" href=\"#sample\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\u003cpre tabindex=\"0\"\u003e\u003ccode\u003e{\n \u0026#34;@version\u0026#34;: \u0026#34;Dev Build\u0026#34;,\n \u0026#34;@generated\u0026#34;: \u0026#34;Fri, 4 Feb 2022 13:04:51\u0026#34;,\n \u0026#34;created\u0026#34;: \u0026#34;2022-02-04T13:04:51.236211400Z\u0026#34;,\n \u0026#34;site\u0026#34;:[\n {\n \u0026#34;@name\u0026#34;: \u0026#34;http://localhost:8080\u0026#34;,\n \u0026#34;@host\u0026#34;: \u0026#34;localhost\u0026#34;,\n \u0026#34;@port\u0026#34;: \u0026#34;8080\u0026#34;,\n \u0026#34;@ssl\u0026#34;: \u0026#34;false\u0026#34;,\n \u0026#34;alerts\u0026#34;: [\n {\n \u0026#34;pluginid\u0026#34;: \u0026#34;40012\u0026#34;,\n \u0026#34;alertRef\u0026#34;: \u0026#34;40012\u0026#34;,\n \u0026#34;alert\u0026#34;: \u0026#34;Cross Site Scripting (Reflected)\u0026#34;,\n \u0026#34;name\u0026#34;: \u0026#34;Cross Site Scripting (Reflected)\u0026#34;,\n \u0026#34;riskcode\u0026#34;: \u0026#34;3\u0026#34;,\n \u0026#34;confidence\u0026#34;: \u0026#34;2\u0026#34;,\n \u0026#34;riskdesc\u0026#34;: \u0026#34;High (Medium)\u0026#34;,\n \u0026#34;desc\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;Cross-site Scripting (XSS) is an attack technique that involves ...\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;instances\u0026#34;:[\n {\n \u0026#34;uri\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E\u0026#34;,\n \u0026#34;method\u0026#34;: \u0026#34;GET\u0026#34;,\n \u0026#34;param\u0026#34;: \u0026#34;q\u0026#34;,\n \u0026#34;attack\u0026#34;: \u0026#34;\u0026lt;/font\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;font\u0026gt;\u0026#34;,\n \u0026#34;evidence\u0026#34;: \u0026#34;\u0026lt;/font\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;font\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;\n },\n {\n \u0026#34;uri\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/contact.jsp\u0026#34;,\n \u0026#34;method\u0026#34;: \u0026#34;POST\u0026#34;,\n \u0026#34;param\u0026#34;: \u0026#34;comments\u0026#34;,\n \u0026#34;attack\u0026#34;: \u0026#34;\u0026lt;/td\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;td\u0026gt;\u0026#34;,\n \u0026#34;evidence\u0026#34;: \u0026#34;\u0026lt;/td\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;td\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;\n }\n ], \n \u0026#34;count\u0026#34;: \u0026#34;2\u0026#34;, \n \u0026#34;solution\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;Phase: Architecture and Design\u0026lt;/p\u0026gt;\u0026lt;p\u0026gt;Use a vetted library or framework that does not ...\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;,\n \u0026#34;reference\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;http://projects.webappsec.org/Cross-Site-Scripting\u0026lt;/p\u0026gt;\u0026lt;p\u0026gt;http://cwe.mitre.org/data/definitions/79.html\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;cweid\u0026#34;: \u0026#34;79\u0026#34;,\n \u0026#34;wascid\u0026#34;: \u0026#34;8\u0026#34;,\n \u0026#34;sourceid\u0026#34;: \u0026#34;36977\u0026#34;\n },\n\u003c/code\u003e\u003c/pre\u003e\u003cp\u003eThe report can also include details of Sequences and related active scanning results, for example:\u003c/p\u003e", - "content": "traditional json report sample 34version34: 34dev build34 34generated34: 34fri feb 2022 13:04:5134 34created34: 3420220204t13:04:51236211400z34 34site34: 34name34: 34http:localhost:808034 34host34: 34localhost34 34port34: 34808034 34ssl34: 34false34 34alerts34: 34pluginid34: 344001234 34alertref34: 34alert34: 34cross site scripting reflected34 34riskcode34: 34334 34confidence34: 34234 34riskdesc34: 34high medium34 34desc34: 34pcrosssite xss attack technique that involves p34 34instances34: 34uri34: 34http:localhost:8080bodgeitsearchjspq3c2ffont3e3cscript3ealert281293b3c2fscript3e3cfont3e34 34method34: 34get34 34param34: 34q34 34attack34: 34fontscriptalert1scriptfont34 34evidence34: 34otherinfo34: 3434 34http:localhost:8080bodgeitcontactjsp34 34post34 34comments34 34tdscriptalert1scripttd34 34count34: 34solution34: 34pphase: architecture designppuse vetted library framework does not 34reference34: 34phttp:projectswebappsecorgcrosssitescriptingpphttp:cwemitreorgdatadefinitions79htmlp34 34cweid34: 347934 34wascid34: 34834 34sourceid34: 343697734 can also include details sequences related active scanning results example: 34sequences34: 34seq name34 34steps34: 34step34: 34134 34pass34: 34true34 34resultdetails34: 34pass34 34alertids34: 34original34: 34https:wwwexamplecomstep134 34replay34: 34fail34 34https:wwwexamplecomstep234 " + "summary": "\u003ch1 id=\"traditional-json-report\"\u003eTraditional JSON Report\u003c/h1\u003e\n\n\u003ch3 id=\"sample\"\u003eSample \u003ca class=\"header-link\" href=\"#sample\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\u003cpre tabindex=\"0\"\u003e\u003ccode\u003e{\n \u0026#34;@version\u0026#34;: \u0026#34;Dev Build\u0026#34;,\n \u0026#34;@generated\u0026#34;: \u0026#34;Fri, 4 Feb 2022 13:04:51\u0026#34;,\n \u0026#34;created\u0026#34;: \u0026#34;2022-02-04T13:04:51.236211400Z\u0026#34;,\n \u0026#34;site\u0026#34;:[\n {\n \u0026#34;@name\u0026#34;: \u0026#34;http://localhost:8080\u0026#34;,\n \u0026#34;@host\u0026#34;: \u0026#34;localhost\u0026#34;,\n \u0026#34;@port\u0026#34;: \u0026#34;8080\u0026#34;,\n \u0026#34;@ssl\u0026#34;: \u0026#34;false\u0026#34;,\n \u0026#34;alerts\u0026#34;: [\n {\n \u0026#34;pluginid\u0026#34;: \u0026#34;40012\u0026#34;,\n \u0026#34;alertRef\u0026#34;: \u0026#34;40012\u0026#34;,\n \u0026#34;alert\u0026#34;: \u0026#34;Cross Site Scripting (Reflected)\u0026#34;,\n \u0026#34;name\u0026#34;: \u0026#34;Cross Site Scripting (Reflected)\u0026#34;,\n \u0026#34;riskcode\u0026#34;: \u0026#34;3\u0026#34;,\n \u0026#34;confidence\u0026#34;: \u0026#34;2\u0026#34;,\n \u0026#34;riskdesc\u0026#34;: \u0026#34;High (Medium)\u0026#34;,\n \u0026#34;desc\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;Cross-site Scripting (XSS) is an attack technique that involves ...\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;instances\u0026#34;:[\n {\n \u0026#34;uri\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E\u0026#34;,\n \u0026#34;nodeName\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/search.jsp (q)\u0026#34;,\n \u0026#34;method\u0026#34;: \u0026#34;GET\u0026#34;,\n \u0026#34;param\u0026#34;: \u0026#34;q\u0026#34;,\n \u0026#34;attack\u0026#34;: \u0026#34;\u0026lt;/font\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;font\u0026gt;\u0026#34;,\n \u0026#34;evidence\u0026#34;: \u0026#34;\u0026lt;/font\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;font\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;\n },\n {\n \u0026#34;uri\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/contact.jsp\u0026#34;,\n \u0026#34;nodeName\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/contact.jsp\u0026#34;,\n \u0026#34;method\u0026#34;: \u0026#34;POST\u0026#34;,\n \u0026#34;param\u0026#34;: \u0026#34;comments\u0026#34;,\n \u0026#34;attack\u0026#34;: \u0026#34;\u0026lt;/td\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;td\u0026gt;\u0026#34;,\n \u0026#34;evidence\u0026#34;: \u0026#34;\u0026lt;/td\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;td\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;\n }\n ], \n \u0026#34;count\u0026#34;: \u0026#34;2\u0026#34;, \n \u0026#34;systemic\u0026#34;: false, \n \u0026#34;solution\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;Phase: Architecture and Design\u0026lt;/p\u0026gt;\u0026lt;p\u0026gt;Use a vetted library or framework that does not ...\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;,\n \u0026#34;reference\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;http://projects.webappsec.org/Cross-Site-Scripting\u0026lt;/p\u0026gt;\u0026lt;p\u0026gt;http://cwe.mitre.org/data/definitions/79.html\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;cweid\u0026#34;: \u0026#34;79\u0026#34;,\n \u0026#34;wascid\u0026#34;: \u0026#34;8\u0026#34;,\n \u0026#34;sourceid\u0026#34;: \u0026#34;36977\u0026#34;\n },\n\u003c/code\u003e\u003c/pre\u003e\u003cp\u003eThe report can also include details of Sequences and related active scanning results, for example:\u003c/p\u003e", + "content": "traditional json report sample 34version34: 34dev build34 34generated34: 34fri feb 2022 13:04:5134 34created34: 3420220204t13:04:51236211400z34 34site34: 34name34: 34http:localhost:808034 34host34: 34localhost34 34port34: 34808034 34ssl34: 34false34 34alerts34: 34pluginid34: 344001234 34alertref34: 34alert34: 34cross site scripting reflected34 34riskcode34: 34334 34confidence34: 34234 34riskdesc34: 34high medium34 34desc34: 34pcrosssite xss attack technique that involves p34 34instances34: 34uri34: 34http:localhost:8080bodgeitsearchjspq3c2ffont3e3cscript3ealert281293b3c2fscript3e3cfont3e34 34nodename34: 34http:localhost:8080bodgeitsearchjsp q34 34method34: 34get34 34param34: 34q34 34attack34: 34fontscriptalert1scriptfont34 34evidence34: 34otherinfo34: 3434 34http:localhost:8080bodgeitcontactjsp34 34post34 34comments34 34tdscriptalert1scripttd34 34count34: 34systemic34: false 34solution34: 34pphase: architecture designppuse vetted library framework does not 34reference34: 34phttp:projectswebappsecorgcrosssitescriptingpphttp:cwemitreorgdatadefinitions79htmlp34 34cweid34: 347934 34wascid34: 34834 34sourceid34: 343697734 can also include details sequences related active scanning results example: 34sequences34: 34seq name34 34steps34: 34step34: 34134 34pass34: 34true34 34resultdetails34: 34pass34 34alertids34: 34original34: 34https:wwwexamplecomstep134 34replay34: 34fail34 34https:wwwexamplecomstep234 " }, { "url": "/docs/desktop/addons/report-generation/report-traditional-json-plus/", "title": "Traditional JSON Report with Requests and Responses", "keywords": ["","and","json","report","requests","responses","traditional","with"], "tags": null, - "summary": "\u003ch1 id=\"traditional-json-report-with-requests-and-responses\"\u003eTraditional JSON Report with Requests and Responses\u003c/h1\u003e\n\n\u003ch3 id=\"sections\"\u003eSections \u003ca class=\"header-link\" href=\"#sections\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\u003ctable\u003e\n \u003cthead\u003e\n \u003ctr\u003e\n \u003cth style=\"text-align: left\"\u003eSection\u003c/th\u003e\n \u003cth style=\"text-align: left\"\u003eID\u003c/th\u003e\n \u003c/tr\u003e\n \u003c/thead\u003e\n \u003ctbody\u003e\n \u003ctr\u003e\n \u003ctd style=\"text-align: left\"\u003eStatistics\u003c/td\u003e\n \u003ctd style=\"text-align: left\"\u003estatistics\u003c/td\u003e\n \u003c/tr\u003e\n \u003ctr\u003e\n \u003ctd style=\"text-align: left\"\u003eSequence Details\u003c/td\u003e\n \u003ctd style=\"text-align: left\"\u003esequencedetails\u003c/td\u003e\n \u003c/tr\u003e\n \u003ctr\u003e\n \u003ctd style=\"text-align: left\"\u003eAutomation Framework State\u003c/td\u003e\n \u003ctd style=\"text-align: left\"\u003eafstate\u003c/td\u003e\n \u003c/tr\u003e\n \u003c/tbody\u003e\n\u003c/table\u003e\n\n\u003ch3 id=\"sample\"\u003eSample \u003ca class=\"header-link\" href=\"#sample\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\u003cpre tabindex=\"0\"\u003e\u003ccode\u003e{\n \u0026#34;@version\u0026#34;: \u0026#34;Dev Build\u0026#34;,\n \u0026#34;@generated\u0026#34;: \u0026#34;Fri, 4 Feb 2022 13:04:51\u0026#34;,\n \u0026#34;created\u0026#34;: \u0026#34;2022-02-04T13:04:51.236211400Z\u0026#34;,\n \u0026#34;site\u0026#34;:[\n {\n \u0026#34;@name\u0026#34;: \u0026#34;http://localhost:8080\u0026#34;,\n \u0026#34;@host\u0026#34;: \u0026#34;localhost\u0026#34;,\n \u0026#34;@port\u0026#34;: \u0026#34;8080\u0026#34;,\n \u0026#34;@ssl\u0026#34;: \u0026#34;false\u0026#34;,\n \u0026#34;alerts\u0026#34;: [\n {\n \u0026#34;pluginid\u0026#34;: \u0026#34;40012\u0026#34;,\n \u0026#34;alertRef\u0026#34;: \u0026#34;40012\u0026#34;,\n \u0026#34;alert\u0026#34;: \u0026#34;Cross Site Scripting (Reflected)\u0026#34;,\n \u0026#34;name\u0026#34;: \u0026#34;Cross Site Scripting (Reflected)\u0026#34;,\n \u0026#34;riskcode\u0026#34;: \u0026#34;3\u0026#34;,\n \u0026#34;confidence\u0026#34;: \u0026#34;2\u0026#34;,\n \u0026#34;riskdesc\u0026#34;: \u0026#34;High (Medium)\u0026#34;,\n \u0026#34;desc\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;Cross-site Scripting (XSS) is an attack technique that involves ...\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;instances\u0026#34;:[\n {\n \u0026#34;uri\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E\u0026#34;,\n \u0026#34;method\u0026#34;: \u0026#34;GET\u0026#34;,\n \u0026#34;param\u0026#34;: \u0026#34;q\u0026#34;,\n \u0026#34;attack\u0026#34;: \u0026#34;\u0026lt;/font\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;font\u0026gt;\u0026#34;,\n \u0026#34;evidence\u0026#34;: \u0026#34;\u0026lt;/font\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;font\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;,\n \u0026#34;request-header\u0026#34;: \u0026#34;GET http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E HTTP/1.1\\r\\n...\u0026#34;,\n \u0026#34;request-body\u0026#34;: \u0026#34;\u0026#34;,\n \u0026#34;response-header\u0026#34;: \u0026#34;HTTP/1.1 200\\r\\nContent-Type: text/html;charset=ISO-8859-1\\r\\nContent-Length: 2045\\r\\nDate: Fri, 04 Feb 2022 11:56:38 GMT\\r\\n\\r\\n\u0026#34;,\n \u0026#34;response-body\u0026#34;: \u0026#34;\\n\\n\\n\\n\\n\\n\\n\u0026lt;!DOCTYPE HTML PUBLIC \\\u0026#34;-//W3C//DTD HTML 3.2//EN\\\u0026#34;\u0026gt;\\n\u0026lt;html\u0026gt;...\u0026#34;\n },\n {\n \u0026#34;uri\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/contact.jsp\u0026#34;,\n \u0026#34;method\u0026#34;: \u0026#34;POST\u0026#34;,\n \u0026#34;param\u0026#34;: \u0026#34;comments\u0026#34;,\n \u0026#34;attack\u0026#34;: \u0026#34;\u0026lt;/td\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;td\u0026gt;\u0026#34;,\n \u0026#34;evidence\u0026#34;: \u0026#34;\u0026lt;/td\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;td\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;,\n \u0026#34;request-header\u0026#34;: \u0026#34;POST http://localhost:8080/bodgeit/contact.jsp HTTP/1.1\\r\\nHost: localhost:8080\\r\\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0)...\u0026#34;,\n \u0026#34;request-body\u0026#34;: \u0026#34;null=\u0026amp;anticsrf=0.7583553183173598\u0026amp;comments=%3C%2Ftd%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Ctd%3E\u0026#34;,\n \u0026#34;response-header\u0026#34;: \u0026#34;HTTP/1.1 200\\r\\nContent-Type: text/html;charset=ISO-8859-1\\r\\nContent-Length: 2025\\r\\nDate: Fri, 04 Feb 2022 11:56:35 GMT\\r\\n\\r\\n\u0026#34;,\n \u0026#34;response-body\u0026#34;: \u0026#34;\\n\\n\\n\\n\\n\\n\u0026lt;!DOCTYPE HTML PUBLIC \\\u0026#34;-//W3C//DTD HTML 3.2//EN\\\u0026#34;\u0026gt;\\n\u0026lt;html\u0026gt;...\u0026#34;\n }\n ], \n \u0026#34;count\u0026#34;: \u0026#34;2\u0026#34;, \n \u0026#34;solution\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;Phase: Architecture and Design\u0026lt;/p\u0026gt;\u0026lt;p\u0026gt;Use a vetted library or framework that does not ...\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;,\n \u0026#34;reference\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;http://projects.webappsec.org/Cross-Site-Scripting\u0026lt;/p\u0026gt;\u0026lt;p\u0026gt;http://cwe.mitre.org/data/definitions/79.html\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;cweid\u0026#34;: \u0026#34;79\u0026#34;,\n \u0026#34;wascid\u0026#34;: \u0026#34;8\u0026#34;,\n \u0026#34;sourceid\u0026#34;: \u0026#34;36977\u0026#34;,\n \u0026#34;tags\u0026#34;:[ \n {\n \u0026#34;tag\u0026#34;: \u0026#34;OWASP_2021_A03\u0026#34;,\n \u0026#34;link\u0026#34;: \u0026#34;https://owasp.org/Top10/A03_2021-Injection/\u0026#34;\n },\n {\n \u0026#34;tag\u0026#34;: \u0026#34;WSTG-v42-INPV-01\u0026#34;,\n \u0026#34;link\u0026#34;: \u0026#34;https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting\u0026#34;\n },\n {\n \u0026#34;tag\u0026#34;: \u0026#34;OWASP_2017_A07\u0026#34;,\n \u0026#34;link\u0026#34;: \u0026#34;https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS).html\u0026#34;\n }\n ]\n },\n ...\n ]\n }\n ]\n}\n\u003c/code\u003e\u003c/pre\u003e\n\u003ch4 id=\"statistics-section\"\u003eStatistics Section \u003ca class=\"header-link\" href=\"#statistics-section\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h4\u003e\n\u003cp\u003eThe report can also include statistics, per site and global, for example:\u003c/p\u003e", - "content": "traditional json report requests responses sections section id statistics sequence details sequencedetails automation framework state afstate sample 34version34: 34dev build34 34generated34: 34fri feb 2022 13:04:5134 34created34: 3420220204t13:04:51236211400z34 34site34: 34name34: 34http:localhost:808034 34host34: 34localhost34 34port34: 34808034 34ssl34: 34false34 34alerts34: 34pluginid34: 344001234 34alertref34: 34alert34: 34cross site scripting reflected34 34riskcode34: 34334 34confidence34: 34234 34riskdesc34: 34high medium34 34desc34: 34pcrosssite xss attack technique that involves p34 34instances34: 34uri34: 34http:localhost:8080bodgeitsearchjspq3c2ffont3e3cscript3ealert281293b3c2fscript3e3cfont3e34 34method34: 34get34 34param34: 34q34 34attack34: 34fontscriptalert1scriptfont34 34evidence34: 34otherinfo34: 3434 34requestheader34: 34get http:localhost:8080bodgeitsearchjspq3c2ffont3e3cscript3ealert281293b3c2fscript3e3cfont3e http11rn34 34requestbody34: 34responseheader34: 34http11 200rncontenttype: texthtmlcharsetiso88591rncontentlength: 2045rndate: fri 04 11:56:38 gmtrnrn34 34responsebody34: 34nnnnnnndoctype html public 34w3cdtd 32en34nhtml34 34http:localhost:8080bodgeitcontactjsp34 34post34 34comments34 34tdscriptalert1scripttd34 34post http:localhost:8080bodgeitcontactjsp http11rnhost: localhost:8080rnuseragent: mozilla50 windows nt 100 win64 x64 rv:92034 34nullanticsrf07583553183173598comments3c2ftd3e3cscript3ealert281293b3c2fscript3e3ctd3e34 2025rndate: 11:56:35 34nnnnnndoctype 34count34: 34solution34: 34pphase: architecture designppuse vetted library does not 34reference34: 34phttp:projectswebappsecorgcrosssitescriptingpphttp:cwemitreorgdatadefinitions79htmlp34 34cweid34: 347934 34wascid34: 34834 34sourceid34: 343697734 34tags34: 34tag34: 34owasp2021a0334 34link34: 34https:owasporgtop10a032021injection34 34wstgv42inpv0134 34https:owasporgwwwprojectwebsecuritytestingguidev424webapplicationsecuritytesting07inputvalidationtesting01testingforreflectedcrosssitescripting34 34owasp2017a0734 34https:owasporgwwwprojecttopten2017a72017crosssitescriptingxsshtml34 can also include per global example: 34statistics34: 34sitespecificstata34: 34sitespecificstatb34: 34globalstata34: 34globalstatb34: sequences related active scanning results 34sequences34: 34seq name34 34steps34: 34step34: 34134 34pass34: 34true34 34resultdetails34: 34pass34 34alertids34: 34original34: 34https:wwwexamplecomstep134 https:wwwexamplecomstep1 wwwexamplecomrnuseragent: rv:920 gecko20100101 firefox920rnpragma: nocacherncachecontrol: nocacherntest: fooheaderx0000x0013rnrn34 34x0000x001334 34http10 0rntest: 34replay34: 34fail34 34https:wwwexamplecomstep234 https:wwwexamplecomstep2 errors warnings 34afplanerrors34: 34aerror a34 34afplanwarns34: 34warning b34 " + "summary": "\u003ch1 id=\"traditional-json-report-with-requests-and-responses\"\u003eTraditional JSON Report with Requests and Responses\u003c/h1\u003e\n\n\u003ch3 id=\"sections\"\u003eSections \u003ca class=\"header-link\" href=\"#sections\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\u003ctable\u003e\n \u003cthead\u003e\n \u003ctr\u003e\n \u003cth style=\"text-align: left\"\u003eSection\u003c/th\u003e\n \u003cth style=\"text-align: left\"\u003eID\u003c/th\u003e\n \u003c/tr\u003e\n \u003c/thead\u003e\n \u003ctbody\u003e\n \u003ctr\u003e\n \u003ctd style=\"text-align: left\"\u003eStatistics\u003c/td\u003e\n \u003ctd style=\"text-align: left\"\u003estatistics\u003c/td\u003e\n \u003c/tr\u003e\n \u003ctr\u003e\n \u003ctd style=\"text-align: left\"\u003eSequence Details\u003c/td\u003e\n \u003ctd style=\"text-align: left\"\u003esequencedetails\u003c/td\u003e\n \u003c/tr\u003e\n \u003ctr\u003e\n \u003ctd style=\"text-align: left\"\u003eAutomation Framework State\u003c/td\u003e\n \u003ctd style=\"text-align: left\"\u003eafstate\u003c/td\u003e\n \u003c/tr\u003e\n \u003c/tbody\u003e\n\u003c/table\u003e\n\n\u003ch3 id=\"sample\"\u003eSample \u003ca class=\"header-link\" href=\"#sample\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\u003cpre tabindex=\"0\"\u003e\u003ccode\u003e{\n \u0026#34;@version\u0026#34;: \u0026#34;Dev Build\u0026#34;,\n \u0026#34;@generated\u0026#34;: \u0026#34;Fri, 4 Feb 2022 13:04:51\u0026#34;,\n \u0026#34;created\u0026#34;: \u0026#34;2022-02-04T13:04:51.236211400Z\u0026#34;,\n \u0026#34;site\u0026#34;:[\n {\n \u0026#34;@name\u0026#34;: \u0026#34;http://localhost:8080\u0026#34;,\n \u0026#34;@host\u0026#34;: \u0026#34;localhost\u0026#34;,\n \u0026#34;@port\u0026#34;: \u0026#34;8080\u0026#34;,\n \u0026#34;@ssl\u0026#34;: \u0026#34;false\u0026#34;,\n \u0026#34;alerts\u0026#34;: [\n {\n \u0026#34;pluginid\u0026#34;: \u0026#34;40012\u0026#34;,\n \u0026#34;alertRef\u0026#34;: \u0026#34;40012\u0026#34;,\n \u0026#34;alert\u0026#34;: \u0026#34;Cross Site Scripting (Reflected)\u0026#34;,\n \u0026#34;name\u0026#34;: \u0026#34;Cross Site Scripting (Reflected)\u0026#34;,\n \u0026#34;riskcode\u0026#34;: \u0026#34;3\u0026#34;,\n \u0026#34;confidence\u0026#34;: \u0026#34;2\u0026#34;,\n \u0026#34;riskdesc\u0026#34;: \u0026#34;High (Medium)\u0026#34;,\n \u0026#34;desc\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;Cross-site Scripting (XSS) is an attack technique that involves ...\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;instances\u0026#34;:[\n {\n \u0026#34;uri\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E\u0026#34;,\n \u0026#34;nodeName\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/search.jsp (q)\u0026#34;,\n \u0026#34;method\u0026#34;: \u0026#34;GET\u0026#34;,\n \u0026#34;param\u0026#34;: \u0026#34;q\u0026#34;,\n \u0026#34;attack\u0026#34;: \u0026#34;\u0026lt;/font\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;font\u0026gt;\u0026#34;,\n \u0026#34;evidence\u0026#34;: \u0026#34;\u0026lt;/font\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;font\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;,\n \u0026#34;request-header\u0026#34;: \u0026#34;GET http://localhost:8080/bodgeit/search.jsp?q=%3C%2Ffont%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Cfont%3E HTTP/1.1\\r\\n...\u0026#34;,\n \u0026#34;request-body\u0026#34;: \u0026#34;\u0026#34;,\n \u0026#34;response-header\u0026#34;: \u0026#34;HTTP/1.1 200\\r\\nContent-Type: text/html;charset=ISO-8859-1\\r\\nContent-Length: 2045\\r\\nDate: Fri, 04 Feb 2022 11:56:38 GMT\\r\\n\\r\\n\u0026#34;,\n \u0026#34;response-body\u0026#34;: \u0026#34;\\n\\n\\n\\n\\n\\n\\n\u0026lt;!DOCTYPE HTML PUBLIC \\\u0026#34;-//W3C//DTD HTML 3.2//EN\\\u0026#34;\u0026gt;\\n\u0026lt;html\u0026gt;...\u0026#34;\n },\n {\n \u0026#34;uri\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/contact.jsp\u0026#34;,\n \u0026#34;nodeName\u0026#34;: \u0026#34;http://localhost:8080/bodgeit/contact.jsp\u0026#34;,\n \u0026#34;method\u0026#34;: \u0026#34;POST\u0026#34;,\n \u0026#34;param\u0026#34;: \u0026#34;comments\u0026#34;,\n \u0026#34;attack\u0026#34;: \u0026#34;\u0026lt;/td\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;td\u0026gt;\u0026#34;,\n \u0026#34;evidence\u0026#34;: \u0026#34;\u0026lt;/td\u0026gt;\u0026lt;scrIpt\u0026gt;alert(1);\u0026lt;/scRipt\u0026gt;\u0026lt;td\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;,\n \u0026#34;request-header\u0026#34;: \u0026#34;POST http://localhost:8080/bodgeit/contact.jsp HTTP/1.1\\r\\nHost: localhost:8080\\r\\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0)...\u0026#34;,\n \u0026#34;request-body\u0026#34;: \u0026#34;null=\u0026amp;anticsrf=0.7583553183173598\u0026amp;comments=%3C%2Ftd%3E%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E%3Ctd%3E\u0026#34;,\n \u0026#34;response-header\u0026#34;: \u0026#34;HTTP/1.1 200\\r\\nContent-Type: text/html;charset=ISO-8859-1\\r\\nContent-Length: 2025\\r\\nDate: Fri, 04 Feb 2022 11:56:35 GMT\\r\\n\\r\\n\u0026#34;,\n \u0026#34;response-body\u0026#34;: \u0026#34;\\n\\n\\n\\n\\n\\n\u0026lt;!DOCTYPE HTML PUBLIC \\\u0026#34;-//W3C//DTD HTML 3.2//EN\\\u0026#34;\u0026gt;\\n\u0026lt;html\u0026gt;...\u0026#34;\n }\n ], \n \u0026#34;count\u0026#34;: \u0026#34;2\u0026#34;, \n \u0026#34;systemic\u0026#34;: false, \n \u0026#34;solution\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;Phase: Architecture and Design\u0026lt;/p\u0026gt;\u0026lt;p\u0026gt;Use a vetted library or framework that does not ...\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;otherinfo\u0026#34;: \u0026#34;\u0026#34;,\n \u0026#34;reference\u0026#34;: \u0026#34;\u0026lt;p\u0026gt;http://projects.webappsec.org/Cross-Site-Scripting\u0026lt;/p\u0026gt;\u0026lt;p\u0026gt;http://cwe.mitre.org/data/definitions/79.html\u0026lt;/p\u0026gt;\u0026#34;,\n \u0026#34;cweid\u0026#34;: \u0026#34;79\u0026#34;,\n \u0026#34;wascid\u0026#34;: \u0026#34;8\u0026#34;,\n \u0026#34;sourceid\u0026#34;: \u0026#34;36977\u0026#34;,\n \u0026#34;tags\u0026#34;:[ \n {\n \u0026#34;tag\u0026#34;: \u0026#34;OWASP_2021_A03\u0026#34;,\n \u0026#34;link\u0026#34;: \u0026#34;https://owasp.org/Top10/A03_2021-Injection/\u0026#34;\n },\n {\n \u0026#34;tag\u0026#34;: \u0026#34;WSTG-v42-INPV-01\u0026#34;,\n \u0026#34;link\u0026#34;: \u0026#34;https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting\u0026#34;\n },\n {\n \u0026#34;tag\u0026#34;: \u0026#34;OWASP_2017_A07\u0026#34;,\n \u0026#34;link\u0026#34;: \u0026#34;https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS).html\u0026#34;\n }\n ]\n },\n ...\n ]\n }\n ]\n}\n\u003c/code\u003e\u003c/pre\u003e\n\u003ch4 id=\"statistics-section\"\u003eStatistics Section \u003ca class=\"header-link\" href=\"#statistics-section\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h4\u003e\n\u003cp\u003eThe report can also include statistics, per site and global, for example:\u003c/p\u003e", + "content": "traditional json report requests responses sections section id statistics sequence details sequencedetails automation framework state afstate sample 34version34: 34dev build34 34generated34: 34fri feb 2022 13:04:5134 34created34: 3420220204t13:04:51236211400z34 34site34: 34name34: 34http:localhost:808034 34host34: 34localhost34 34port34: 34808034 34ssl34: 34false34 34alerts34: 34pluginid34: 344001234 34alertref34: 34alert34: 34cross site scripting reflected34 34riskcode34: 34334 34confidence34: 34234 34riskdesc34: 34high medium34 34desc34: 34pcrosssite xss attack technique that involves p34 34instances34: 34uri34: 34http:localhost:8080bodgeitsearchjspq3c2ffont3e3cscript3ealert281293b3c2fscript3e3cfont3e34 34nodename34: 34http:localhost:8080bodgeitsearchjsp q34 34method34: 34get34 34param34: 34q34 34attack34: 34fontscriptalert1scriptfont34 34evidence34: 34otherinfo34: 3434 34requestheader34: 34get http:localhost:8080bodgeitsearchjspq3c2ffont3e3cscript3ealert281293b3c2fscript3e3cfont3e http11rn34 34requestbody34: 34responseheader34: 34http11 200rncontenttype: texthtmlcharsetiso88591rncontentlength: 2045rndate: fri 04 11:56:38 gmtrnrn34 34responsebody34: 34nnnnnnndoctype html public 34w3cdtd 32en34nhtml34 34http:localhost:8080bodgeitcontactjsp34 34post34 34comments34 34tdscriptalert1scripttd34 34post http:localhost:8080bodgeitcontactjsp http11rnhost: localhost:8080rnuseragent: mozilla50 windows nt 100 win64 x64 rv:92034 34nullanticsrf07583553183173598comments3c2ftd3e3cscript3ealert281293b3c2fscript3e3ctd3e34 2025rndate: 11:56:35 34nnnnnndoctype 34count34: 34systemic34: false 34solution34: 34pphase: architecture designppuse vetted library does not 34reference34: 34phttp:projectswebappsecorgcrosssitescriptingpphttp:cwemitreorgdatadefinitions79htmlp34 34cweid34: 347934 34wascid34: 34834 34sourceid34: 343697734 34tags34: 34tag34: 34owasp2021a0334 34link34: 34https:owasporgtop10a032021injection34 34wstgv42inpv0134 34https:owasporgwwwprojectwebsecuritytestingguidev424webapplicationsecuritytesting07inputvalidationtesting01testingforreflectedcrosssitescripting34 34owasp2017a0734 34https:owasporgwwwprojecttopten2017a72017crosssitescriptingxsshtml34 can also include per global example: 34statistics34: 34sitespecificstata34: 34sitespecificstatb34: 34globalstata34: 34globalstatb34: sequences related active scanning results 34sequences34: 34seq name34 34steps34: 34step34: 34134 34pass34: 34true34 34resultdetails34: 34pass34 34alertids34: 34original34: 34https:wwwexamplecomstep134 https:wwwexamplecomstep1 wwwexamplecomrnuseragent: rv:920 gecko20100101 firefox920rnpragma: nocacherncachecontrol: nocacherntest: fooheaderx0000x0013rnrn34 34x0000x001334 34http10 0rntest: 34replay34: 34fail34 34https:wwwexamplecomstep234 https:wwwexamplecomstep2 errors warnings 34afplanerrors34: 34aerror a34 34afplanwarns34: 34warning b34 " }, { "url": "/docs/desktop/addons/report-generation/report-traditional-markdown/", @@ -8013,7 +8013,7 @@ "keywords": ["","markdown","report","traditional"], "tags": null, "summary": "\u003ch1 id=\"traditional-markdown-report\"\u003eTraditional Markdown Report\u003c/h1\u003e\n\n\u003ch3 id=\"sample\"\u003eSample \u003ca class=\"header-link\" href=\"#sample\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\n\u003ch4 id=\"header-risk-confidence\"\u003eHeader \u003ccode\u003eRisk (Confidence)\u003c/code\u003e \u003ca class=\"header-link\" href=\"#header-risk-confidence\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h4\u003e\n\u003cp\u003eThis header is a combination identifier, showing Risk followed by Confidence. For example \u003ccode\u003eHigh (Medium)\u003c/code\u003e , would indicate a High risk issue identified with Medium confidence.\u003c/p\u003e", - "content": "traditional markdown report sample header risk confidence combination identifier showing followed by example high medium would indicate issue identified zap checkmarx scanning summary alerts level number low informational name instances anticsrf tokens check 10 cross site scripting reflected buffer overflow 529 content security policy csp not set 58 passive scan rule: denial service xframeoptions 55 absence 73 application error disclosure cookie httponly flag without samesite attribute page banner information leak debug messages permissions 59 xcontenttypeoptions missing 62 suspicious comments loosely scoped modern web 33 nonstorable storable cacheable 64 user controllable html element potential xss 32 alert detail https:wwwzaproxyorgdocsalerts20012 description crosssite request forgery attack that involves forcing victim send http target destination their knowledge intent order perform action underlying cause functionality using predictable urlform actions repeatable way nature csrf exploits trust has contrast like attacks necessarily they can also known xsrf oneclick session riding confused deputy sea surf effective situations including: active authenticated via auth same local network primarily been used against victim39s privileges recent techniques have discovered disclose gaining access response dramatically increased when vulnerable because platform allowing operate within bounds sameorigin url: http:localhost:8080bodgeitadvancedjsp method: get parameter: attack: evidence: form id34advanced34 name34advanced34 method34post34 onsubmit34return validateformthisfalse34 other info: id34query34 http:localhost:8080bodgeitbasketjsp action34basketjsp34 " + "content": "traditional markdown report sample header risk confidence combination identifier showing followed by example high medium would indicate issue identified zap checkmarx scanning summary alerts level number low informational name instances anticsrf tokens check 10 cross site scripting reflected buffer overflow 529 content security policy csp not set 58 passive scan rule: denial service xframeoptions 55 absence 73 application error disclosure cookie httponly flag without samesite attribute page banner information leak debug messages permissions 59 xcontenttypeoptions missing 62 suspicious comments loosely scoped modern web 33 nonstorable storable cacheable 64 user controllable html element potential xss 32 alert detail https:wwwzaproxyorgdocsalerts20012 description crosssite request forgery attack that involves forcing victim send http target destination their knowledge intent order perform action underlying cause functionality using predictable urlform actions repeatable way nature csrf exploits trust has contrast like attacks necessarily they can also known xsrf oneclick session riding confused deputy sea surf effective situations including: active authenticated via auth same local network primarily been used against victim39s privileges recent techniques have discovered disclose gaining access response dramatically increased when vulnerable because platform allowing operate within bounds sameorigin url: http:localhost:8080bodgeitadvancedjsp node name: method: get parameter: attack: evidence: form id34advanced34 name34advanced34 method34post34 onsubmit34return validateformthisfalse34 other info: id34query34 http:localhost:8080bodgeitbasketjsp action34basketjsp34 " }, { "url": "/docs/desktop/addons/report-generation/report-traditional-pdf/", @@ -8028,16 +8028,16 @@ "title": "Traditional XML Report", "keywords": ["","report","traditional","xml"], "tags": null, - "summary": "\u003ch1 id=\"traditional-xml-report\"\u003eTraditional XML Report\u003c/h1\u003e\n\n\u003ch3 id=\"sample\"\u003eSample \u003ca class=\"header-link\" href=\"#sample\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\u003cpre tabindex=\"0\"\u003e\u003ccode\u003e\u0026lt;?xml version=\u0026#34;1.0\u0026#34;?\u0026gt;\n\u0026lt;OWASPZAPReport version=\u0026#34;Dev Build\u0026#34; generated=\u0026#34;Fri, 4 Feb 2022 17:42:18\u0026#34; created=\u0026#34;2022-02-04T17:42:18.236211400Z\u0026#34;\u0026gt;\n \n \u0026lt;site name=\u0026#34;http://localhost:8080\u0026#34; host=\u0026#34;localhost\u0026#34; port=\u0026#34;8080\u0026#34; ssl=\u0026#34;false\u0026#34;\u0026gt;\n \u0026lt;alerts\u0026gt;\n\n \u0026lt;alertitem\u0026gt;\n \u0026lt;pluginid\u0026gt;20012\u0026lt;/pluginid\u0026gt;\n \u0026lt;alertRef\u0026gt;20012\u0026lt;/alertRef\u0026gt;\n \u0026lt;alert\u0026gt;Anti-CSRF Tokens Check\u0026lt;/alert\u0026gt;\n \u0026lt;name\u0026gt;Anti-CSRF Tokens Check\u0026lt;/name\u0026gt;\n \u0026lt;riskcode\u0026gt;3\u0026lt;/riskcode\u0026gt;\n \u0026lt;confidence\u0026gt;2\u0026lt;/confidence\u0026gt;\n \u0026lt;riskdesc\u0026gt;High (Medium)\u0026lt;/riskdesc\u0026gt;\n \u0026lt;confidencedesc\u0026gt;Medium\u0026lt;/confidencedesc\u0026gt;\n \u0026lt;desc\u0026gt;\u0026lt;p\u0026gt;A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge...\u0026lt;/desc\u0026gt;\n \u0026lt;instances\u0026gt;\n\n \u0026lt;instance\u0026gt;\n \u0026lt;uri\u0026gt;http://localhost:8080/bodgeit/advanced.jsp\u0026lt;/uri\u0026gt;\n \u0026lt;method\u0026gt;GET\u0026lt;/method\u0026gt;\n \u0026lt;param\u0026gt;\u0026lt;/param\u0026gt;\n \u0026lt;attack\u0026gt;\u0026lt;/attack\u0026gt;\n \u0026lt;evidence\u0026gt;\u0026lt;form id=\u0026#34;advanced\u0026#34; name=\u0026#34;advanced\u0026#34; method=\u0026#34;POST\u0026#34; onsubmit=\u0026#34;return validateForm(this);false;\u0026#34;\u0026gt;\u0026lt;/evidence\u0026gt;\n \u0026lt;otherinfo\u0026gt;\u0026lt;/otherinfo\u0026gt;\n \u0026lt;/instance\u0026gt;\n\n \u0026lt;instance\u0026gt;\n \u0026lt;uri\u0026gt;http://localhost:8080/bodgeit/advanced.jsp\u0026lt;/uri\u0026gt;\n \u0026lt;method\u0026gt;GET\u0026lt;/method\u0026gt;\n \u0026lt;param\u0026gt;\u0026lt;/param\u0026gt;\n \u0026lt;attack\u0026gt;\u0026lt;/attack\u0026gt;\n \u0026lt;evidence\u0026gt;\u0026lt;form id=\u0026#34;query\u0026#34; name=\u0026#34;advanced\u0026#34; method=\u0026#34;POST\u0026#34;\u0026gt;\u0026lt;/evidence\u0026gt;\n \u0026lt;otherinfo\u0026gt;\u0026lt;/otherinfo\u0026gt;\n \u0026lt;/instance\u0026gt;\n\n \u0026lt;instance\u0026gt;\n \u0026lt;uri\u0026gt;http://localhost:8080/bodgeit/basket.jsp\u0026lt;/uri\u0026gt;\n \u0026lt;method\u0026gt;GET\u0026lt;/method\u0026gt;\n \u0026lt;param\u0026gt;\u0026lt;/param\u0026gt;\n \u0026lt;attack\u0026gt;\u0026lt;/attack\u0026gt;\n \u0026lt;evidence\u0026gt;\u0026lt;form action=\u0026#34;basket.jsp\u0026#34; method=\u0026#34;post\u0026#34;\u0026gt;\u0026lt;/evidence\u0026gt;\n \u0026lt;otherinfo\u0026gt;\u0026lt;/otherinfo\u0026gt;\n \u0026lt;/instance\u0026gt;\n\u003c/code\u003e\u003c/pre\u003e", - "content": "traditional xml report sample version341034 owaspzapreport version34dev build34 generated34fri feb 2022 17:42:1834 created3420220204t17:42:18236211400z34 site name34http:localhost:808034 host34localhost34 port34808034 ssl34false34 alerts alertitem pluginid20012pluginid alertref20012alertref alertanticsrf tokens checkalert nameanticsrf checkname riskcode3riskcode confidence2confidence riskdeschigh mediumriskdesc confidencedescmediumconfidencedesc descpa crosssite request forgery attack that involves forcing victim send http target destination without their knowledgedesc instances instance urihttp:localhost:8080bodgeitadvancedjspuri methodgetmethod paramparam attackattack evidenceform id34advanced34 name34advanced34 method34post34 onsubmit34return validateformthisfalse34evidence otherinfootherinfo id34query34 method34post34evidence urihttp:localhost:8080bodgeitbasketjspuri action34basketjsp34 " + "summary": "\u003ch1 id=\"traditional-xml-report\"\u003eTraditional XML Report\u003c/h1\u003e\n\n\u003ch3 id=\"sample\"\u003eSample \u003ca class=\"header-link\" href=\"#sample\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\u003cpre tabindex=\"0\"\u003e\u003ccode\u003e\u0026lt;?xml version=\u0026#34;1.0\u0026#34;?\u0026gt;\n\u0026lt;OWASPZAPReport version=\u0026#34;Dev Build\u0026#34; generated=\u0026#34;Fri, 4 Feb 2022 17:42:18\u0026#34; created=\u0026#34;2022-02-04T17:42:18.236211400Z\u0026#34;\u0026gt;\n \n \u0026lt;site name=\u0026#34;http://localhost:8080\u0026#34; host=\u0026#34;localhost\u0026#34; port=\u0026#34;8080\u0026#34; ssl=\u0026#34;false\u0026#34;\u0026gt;\n \u0026lt;alerts\u0026gt;\n\n \u0026lt;alertitem\u0026gt;\n \u0026lt;pluginid\u0026gt;20012\u0026lt;/pluginid\u0026gt;\n \u0026lt;alertRef\u0026gt;20012\u0026lt;/alertRef\u0026gt;\n \u0026lt;alert\u0026gt;Anti-CSRF Tokens Check\u0026lt;/alert\u0026gt;\n \u0026lt;name\u0026gt;Anti-CSRF Tokens Check\u0026lt;/name\u0026gt;\n \u0026lt;riskcode\u0026gt;3\u0026lt;/riskcode\u0026gt;\n \u0026lt;confidence\u0026gt;2\u0026lt;/confidence\u0026gt;\n \u0026lt;riskdesc\u0026gt;High (Medium)\u0026lt;/riskdesc\u0026gt;\n \u0026lt;confidencedesc\u0026gt;Medium\u0026lt;/confidencedesc\u0026gt;\n \u0026lt;desc\u0026gt;\u0026lt;p\u0026gt;A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge...\u0026lt;/desc\u0026gt;\n \u0026lt;instances\u0026gt;\n \u0026lt;instance\u0026gt;\n \u0026lt;uri\u0026gt;http://localhost:8080/bodgeit/advanced.jsp\u0026lt;/uri\u0026gt;\n \u0026lt;nodeName\u0026gt;http://localhost:8080/bodgeit/advanced.jsp\u0026lt;/nodeName\u0026gt;\n \u0026lt;method\u0026gt;GET\u0026lt;/method\u0026gt;\n \u0026lt;param\u0026gt;\u0026lt;/param\u0026gt;\n \u0026lt;attack\u0026gt;\u0026lt;/attack\u0026gt;\n \u0026lt;evidence\u0026gt;\u0026lt;form id=\u0026#34;advanced\u0026#34; name=\u0026#34;advanced\u0026#34; method=\u0026#34;POST\u0026#34; onsubmit=\u0026#34;return validateForm(this);false;\u0026#34;\u0026gt;\u0026lt;/evidence\u0026gt;\n \u0026lt;otherinfo\u0026gt;\u0026lt;/otherinfo\u0026gt;\n \u0026lt;/instance\u0026gt;\n\n \u0026lt;instance\u0026gt;\n \u0026lt;uri\u0026gt;http://localhost:8080/bodgeit/advanced.jsp\u0026lt;/uri\u0026gt;\n \u0026lt;nodeName\u0026gt;http://localhost:8080/bodgeit/advanced.jsp\u0026lt;/nodeName\u0026gt;\n \u0026lt;method\u0026gt;GET\u0026lt;/method\u0026gt;\n \u0026lt;param\u0026gt;\u0026lt;/param\u0026gt;\n \u0026lt;attack\u0026gt;\u0026lt;/attack\u0026gt;\n \u0026lt;evidence\u0026gt;\u0026lt;form id=\u0026#34;query\u0026#34; name=\u0026#34;advanced\u0026#34; method=\u0026#34;POST\u0026#34;\u0026gt;\u0026lt;/evidence\u0026gt;\n \u0026lt;otherinfo\u0026gt;\u0026lt;/otherinfo\u0026gt;\n \u0026lt;/instance\u0026gt;\n\n \u0026lt;instance\u0026gt;\n \u0026lt;uri\u0026gt;http://localhost:8080/bodgeit/basket.jsp\u0026lt;/uri\u0026gt;\n \u0026lt;nodeName\u0026gt;http://localhost:8080/bodgeit/basket.jsp\u0026lt;/nodeName\u0026gt;\n \u0026lt;method\u0026gt;GET\u0026lt;/method\u0026gt;\n \u0026lt;param\u0026gt;\u0026lt;/param\u0026gt;\n \u0026lt;attack\u0026gt;\u0026lt;/attack\u0026gt;\n \u0026lt;evidence\u0026gt;\u0026lt;form action=\u0026#34;basket.jsp\u0026#34; method=\u0026#34;post\u0026#34;\u0026gt;\u0026lt;/evidence\u0026gt;\n \u0026lt;otherinfo\u0026gt;\u0026lt;/otherinfo\u0026gt;\n \u0026lt;/instance\u0026gt;\n \u0026lt;count\u0026gt;2\u0026lt;/count\u0026gt;\n \u0026lt;systemic\u0026gt;false\u0026lt;/systemic\u0026gt;\n \u0026lt;solution\u0026gt;The solution\u0026lt;/solution\u0026gt;\n \u0026lt;otherinfo\u0026gt;The other info\u0026lt;/otherinfo\u0026gt;\n\u003c/code\u003e\u003c/pre\u003e", + "content": "traditional xml report sample version341034 owaspzapreport version34dev build34 generated34fri feb 2022 17:42:1834 created3420220204t17:42:18236211400z34 site name34http:localhost:808034 host34localhost34 port34808034 ssl34false34 alerts alertitem pluginid20012pluginid alertref20012alertref alertanticsrf tokens checkalert nameanticsrf checkname riskcode3riskcode confidence2confidence riskdeschigh mediumriskdesc confidencedescmediumconfidencedesc descpa crosssite request forgery attack that involves forcing victim send http target destination without their knowledgedesc instances instance urihttp:localhost:8080bodgeitadvancedjspuri nodenamehttp:localhost:8080bodgeitadvancedjspnodename methodgetmethod paramparam attackattack evidenceform id34advanced34 name34advanced34 method34post34 onsubmit34return validateformthisfalse34evidence otherinfootherinfo id34query34 method34post34evidence urihttp:localhost:8080bodgeitbasketjspuri nodenamehttp:localhost:8080bodgeitbasketjspnodename action34basketjsp34 count2count systemicfalsesystemic solutionthe solutionsolution otherinfothe other infootherinfo " }, { "url": "/docs/desktop/addons/report-generation/report-traditional-xml-plus/", "title": "Traditional XML Report with Requests and Responses", "keywords": ["","and","report","requests","responses","traditional","with","xml"], "tags": null, - "summary": "\u003ch1 id=\"traditional-xml-report-with-requests-and-responses\"\u003eTraditional XML Report with Requests and Responses\u003c/h1\u003e\n\n\u003ch3 id=\"sample\"\u003eSample \u003ca class=\"header-link\" href=\"#sample\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\u003cpre tabindex=\"0\"\u003e\u003ccode\u003e \u0026lt;?xml version=\u0026#34;1.0\u0026#34;?\u0026gt;\n \u0026lt;OWASPZAPReport version=\u0026#34;2.11.1\u0026#34; generated=\u0026#34;Fr., 30 Sep. 2022 08:40:35\u0026#34; created=\u0026#34;2022-09-30T08:40:35.236211400Z\u0026#34;\u0026gt;\n \u0026lt;site name=\u0026#34;http://localhost:8080\u0026#34; host=\u0026#34;localhost\u0026#34; port=\u0026#34;8080\u0026#34; ssl=\u0026#34;false\u0026#34;\u0026gt;\n \u0026lt;alerts\u0026gt;\n \n \u0026lt;alertitem\u0026gt;\n \u0026lt;pluginid\u0026gt;90027\u0026lt;/pluginid\u0026gt;\n \u0026lt;alertRef\u0026gt;90027\u0026lt;/alertRef\u0026gt;\n \u0026lt;alert\u0026gt;Cookie Slack Detector\u0026lt;/alert\u0026gt;\n \u0026lt;name\u0026gt;Cookie Slack Detector\u0026lt;/name\u0026gt;\n \u0026lt;riskcode\u0026gt;1\u0026lt;/riskcode\u0026gt;\n \u0026lt;confidence\u0026gt;1\u0026lt;/confidence\u0026gt;\n \u0026lt;riskdesc\u0026gt;Low (Low)\u0026lt;/riskdesc\u0026gt;\n \u0026lt;confidencedesc\u0026gt;Low\u0026lt;/confidencedesc\u0026gt;\n \u0026lt;desc\u0026gt;Repeated GET requests: drop a different cookie each time, followed by normal request with all cookies to stabilize session, compare responses against original baseline GET. This can reveal areas where cookie based authentication/attributes are not actually enforced.\u0026lt;/desc\u0026gt;\n \u0026lt;instances\u0026gt;\n \n \u0026lt;instance\u0026gt;\n \u0026lt;uri\u0026gt;http://localhost:8080/bodgeit/js\u0026lt;/uri\u0026gt;\n \u0026lt;method\u0026gt;GET\u0026lt;/method\u0026gt;\n \u0026lt;param\u0026gt;\u0026lt;/param\u0026gt;\n \u0026lt;attack\u0026gt;\u0026lt;/attack\u0026gt;\n \u0026lt;evidence\u0026gt;\u0026lt;/evidence\u0026gt;\n \u0026lt;otherinfo\u0026gt;\u0026lt;/otherinfo\u0026gt;\n \u0026lt;requestheader\u0026gt;GET http://localhost:8080/bodgeit/js HTTP/1.1\n Host: localhost:8080\n User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:105.0) Gecko/20100101 Firefox/105.0\n Accept: */*\n Accept-Language: de,en-US;q=0.7,en;q=0.3\n Connection: keep-alive\n Referer: https://localhost:8080/bodgeit/\n Cookie: JSESSIONID=9E75E26E50F681208096FFAA0B566901\n Sec-Fetch-Dest: script\n Sec-Fetch-Mode: no-cors\n Sec-Fetch-Site: same-origin\n Content-Length: 0\n \n \u0026lt;/requestheader\u0026gt;\n \u0026lt;requestbody\u0026gt;\u0026lt;/requestbody\u0026gt;\n \u0026lt;responseheader\u0026gt;HTTP/1.1 302 Found\n Server: Apache-Coyote/1.1\n Location: /bodgeit/js/\n Content-Length: 0\n Date: Fri, 30 Sep 2022 06:40:17 GMT\n \n \u0026lt;/responseheader\u0026gt;\n \u0026lt;responsebody\u0026gt;\u0026lt;/responsebody\u0026gt;\n \u0026lt;/instance\u0026gt;\n \n \n \u0026lt;instance\u0026gt;\n \u0026lt;uri\u0026gt;http://localhost:8080/bodgeit/js/util.js\u0026lt;/uri\u0026gt;\n \u0026lt;method\u0026gt;GET\u0026lt;/method\u0026gt;\n \u0026lt;param\u0026gt;\u0026lt;/param\u0026gt;\n \u0026lt;attack\u0026gt;\u0026lt;/attack\u0026gt;\n \u0026lt;evidence\u0026gt;\u0026lt;/evidence\u0026gt;\n \u0026lt;otherinfo\u0026gt;\u0026lt;/otherinfo\u0026gt;\n \u0026lt;requestheader\u0026gt;GET http://localhost:8080/bodgeit/js/util.js HTTP/1.1\n Host: localhost:8080\n User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:105.0) Gecko/20100101 Firefox/105.0\n Accept: */*\n Accept-Language: de,en-US;q=0.7,en;q=0.3\n Connection: keep-alive\n Referer: https://localhost:8080/bodgeit/\n Cookie: JSESSIONID=9E75E26E50F681208096FFAA0B566901\n Sec-Fetch-Dest: script\n Sec-Fetch-Mode: no-cors\n Sec-Fetch-Site: same-origin\n Content-Length: 0\n \n \u0026lt;/requestheader\u0026gt;\n \u0026lt;requestbody\u0026gt;\u0026lt;/requestbody\u0026gt;\n \u0026lt;responseheader\u0026gt;HTTP/1.1 200 OK\n Server: Apache-Coyote/1.1\n Accept-Ranges: bytes\n ETag: W/\u0026amp;quot;1812-1343651578000\u0026amp;quot;\n Last-Modified: Mon, 30 Jul 2012 12:32:58 GMT\n Content-Type: application/javascript\n Content-Length: 1812\n Date: Fri, 30 Sep 2022 06:40:17 GMT\n \n \u0026lt;/responseheader\u0026gt;\n \u0026lt;responsebody\u0026gt;\n function loadfile(filename){\n var filetype = filename.split(\u0026amp;apos;.\u0026amp;apos;).pop();\n switch (filetype){\n case \u0026amp;quot;js\u0026amp;quot;:\n var insert=document.createElement(\u0026amp;apos;script\u0026amp;apos;)\n insert.setAttribute(\u0026amp;quot;type\u0026amp;quot;,\u0026amp;quot;text/javascript\u0026amp;quot;)\n insert.setAttribute(\u0026amp;quot;src\u0026amp;quot;, filename)\n break;\n case \u0026amp;apos;css\u0026amp;apos;:\n var insert=document.createElement(\u0026amp;quot;link\u0026amp;quot;);\n insert.setAttribute(\u0026amp;quot;type\u0026amp;quot;, \u0026amp;quot;text/css\u0026amp;quot;)\n insert.setAttribute(\u0026amp;quot;href\u0026amp;quot;, filename)\n insert.setAttribute(\u0026amp;quot;rel\u0026amp;quot;, \u0026amp;quot;stylesheet\u0026amp;quot;)\n break;\n }\n if (typeof insert!=\u0026amp;quot;undefined\u0026amp;quot;)\n document.getElementsByTagName(\u0026amp;quot;head\u0026amp;quot;)[0].appendChild(insert);\n return false;\n }\n \n \n ////The following is from:\n //http://stackoverflow.com/questions/316781/how-to-build-query-string-with-javascript\n \n function form_to_params( form )\n {\n var output = \u0026amp;quot;\u0026amp;quot;;\n var length = form.elements.length\n for( var i = 0; i \u0026amp;lt; length; i++ )\n {\n element = form.elements[i]\n \n if(element.tagName == \u0026amp;apos;TEXTAREA\u0026amp;apos; )\n {\n output += \u0026amp;quot;|\u0026amp;quot; + element.name + \u0026amp;quot;:\u0026amp;quot; + element.value; \n }\n else if( element.tagName == \u0026amp;apos;INPUT\u0026amp;apos; )\n {\n switch(element.type){\n case \u0026amp;apos;radio\u0026amp;apos;:\n case \u0026amp;apos;checkbox\u0026amp;apos;:\n if(element.checked \u0026amp;amp;\u0026amp;amp; !element.value){\n output += \u0026amp;quot;|\u0026amp;quot; + element.name + \u0026amp;quot;:on\u0026amp;quot;;\n break;\n }\n case \u0026amp;apos;text\u0026amp;apos;:\n case \u0026amp;apos;hidden\u0026amp;apos;:\n case \u0026amp;apos;password\u0026amp;apos;:\n if(element.value)\n output += \u0026amp;quot;|\u0026amp;quot; + element.name + \u0026amp;quot;:\u0026amp;quot; + element.value;\n break; \n }\n }\n }\n return output.substring(1);\n }\n \n \n function htmlEntities(str) {\n return String(str).replace(/\u0026amp;amp;/g, \u0026amp;apos;\u0026amp;amp;amp;\u0026amp;apos;).replace(/\u0026amp;lt;/g, \u0026amp;apos;\u0026amp;amp;lt;\u0026amp;apos;).replace(/\u0026amp;gt;/g, \u0026amp;apos;\u0026amp;amp;gt;\u0026amp;apos;).replace(/\u0026amp;quot;/g, \u0026amp;apos;\u0026amp;amp;quot;\u0026amp;apos;);\n }\u0026lt;/responsebody\u0026gt;\n \u0026lt;/instance\u0026gt;\n \n \u0026lt;/instances\u0026gt;\n \u0026lt;count\u0026gt;3\u0026lt;/count\u0026gt;\n \u0026lt;solution\u0026gt;\u0026lt;/solution\u0026gt;\n \u0026lt;otherinfo\u0026gt;NOTE: Because of its name this cookie may be important, but dropping it appears to have no effect: [JSESSIONID] \n Cookies that don\u0026amp;apos;t have expected effects can reveal flaws in application logic. In the worst case, this can reveal where authentication via cookie token(s) is not actually enforced.\n These cookies affected the response: \n These cookies did NOT affect the response: JSESSIONID\n \u0026lt;/otherinfo\u0026gt;\n \u0026lt;reference\u0026gt;http://projects.webappsec.org/Fingerprinting\n \u0026lt;/reference\u0026gt;\n \u0026lt;cweid\u0026gt;200\u0026lt;/cweid\u0026gt;\n \u0026lt;wascid\u0026gt;45\u0026lt;/wascid\u0026gt;\n \u0026lt;sourceid\u0026gt;2420\u0026lt;/sourceid\u0026gt;\n \u0026lt;tags\u0026gt;\n \u0026lt;tag\u0026gt;\n \u0026lt;tag\u0026gt;OWASP_2017_A06 \u0026lt;/tag\u0026gt;\n \u0026lt;link\u0026gt;https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration.html \u0026lt;/link\u0026gt;\n \u0026lt;/tag\u0026gt;\n \u0026lt;tag\u0026gt;\n \u0026lt;tag\u0026gt;OWASP_2021_A05 \u0026lt;/tag\u0026gt;\n \u0026lt;link\u0026gt;https://owasp.org/Top10/A05_2021-Security_Misconfiguration/ \u0026lt;/link\u0026gt;\n \u0026lt;/tag\u0026gt;\n \u0026lt;tag\u0026gt;\n \u0026lt;tag\u0026gt;WSTG-v42-SESS-02 \u0026lt;/tag\u0026gt;\n \u0026lt;link\u0026gt;https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/06-Session_Management_Testing/02-Testing_for_Cookies_Attributes \u0026lt;/link\u0026gt;\n \u0026lt;/tag\u0026gt;\n\n \u0026lt;/tags\u0026gt;\n \u0026lt;/alertitem\u0026gt;\n \u0026lt;/alerts\u0026gt;\n \u0026lt;statistics\u0026gt;\n \u0026lt;statistic\u0026gt;\n \u0026lt;key\u0026gt;site.specific.stat.a\u0026lt;/key\u0026gt;\n \u0026lt;value\u0026gt;1\u0026lt;/value\u0026gt;\n \u0026lt;/statistic\u0026gt;\n \u0026lt;statistic\u0026gt;\n \u0026lt;key\u0026gt;site.specific.stat.b\u0026lt;/key\u0026gt;\n \u0026lt;value\u0026gt;2\u0026lt;/value\u0026gt;\n \u0026lt;/statistic\u0026gt;\n \u0026lt;/statistics\u0026gt;\n \u0026lt;/site\u0026gt;\n \u0026lt;statistics\u0026gt;\n \u0026lt;statistic\u0026gt;\n \u0026lt;key\u0026gt;global.stat.a\u0026lt;/key\u0026gt;\n \u0026lt;value\u0026gt;1\u0026lt;/value\u0026gt;\n \u0026lt;/statistic\u0026gt;\n \u0026lt;statistic\u0026gt;\n \u0026lt;key\u0026gt;global.stat.b\u0026lt;/key\u0026gt;\n \u0026lt;value\u0026gt;2\u0026lt;/value\u0026gt;\n \u0026lt;/statistic\u0026gt;\n \u0026lt;/statistics\u0026gt;\n \u0026lt;/OWASPZAPReport\u0026gt; \n\u003c/code\u003e\u003c/pre\u003e", - "content": "traditional xml report requests responses sample version341034 owaspzapreport version34211134 generated34fr 30 sep 2022 08:40:3534 created3420220930t08:40:35236211400z34 site name34http:localhost:808034 host34localhost34 port34808034 ssl34false34 alerts alertitem pluginid90027pluginid alertref90027alertref alertcookie slack detectoralert namecookie detectorname riskcode1riskcode confidence1confidence riskdesclow lowriskdesc confidencedesclowconfidencedesc descrepeated get requests: drop different cookie each time followed by normal request all cookies stabilize session compare against original baseline can reveal areas where based authenticationattributes not actually enforceddesc instances instance urihttp:localhost:8080bodgeitjsuri methodgetmethod paramparam attackattack evidenceevidence otherinfootherinfo requestheaderget http:localhost:8080bodgeitjs http11 host: localhost:8080 useragent: mozilla50 macintosh intel mac os 1015 rv:1050 gecko20100101 firefox1050 accept: acceptlanguage: deenusq07enq03 connection: keepalive referer: https:localhost:8080bodgeit cookie: jsessionid9e75e26e50f681208096ffaa0b566901 secfetchdest: script secfetchmode: nocors secfetchsite: sameorigin contentlength: requestheader requestbodyrequestbody responseheaderhttp11 302 found server: apachecoyote11 location: bodgeitjs date: fri 06:40:17 gmt responseheader responsebodyresponsebody urihttp:localhost:8080bodgeitjsutiljsuri http:localhost:8080bodgeitjsutiljs 200 ok acceptranges: bytes etag: wquot18121343651578000quot lastmodified: mon jul 2012 12:32:58 contenttype: applicationjavascript 1812 responsebody function loadfilefilename var filetype filenamesplitaposapospop switch case quotjsquot: insertdocumentcreateelementaposscriptapos insertsetattributequottypequotquottextjavascriptquot insertsetattributequotsrcquot filename break aposcssapos: insertdocumentcreateelementquotlinkquot insertsetattributequottypequot quottextcssquot insertsetattributequothrefquot insertsetattributequotrelquot quotstylesheetquot typeof insertquotundefinedquot documentgetelementsbytagnamequotheadquot0appendchildinsert return false following from: http:stackoverflowcomquestions316781howtobuildquerystringwithjavascript formtoparams form output quotquot length formelementslength lt element formelementsi ifelementtagname apostextareaapos elementname quot:quot elementvalue else elementtagname aposinputapos switchelementtype aposradioapos: aposcheckboxapos: ifelementchecked ampamp quot:onquot apostextapos: aposhiddenapos: apospasswordapos: ifelementvalue outputsubstring1 htmlentitiesstr stringstrreplaceampg aposampampaposreplaceltg aposampltaposreplacegtg aposampgtaposreplacequotg aposampquotapos count3count solutionsolution otherinfonote: because its name may important dropping appears have effect: jsessionid that donapost expected effects flaws application logic worst authentication via tokens enforced these affected response: did affect otherinfo referencehttp:projectswebappsecorgfingerprinting reference cweid200cweid wascid45wascid sourceid2420sourceid tags tag tagowasp2017a06 linkhttps:owasporgwwwprojecttopten2017a62017securitymisconfigurationhtml link tagowasp2021a05 linkhttps:owasporgtop10a052021securitymisconfiguration tagwstgv42sess02 linkhttps:owasporgwwwprojectwebsecuritytestingguidev424webapplicationsecuritytesting06sessionmanagementtesting02testingforcookiesattributes statistics statistic keysitespecificstatakey value1value keysitespecificstatbkey value2value keyglobalstatakey keyglobalstatbkey " + "summary": "\u003ch1 id=\"traditional-xml-report-with-requests-and-responses\"\u003eTraditional XML Report with Requests and Responses\u003c/h1\u003e\n\n\u003ch3 id=\"sample\"\u003eSample \u003ca class=\"header-link\" href=\"#sample\"\u003e\u003csvg class=\"fill-current o-60 hover-accent-color-light\" height=\"22px\" viewBox=\"0 0 24 24\" width=\"22px\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\u003cpath d=\"M0 0h24v24H0z\" fill=\"none\"/\u003e\u003cpath d=\"M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z\" fill=\"currentColor\"/\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/h3\u003e\n\u003cpre tabindex=\"0\"\u003e\u003ccode\u003e \u0026lt;?xml version=\u0026#34;1.0\u0026#34;?\u0026gt;\n \u0026lt;OWASPZAPReport version=\u0026#34;2.11.1\u0026#34; generated=\u0026#34;Fr., 30 Sep. 2022 08:40:35\u0026#34; created=\u0026#34;2022-09-30T08:40:35.236211400Z\u0026#34;\u0026gt;\n \u0026lt;site name=\u0026#34;http://localhost:8080\u0026#34; host=\u0026#34;localhost\u0026#34; port=\u0026#34;8080\u0026#34; ssl=\u0026#34;false\u0026#34;\u0026gt;\n \u0026lt;alerts\u0026gt;\n \n \u0026lt;alertitem\u0026gt;\n \u0026lt;pluginid\u0026gt;90027\u0026lt;/pluginid\u0026gt;\n \u0026lt;alertRef\u0026gt;90027\u0026lt;/alertRef\u0026gt;\n \u0026lt;alert\u0026gt;Cookie Slack Detector\u0026lt;/alert\u0026gt;\n \u0026lt;name\u0026gt;Cookie Slack Detector\u0026lt;/name\u0026gt;\n \u0026lt;riskcode\u0026gt;1\u0026lt;/riskcode\u0026gt;\n \u0026lt;confidence\u0026gt;1\u0026lt;/confidence\u0026gt;\n \u0026lt;riskdesc\u0026gt;Low (Low)\u0026lt;/riskdesc\u0026gt;\n \u0026lt;confidencedesc\u0026gt;Low\u0026lt;/confidencedesc\u0026gt;\n \u0026lt;desc\u0026gt;Repeated GET requests: drop a different cookie each time, followed by normal request with all cookies to stabilize session, compare responses against original baseline GET. This can reveal areas where cookie based authentication/attributes are not actually enforced.\u0026lt;/desc\u0026gt;\n \u0026lt;instances\u0026gt;\n \n \u0026lt;instance\u0026gt;\n \u0026lt;uri\u0026gt;http://localhost:8080/bodgeit/js\u0026lt;/uri\u0026gt;\n \u0026lt;nodeName\u0026gt;http://localhost:8080/bodgeit/js\u0026lt;/nodeName\u0026gt;\n \u0026lt;method\u0026gt;GET\u0026lt;/method\u0026gt;\n \u0026lt;param\u0026gt;\u0026lt;/param\u0026gt;\n \u0026lt;attack\u0026gt;\u0026lt;/attack\u0026gt;\n \u0026lt;evidence\u0026gt;\u0026lt;/evidence\u0026gt;\n \u0026lt;otherinfo\u0026gt;\u0026lt;/otherinfo\u0026gt;\n \u0026lt;requestheader\u0026gt;GET http://localhost:8080/bodgeit/js HTTP/1.1\n Host: localhost:8080\n User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:105.0) Gecko/20100101 Firefox/105.0\n Accept: */*\n Accept-Language: de,en-US;q=0.7,en;q=0.3\n Connection: keep-alive\n Referer: https://localhost:8080/bodgeit/\n Cookie: JSESSIONID=9E75E26E50F681208096FFAA0B566901\n Sec-Fetch-Dest: script\n Sec-Fetch-Mode: no-cors\n Sec-Fetch-Site: same-origin\n Content-Length: 0\n \n \u0026lt;/requestheader\u0026gt;\n \u0026lt;requestbody\u0026gt;\u0026lt;/requestbody\u0026gt;\n \u0026lt;responseheader\u0026gt;HTTP/1.1 302 Found\n Server: Apache-Coyote/1.1\n Location: /bodgeit/js/\n Content-Length: 0\n Date: Fri, 30 Sep 2022 06:40:17 GMT\n \n \u0026lt;/responseheader\u0026gt;\n \u0026lt;responsebody\u0026gt;\u0026lt;/responsebody\u0026gt;\n \u0026lt;/instance\u0026gt;\n \n \n \u0026lt;instance\u0026gt;\n \u0026lt;uri\u0026gt;http://localhost:8080/bodgeit/js/util.js\u0026lt;/uri\u0026gt;\n \u0026lt;nodeName\u0026gt;http://localhost:8080/bodgeit/js/util.js\u0026lt;/nodeName\u0026gt;\n \u0026lt;method\u0026gt;GET\u0026lt;/method\u0026gt;\n \u0026lt;param\u0026gt;\u0026lt;/param\u0026gt;\n \u0026lt;attack\u0026gt;\u0026lt;/attack\u0026gt;\n \u0026lt;evidence\u0026gt;\u0026lt;/evidence\u0026gt;\n \u0026lt;otherinfo\u0026gt;\u0026lt;/otherinfo\u0026gt;\n \u0026lt;requestheader\u0026gt;GET http://localhost:8080/bodgeit/js/util.js HTTP/1.1\n Host: localhost:8080\n User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:105.0) Gecko/20100101 Firefox/105.0\n Accept: */*\n Accept-Language: de,en-US;q=0.7,en;q=0.3\n Connection: keep-alive\n Referer: https://localhost:8080/bodgeit/\n Cookie: JSESSIONID=9E75E26E50F681208096FFAA0B566901\n Sec-Fetch-Dest: script\n Sec-Fetch-Mode: no-cors\n Sec-Fetch-Site: same-origin\n Content-Length: 0\n \n \u0026lt;/requestheader\u0026gt;\n \u0026lt;requestbody\u0026gt;\u0026lt;/requestbody\u0026gt;\n \u0026lt;responseheader\u0026gt;HTTP/1.1 200 OK\n Server: Apache-Coyote/1.1\n Accept-Ranges: bytes\n ETag: W/\u0026amp;quot;1812-1343651578000\u0026amp;quot;\n Last-Modified: Mon, 30 Jul 2012 12:32:58 GMT\n Content-Type: application/javascript\n Content-Length: 1812\n Date: Fri, 30 Sep 2022 06:40:17 GMT\n \n \u0026lt;/responseheader\u0026gt;\n \u0026lt;responsebody\u0026gt;\n function loadfile(filename){\n var filetype = filename.split(\u0026amp;apos;.\u0026amp;apos;).pop();\n switch (filetype){\n case \u0026amp;quot;js\u0026amp;quot;:\n var insert=document.createElement(\u0026amp;apos;script\u0026amp;apos;)\n insert.setAttribute(\u0026amp;quot;type\u0026amp;quot;,\u0026amp;quot;text/javascript\u0026amp;quot;)\n insert.setAttribute(\u0026amp;quot;src\u0026amp;quot;, filename)\n break;\n case \u0026amp;apos;css\u0026amp;apos;:\n var insert=document.createElement(\u0026amp;quot;link\u0026amp;quot;);\n insert.setAttribute(\u0026amp;quot;type\u0026amp;quot;, \u0026amp;quot;text/css\u0026amp;quot;)\n insert.setAttribute(\u0026amp;quot;href\u0026amp;quot;, filename)\n insert.setAttribute(\u0026amp;quot;rel\u0026amp;quot;, \u0026amp;quot;stylesheet\u0026amp;quot;)\n break;\n }\n if (typeof insert!=\u0026amp;quot;undefined\u0026amp;quot;)\n document.getElementsByTagName(\u0026amp;quot;head\u0026amp;quot;)[0].appendChild(insert);\n return false;\n }\n \n \n ////The following is from:\n //http://stackoverflow.com/questions/316781/how-to-build-query-string-with-javascript\n \n function form_to_params( form )\n {\n var output = \u0026amp;quot;\u0026amp;quot;;\n var length = form.elements.length\n for( var i = 0; i \u0026amp;lt; length; i++ )\n {\n element = form.elements[i]\n \n if(element.tagName == \u0026amp;apos;TEXTAREA\u0026amp;apos; )\n {\n output += \u0026amp;quot;|\u0026amp;quot; + element.name + \u0026amp;quot;:\u0026amp;quot; + element.value; \n }\n else if( element.tagName == \u0026amp;apos;INPUT\u0026amp;apos; )\n {\n switch(element.type){\n case \u0026amp;apos;radio\u0026amp;apos;:\n case \u0026amp;apos;checkbox\u0026amp;apos;:\n if(element.checked \u0026amp;amp;\u0026amp;amp; !element.value){\n output += \u0026amp;quot;|\u0026amp;quot; + element.name + \u0026amp;quot;:on\u0026amp;quot;;\n break;\n }\n case \u0026amp;apos;text\u0026amp;apos;:\n case \u0026amp;apos;hidden\u0026amp;apos;:\n case \u0026amp;apos;password\u0026amp;apos;:\n if(element.value)\n output += \u0026amp;quot;|\u0026amp;quot; + element.name + \u0026amp;quot;:\u0026amp;quot; + element.value;\n break; \n }\n }\n }\n return output.substring(1);\n }\n \n \n function htmlEntities(str) {\n return String(str).replace(/\u0026amp;amp;/g, \u0026amp;apos;\u0026amp;amp;amp;\u0026amp;apos;).replace(/\u0026amp;lt;/g, \u0026amp;apos;\u0026amp;amp;lt;\u0026amp;apos;).replace(/\u0026amp;gt;/g, \u0026amp;apos;\u0026amp;amp;gt;\u0026amp;apos;).replace(/\u0026amp;quot;/g, \u0026amp;apos;\u0026amp;amp;quot;\u0026amp;apos;);\n }\u0026lt;/responsebody\u0026gt;\n \u0026lt;/instance\u0026gt;\n \n \u0026lt;/instances\u0026gt;\n \u0026lt;count\u0026gt;3\u0026lt;/count\u0026gt;\n \u0026lt;systemic\u0026gt;false\u0026lt;/systemic\u0026gt;\n \u0026lt;solution\u0026gt;\u0026lt;/solution\u0026gt;\n \u0026lt;otherinfo\u0026gt;NOTE: Because of its name this cookie may be important, but dropping it appears to have no effect: [JSESSIONID] \n Cookies that don\u0026amp;apos;t have expected effects can reveal flaws in application logic. In the worst case, this can reveal where authentication via cookie token(s) is not actually enforced.\n These cookies affected the response: \n These cookies did NOT affect the response: JSESSIONID\n \u0026lt;/otherinfo\u0026gt;\n \u0026lt;reference\u0026gt;http://projects.webappsec.org/Fingerprinting\n \u0026lt;/reference\u0026gt;\n \u0026lt;cweid\u0026gt;200\u0026lt;/cweid\u0026gt;\n \u0026lt;wascid\u0026gt;45\u0026lt;/wascid\u0026gt;\n \u0026lt;sourceid\u0026gt;2420\u0026lt;/sourceid\u0026gt;\n \u0026lt;tags\u0026gt;\n \u0026lt;tag\u0026gt;\n \u0026lt;tag\u0026gt;OWASP_2017_A06 \u0026lt;/tag\u0026gt;\n \u0026lt;link\u0026gt;https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration.html \u0026lt;/link\u0026gt;\n \u0026lt;/tag\u0026gt;\n \u0026lt;tag\u0026gt;\n \u0026lt;tag\u0026gt;OWASP_2021_A05 \u0026lt;/tag\u0026gt;\n \u0026lt;link\u0026gt;https://owasp.org/Top10/A05_2021-Security_Misconfiguration/ \u0026lt;/link\u0026gt;\n \u0026lt;/tag\u0026gt;\n \u0026lt;tag\u0026gt;\n \u0026lt;tag\u0026gt;WSTG-v42-SESS-02 \u0026lt;/tag\u0026gt;\n \u0026lt;link\u0026gt;https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/06-Session_Management_Testing/02-Testing_for_Cookies_Attributes \u0026lt;/link\u0026gt;\n \u0026lt;/tag\u0026gt;\n\n \u0026lt;/tags\u0026gt;\n \u0026lt;/alertitem\u0026gt;\n \u0026lt;/alerts\u0026gt;\n \u0026lt;statistics\u0026gt;\n \u0026lt;statistic\u0026gt;\n \u0026lt;key\u0026gt;site.specific.stat.a\u0026lt;/key\u0026gt;\n \u0026lt;value\u0026gt;1\u0026lt;/value\u0026gt;\n \u0026lt;/statistic\u0026gt;\n \u0026lt;statistic\u0026gt;\n \u0026lt;key\u0026gt;site.specific.stat.b\u0026lt;/key\u0026gt;\n \u0026lt;value\u0026gt;2\u0026lt;/value\u0026gt;\n \u0026lt;/statistic\u0026gt;\n \u0026lt;/statistics\u0026gt;\n \u0026lt;/site\u0026gt;\n \u0026lt;statistics\u0026gt;\n \u0026lt;statistic\u0026gt;\n \u0026lt;key\u0026gt;global.stat.a\u0026lt;/key\u0026gt;\n \u0026lt;value\u0026gt;1\u0026lt;/value\u0026gt;\n \u0026lt;/statistic\u0026gt;\n \u0026lt;statistic\u0026gt;\n \u0026lt;key\u0026gt;global.stat.b\u0026lt;/key\u0026gt;\n \u0026lt;value\u0026gt;2\u0026lt;/value\u0026gt;\n \u0026lt;/statistic\u0026gt;\n \u0026lt;/statistics\u0026gt;\n \u0026lt;/OWASPZAPReport\u0026gt; \n\u003c/code\u003e\u003c/pre\u003e", + "content": "traditional xml report requests responses sample version341034 owaspzapreport version34211134 generated34fr 30 sep 2022 08:40:3534 created3420220930t08:40:35236211400z34 site name34http:localhost:808034 host34localhost34 port34808034 ssl34false34 alerts alertitem pluginid90027pluginid alertref90027alertref alertcookie slack detectoralert namecookie detectorname riskcode1riskcode confidence1confidence riskdesclow lowriskdesc confidencedesclowconfidencedesc descrepeated get requests: drop different cookie each time followed by normal request all cookies stabilize session compare against original baseline can reveal areas where based authenticationattributes not actually enforceddesc instances instance urihttp:localhost:8080bodgeitjsuri nodenamehttp:localhost:8080bodgeitjsnodename methodgetmethod paramparam attackattack evidenceevidence otherinfootherinfo requestheaderget http:localhost:8080bodgeitjs http11 host: localhost:8080 useragent: mozilla50 macintosh intel mac os 1015 rv:1050 gecko20100101 firefox1050 accept: acceptlanguage: deenusq07enq03 connection: keepalive referer: https:localhost:8080bodgeit cookie: jsessionid9e75e26e50f681208096ffaa0b566901 secfetchdest: script secfetchmode: nocors secfetchsite: sameorigin contentlength: requestheader requestbodyrequestbody responseheaderhttp11 302 found server: apachecoyote11 location: bodgeitjs date: fri 06:40:17 gmt responseheader responsebodyresponsebody urihttp:localhost:8080bodgeitjsutiljsuri nodenamehttp:localhost:8080bodgeitjsutiljsnodename http:localhost:8080bodgeitjsutiljs 200 ok acceptranges: bytes etag: wquot18121343651578000quot lastmodified: mon jul 2012 12:32:58 contenttype: applicationjavascript 1812 responsebody function loadfilefilename var filetype filenamesplitaposapospop switch case quotjsquot: insertdocumentcreateelementaposscriptapos insertsetattributequottypequotquottextjavascriptquot insertsetattributequotsrcquot filename break aposcssapos: insertdocumentcreateelementquotlinkquot insertsetattributequottypequot quottextcssquot insertsetattributequothrefquot insertsetattributequotrelquot quotstylesheetquot typeof insertquotundefinedquot documentgetelementsbytagnamequotheadquot0appendchildinsert return false following from: http:stackoverflowcomquestions316781howtobuildquerystringwithjavascript formtoparams form output quotquot length formelementslength lt element formelementsi ifelementtagname apostextareaapos elementname quot:quot elementvalue else elementtagname aposinputapos switchelementtype aposradioapos: aposcheckboxapos: ifelementchecked ampamp quot:onquot apostextapos: aposhiddenapos: apospasswordapos: ifelementvalue outputsubstring1 htmlentitiesstr stringstrreplaceampg aposampampaposreplaceltg aposampltaposreplacegtg aposampgtaposreplacequotg aposampquotapos count3count systemicfalsesystemic solutionsolution otherinfonote: because its name may important dropping appears have effect: jsessionid that donapost expected effects flaws application logic worst authentication via tokens enforced these affected response: did affect otherinfo referencehttp:projectswebappsecorgfingerprinting reference cweid200cweid wascid45wascid sourceid2420sourceid tags tag tagowasp2017a06 linkhttps:owasporgwwwprojecttopten2017a62017securitymisconfigurationhtml link tagowasp2021a05 linkhttps:owasporgtop10a052021securitymisconfiguration tagwstgv42sess02 linkhttps:owasporgwwwprojectwebsecuritytestingguidev424webapplicationsecuritytesting06sessionmanagementtesting02testingforcookiesattributes statistics statistic keysitespecificstatakey value1value keysitespecificstatbkey value2value keyglobalstatakey keyglobalstatbkey " }, { "url": "/twitter/", @@ -8413,7 +8413,7 @@ "keywords": ["","marketplace","zap"], "tags": null, "summary": "\u003cp\u003eZAP Marketplace contains ZAP add-ons which have been written by the ZAP team and the community. The add-ons help to extend the functionalities of ZAP.\nIf you are using the latest version of ZAP then you can browse and download add-ons from within ZAP by clicking on this button in the toolbar:\u003c/p\u003e", - "content": "zap marketplace contains addons which have been written by team community help extend functionalities you using latest version then can browse download from within clicking button toolbar: also import that downloaded manually via file load addon menu option desktop would like publish your own follow how guide name id status author last updated access control testing adds set tools web applications accesscontrol 10 alpha dev 20240325 active scanner rules release ascanrules 75 20251104 ascanrulesalpha 53 beta ascanrulesbeta 63 advanced sqlinjection injection bundle sqli derived sqlmap sqliplugin 16 andrea pompili yhawke 20250430 ajax spider allows sites make heavy use javascript crawljax spiderajax 23270 alert filters automate changing risk levels alertfilters 25 all one notes simple extension view pane allinonenotes david vassallo 20211007 attack surface detector analyzes application source code generate endpoints used penetration attacksurfacedetector 114 secure decisions matthew deletto 20190307 authentication helper helps identify up handling authhelper 0310 20251105 statistics records logged inout contexts scope authstats automation framework 0550 beanshell console provides browser render html responses browserview 20230313 bug tracker bugtracker 20220923 call graph user selected resources callgraph colm o39flaherty home handles calls services callhome 0170 client side integration exposes information firefox chrome extensions 0180 collection: pentester pack collection ideal pentesters packpentester 010 20220512 scan just containing packscanrules 001 20220513 common library other commonlib 1380 20251021 scripts useful communityscripts 19 20240701 core language files translations corelang 15 20220214 custom payloads ability add edit remove ie scanners custompayloads 0150 20250902 database engines related infrastructure 080 20250304 development 0100 20250515 diff displays dialog showing differences between requests uses diffutils diffmatchpatch 17 20250109 directory list v10 names forced fuzzer directorylistv1 v23 lists directorylistv23 lc lower case directorylistv23lc dom xss rule domxss 22 aabha biyani 20250710 encoder encodedecodehash support scripted processors 170 20250620 eval villain when launched evalvillain 040 dennis goodlett 20241125 fileupload detect upload them find vulnerabilities 121 ksasan preetkaran20gmailcom 20231023 browsing directories owasp dirbuster tool bruteforce 18 20250827 fuzzai 003 marios gyftos yiannis pavlosoglou 20251106 fuzzdb offensive backdoors manual may flagged antivirus fuzzdboffensive 20240111 fuzz 13160 getting started short gettingstarted graalvm engine scripting graaljs 0110 graphql inspect 0280 20250326 groovy 320 20240411 grpc decode protobuf messages 020 20240702 arabic helparsa crowdin 20250821 bosnian helpbsba chinese simplified helpzhcn english 21 filipino helpfilph french helpfrfr 11 indonesian helpidid japanese helpjajp malay helpmsmy portuguese brazilian helpptbr 12 russian helpruru spanish helpeses turkish helptrtr highlighter highlight strings request response tabs hud heads display 0190 20240507 image location privacy passive imagelocationscanner jay ball veggiespam 20250918 importexport export functionality exim thatsn0tmysite invoke external passing context such urls parameters json shows nicely formatted jsonview juha kiveks 20230907 jwt 103 20230102 kotlin 110 stackhawk engineering levoai build openapi specs traffic 030 20240710 linux webdrivers webdriverlinux 165 macos webdrivermacos map local mapping content chosen maplocal keindel andrey maksimov 20231005 neonmarker colors history table items based tags 180 kingthorin 20250214 network networking capabilities 0230 oast exploit outofband online menus onlinemenu 14 imports spiders definitions 47 plus joanna bona nathalie bouchahine artur grzesica mohammad kamar markus kiss michal materniak marcin spiewak sda se open industry solutions parameter digger hidden unlinked finding cache poisoning paramdigger arkaprabha chakraborty 20240715 scanning pscan 050 20250910 pscanrules 69 pscanrulesalpha pscanrulesbeta plugnhack configuration supports mozilla standard: https:developermozillaorgenusdocsplugnhack 13 20221027 postman collections 070 python templates included jython quick start tab quickly test target quickstart 52 reflect finds reflected 0011 caleb kinney 20210219 regular expression tester expressions regextester replacer easy way replace 20 20250110 report generation official reports 0410 20250904 requester send 780 surikato retest presenceabsence previously generated alerts retirejs vulnerable outdated packages retire 0500 nikita mundhada reveal show fields enable disabled revisit site any time past session ruby jruby saml 20221028 policies standard scanpolicies 060 script jsr 223 languages 45150 selenium webdriver provider includes htmlunit 15410 sequence gives possibility defining scanned serversent events sse communication 20240521 soap scans wsdl 28 alberto albertov91 43 software manager data xml directly server srm 202590 black duck inc 20250926 automatically uris svn svndigger technology detection various fingerprints identifiers wappalyzer 21490 tips tricks token analysis analyze pseudo random tokens those csrf protection tokengen treetools tree carl sampson value generator define field values submitting app added modified enableddisabled deleted formhandler 670 viewstate aspjsf decoder editor calum hutton websockets websocket 34 windows webdriverwindows 166 zest graphical security zaps macro steroids 48100 20251029 " + "content": "zap marketplace contains addons which have been written by team community help extend functionalities you using latest version then can browse download from within clicking button toolbar: also import that downloaded manually via file load addon menu option desktop would like publish your own follow how guide name id status author last updated access control testing adds set tools web applications accesscontrol 10 alpha dev 20240325 active scanner rules release ascanrules 75 20251104 ascanrulesalpha 53 beta ascanrulesbeta 63 advanced sqlinjection injection bundle sqli derived sqlmap sqliplugin 16 andrea pompili yhawke 20250430 ajax spider allows sites make heavy use javascript crawljax spiderajax 23270 alert filters automate changing risk levels alertfilters 25 all one notes simple extension view pane allinonenotes david vassallo 20211007 attack surface detector analyzes application source code generate endpoints used penetration attacksurfacedetector 114 secure decisions matthew deletto 20190307 authentication helper helps identify up handling authhelper 0320 20251107 statistics records logged inout contexts scope authstats automation framework 0560 beanshell console provides browser render html responses browserview 20230313 bug tracker bugtracker 20220923 call graph user selected resources callgraph colm o39flaherty home handles calls services callhome 0170 client side integration exposes information firefox chrome extensions 0180 collection: pentester pack collection ideal pentesters packpentester 010 20220512 scan just containing packscanrules 001 20220513 common library other commonlib 1380 20251021 scripts useful communityscripts 19 20240701 core language files translations corelang 15 20220214 custom payloads ability add edit remove ie scanners custompayloads 0150 20250902 database engines related infrastructure 080 20250304 development 0100 20250515 diff displays dialog showing differences between requests uses diffutils diffmatchpatch 17 20250109 directory list v10 names forced fuzzer directorylistv1 v23 lists directorylistv23 lc lower case directorylistv23lc dom xss rule domxss 22 aabha biyani 20250710 encoder encodedecodehash support scripted processors 170 20250620 eval villain when launched evalvillain 040 dennis goodlett 20241125 fileupload detect upload them find vulnerabilities 121 ksasan preetkaran20gmailcom 20231023 browsing directories owasp dirbuster tool bruteforce 18 20250827 fuzzai 003 marios gyftos yiannis pavlosoglou 20251106 fuzzdb offensive backdoors manual may flagged antivirus fuzzdboffensive 20240111 fuzz 13160 getting started short gettingstarted graalvm engine scripting graaljs 0110 graphql inspect 0280 20250326 groovy 320 20240411 grpc decode protobuf messages 020 20240702 arabic helparsa crowdin 20250821 bosnian helpbsba chinese simplified helpzhcn english 21 filipino helpfilph french helpfrfr 11 indonesian helpidid japanese helpjajp malay helpmsmy portuguese brazilian helpptbr 12 russian helpruru spanish helpeses turkish helptrtr highlighter highlight strings request response tabs hud heads display 0190 20240507 image location privacy passive imagelocationscanner jay ball veggiespam 20250918 importexport export functionality exim thatsn0tmysite invoke external passing context such urls parameters json shows nicely formatted jsonview juha kiveks 20230907 jwt 103 20230102 kotlin 110 stackhawk engineering levoai build openapi specs traffic 030 20240710 linux webdrivers webdriverlinux 165 macos webdrivermacos map local mapping content chosen maplocal keindel andrey maksimov 20231005 neonmarker colors history table items based tags 180 kingthorin 20250214 network networking capabilities 0230 oast exploit outofband online menus onlinemenu 14 imports spiders definitions 47 plus joanna bona nathalie bouchahine artur grzesica mohammad kamar markus kiss michal materniak marcin spiewak sda se open industry solutions parameter digger hidden unlinked finding cache poisoning paramdigger arkaprabha chakraborty 20240715 scanning pscan 050 20250910 pscanrules 69 pscanrulesalpha pscanrulesbeta plugnhack configuration supports mozilla standard: https:developermozillaorgenusdocsplugnhack 13 20221027 postman collections 070 python templates included jython quick start tab quickly test target quickstart 52 reflect finds reflected 0011 caleb kinney 20210219 regular expression tester expressions regextester replacer easy way replace 20 20250110 report generation official reports 0420 requester send 780 surikato retest presenceabsence previously generated alerts retirejs vulnerable outdated packages retire 0500 nikita mundhada reveal show fields enable disabled revisit site any time past session ruby jruby saml 20221028 policies standard scanpolicies 060 script jsr 223 languages 45150 selenium webdriver provider includes htmlunit 15410 sequence gives possibility defining scanned serversent events sse communication 20240521 soap scans wsdl 28 alberto albertov91 43 software manager data xml directly server srm 202590 black duck inc 20250926 automatically uris svn svndigger technology detection various fingerprints identifiers wappalyzer 21490 tips tricks token analysis analyze pseudo random tokens those csrf protection tokengen treetools tree carl sampson value generator define field values submitting app added modified enableddisabled deleted formhandler 670 viewstate aspjsf decoder editor calum hutton websockets websocket 34 windows webdriverwindows 166 zest graphical security zaps macro steroids 48100 20251029 " }, { "url": "/docs/zap-ownership/",
automation0.53.00.56.0
bcmail-jdk141.76Bouncy Castle Licencebatik-anim1.19Apache-2.0
bcmail-jdk18on1.77Bouncy Castle Licencebatik-awt-util1.19Apache-2.0
bcpkix-jdk141.76Bouncy Castle Licencebatik-bridge1.19Apache-2.0
bcpkix-jdk18on1.77Bouncy Castle Licencebatik-codec1.19Apache-2.0
bcprov-jdk141.76Bouncy Castle Licencebatik-constants1.19Apache-2.0
bcprov-jdk18onbatik-css1.19Apache-2.0
batik-dom1.19Apache-2.0
batik-ext1.19Apache-2.0
batik-gvt1.19Apache-2.0
batik-i18n1.19Apache-2.0
batik-parser1.19Apache-2.0
batik-script1.19Apache-2.0
batik-shared-resources1.19Apache-2.0
batik-svg-dom1.19Apache-2.0
batik-svggen1.19Apache-2.0
batik-transcoder1.19Apache-2.0
batik-util1.19Apache-2.0
batik-xml1.19Apache-2.0
bcmail-jdk18on 1.77 Bouncy Castle Licence
bctsp-jdk141.46bcpkix-jdk18on1.77 Bouncy Castle Licence
bcutil-jdk141.76bcprov-jdk18on1.77 Bouncy Castle Licence
biz.aQute.bnd.annotation6.4.17.1.0 (Apache-2.0 OR EPL-2.0)
byte-buddy1.14.91.17.7 Apache-2.0
byte-buddy-agent1.14.91.17.7 Apache-2.0
checker-qual3.37.03.43.0 MIT
commonlib1.36.01.39.0
Apache-2.0
commons-codec1.19.0Apache-2.0
commons-collections 3.2.2
commons-collections44.44.5.0 Apache-2.0
commons-csv1.10.01.12.0 Apache-2.0
commons-csv1.12.01.14.1 Apache-2.0
commons-io2.16.12.17.0 Apache-2.0
Apache-2.0
commons-io2.20.0Apache-2.0
commons-lang 2.6
commons-logging1.21.3.0 Apache-2.0
error_prone_annotation2.36.02.42.0 Apache-2.0
error_prone_annotations2.36.02.42.0 Apache-2.0
error_prone_check_api2.36.02.42.0 Apache-2.0
error_prone_core2.36.0Apache-2.0
error_prone_type_annotations2.36.02.42.0 Apache-2.0
failureaccess1.0.11.0.2 Apache-2.0
flying-saucer-core9.3.19.13.3 LGPL-2.1-or-later
flying-saucer-pdf9.3.19.13.3 LGPL-2.1-or-later
google-java-format1.19.11.27.0 Apache-2.0
guava32.1.3-jre33.4.0-jre Apache-2.0
hamcrest2.23.0 BSD-3-Clause
hamcrest-core2.23.0 BSD-3-Clause
hamcrest-library2.23.0 BSD-3-Clause
itext2.1.7MPL-1.0j2objc-annotations3.0.0Apache-2.0
jackson-annotations2.19.12.20 Apache-2.0
jackson-bom2.19.12.20.1 Apache-2.0
jackson-core2.19.12.20.1 Apache-2.0
jackson-databind2.19.12.20.1 Apache-2.0
jackson-dataformat-xml2.19.12.20.1 Apache-2.0
jackson-dataformat-yaml2.19.12.20.1 Apache-2.0
jackson-datatype-jdk82.19.12.20.1 Apache-2.0
jackson-datatype-jsr3102.19.12.20.1 Apache-2.0
junit-bom5.10.16.0.1 EPL-2.0
junit-jupiter5.10.16.0.1 EPL-2.0
junit-jupiter-api5.10.16.0.1 EPL-2.0
junit-jupiter-engine5.10.16.0.1 EPL-2.0
junit-jupiter-params5.10.16.0.1 EPL-2.0
junit-platform-commons1.10.16.0.1 EPL-2.0
junit-platform-engine1.10.16.0.1 EPL-2.0
junit-platform-launcher1.10.16.0.1 EPL-2.0
lombok1.18.361.18.40 MIT
mockito-core5.7.05.20.0 MIT
mockito-junit-jupiter5.7.05.20.0 MIT
Apache-2.0
openpdf2.0.5GNU Lesser General Public License (LGPL), Version 2.1, Mozilla Public License Version 2.0
opentest4j 1.3.0
thymeleaf3.1.2.RELEASE3.1.3.RELEASE Apache-2.0
Apache-2.0
xml-apis1.4.01Apache-2.0, SAX-PD, The W3C License
xml-apis-ext1.3.04Apache-2.0
xmlgraphics-commons2.11Apache-2.0
xom 1.3.9 - 2025-11-05 + 2025-11-07