Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS scanning method re-vamp #35

Closed
zapbot opened this issue Jun 4, 2015 · 4 comments
Closed

XSS scanning method re-vamp #35

zapbot opened this issue Jun 4, 2015 · 4 comments

Comments

@zapbot
Copy link
Contributor

zapbot commented Jun 4, 2015

When scanning for XSS bugs, ZAP replaces the value in the parameter with the test string,
which in some cases breaks the logic of the webapp. You'll get a lot more results by
simply re-submitting it with the XSS tag appended to the parameter value (in my experience
at least).

Example:

 Original:
 site.com/index.php?q=lolcats&page=1

 ZAP:
 site.com/index.php?q=<script>alert("ZAP")</script>&page=1

 Desired behavior:
 site.com/index.php?q=lolcats<script>alert("ZAP")</script>

I've encountered a couple of web-apps where this has been a problem, and is causing
false negatives, because if I append an attack string onto it, it does indeed have
a XSS bug. 

Original issue reported on code.google.com by fitblip on 2010-12-17 23:09:23

@zapbot
Copy link
Contributor Author

zapbot commented Jun 4, 2015

(No text was entered with this change)

Original issue reported on code.google.com by psiinon on 2010-12-18 10:22:02

  • Labels added: Type-Enhancement
  • Labels removed: Type-Defect

@zapbot
Copy link
Contributor Author

zapbot commented Jun 4, 2015

(No text was entered with this change)

Original issue reported on code.google.com by psiinon on 2011-07-07 11:25:06

  • Labels added: AutomatedTools

@zapbot
Copy link
Contributor Author

zapbot commented Jun 4, 2015

Superseded by Issue 228

Original issue reported on code.google.com by psiinon on 2011-11-07 13:48:00

@lock
Copy link

lock bot commented Nov 2, 2019

This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs.

@lock lock bot locked and limited conversation to collaborators Nov 2, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Development

No branches or pull requests

1 participant