最新消息:雨落星辰是一个专注网站SEO优化、网站SEO诊断、搜索引擎研究、网络营销推广、网站策划运营及站长类的自媒体原创博客

javascript - OWASP ZAP Fuzzing- Input parameter is reflected back in response as a string, still XSS? - Stack Overflow

programmeradmin1浏览0评论

The original issue is here:

Our developer fixed the issue by using HttpUtility.JavaScriptStringEncode to encode strings in javascript. After we used OWASP ZAP to fuzz the parameter, we still got several (Reflected) yellow balls in the result list. Clicked the item in yellow ball, the highlight in response was, for example:

DataSet.FilterBuilder.QueryValuesDictionary['57_ctl00'] = "alert(1)";

As you can see, attacked code is just a simple string and not be executed. Could we say we are safe now and this is just a false positive?

The original issue is here: http://stackoverflow./questions/29223275/owasp-zap-reported-alert1-xss-vulnerability-but-no-popup-showed-up

Our developer fixed the issue by using HttpUtility.JavaScriptStringEncode to encode strings in javascript. After we used OWASP ZAP to fuzz the parameter, we still got several (Reflected) yellow balls in the result list. Clicked the item in yellow ball, the highlight in response was, for example:

DataSet.FilterBuilder.QueryValuesDictionary['57_ctl00'] = "alert(1)";

As you can see, attacked code is just a simple string and not be executed. Could we say we are safe now and this is just a false positive?

Share Improve this question asked Apr 12, 2015 at 19:03 IntelexLXIntelexLX 451 silver badge5 bronze badges 0
Add a ment  | 

1 Answer 1

Reset to default 6

The ZAP Fuzzer does not detect vulnerabilities - its a manual tool to help you find vulnerabilities. The "Reflected" indication is just that - an indication that the payload submitted is reflected in the response. If the payload was "A" and there was an "A" in the response then you'd get that indication. You need to look at the context of the reflected payload to determine whether theres a vulnerability there.

Simon (ZAP Project Lead)

与本文相关的文章

发布评论

评论列表(0)

  1. 暂无评论