Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

248 check for xss eg using httpsgithubcomhahwuldalfox #1251

Merged
merged 51 commits into from
Oct 16, 2024

Conversation

michalkrzem
Copy link
Collaborator

First version of Dalfox integration with Artemis.

@michalkrzem michalkrzem linked an issue Sep 5, 2024 that may be closed by this pull request
version: 2

build:
os: ubuntu-20.04
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why was this removed?

Running a report with data generated using the Dalfox tool, which scans URLs for XSS vulnerabilities.
"""

XSS_VULNERABILITY = ReportType("xss_vulnerability")
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

simply xss

{% trans trimmed %}In the URL{% endtrans %} <em>{{ message.url }}</em>
{% trans trimmed %}we identified an xss vulnerability in the parameter:{% endtrans %}
<b>{{ message.param }}</b> {% trans trimmed %}in{% endtrans %} {{ message.evidence }}.
{% trans trimmed %}Based on the Dalfox documentation, the{% endtrans %} <b>{{ message.type_name }}</b> {% trans trimmed %}type (Proof of Concept) was detected.{% endtrans %}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nuke this line, as nobody knows what these types mean ;)

<li>
<p>
{% trans trimmed %}In the URL{% endtrans %} <em>{{ message.url }}</em>
{% trans trimmed %}we identified an xss vulnerability in the parameter:{% endtrans %}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

xss -> XSS

<p>
{% trans trimmed %}In the URL{% endtrans %} <em>{{ message.url }}</em>
{% trans trimmed %}we identified an xss vulnerability in the parameter:{% endtrans %}
<b>{{ message.param }}</b> {% trans trimmed %}in{% endtrans %} {{ message.evidence }}.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

write some info what XSS is. Some inspiration:

"Cross-Site Scripting, umożliwiającą atakującemu spreparowanie linku, który, po kliknięciu przez administratora, wykona dowolną akcję z jego uprawnieniami (taką jak np. modyfikacja treści)."

@@ -196,6 +196,14 @@ services:
volumes:
- ./test/reporting/data/bruteable_files/htpasswd/:/var/www/html/

test_apache-with-sql-injection-xss:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

sql-injection-xss ?

<input type="submit" value="Wyślij">
</form>

<!-- Wyświetlanie wprowadzonego imienia -->
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

English pls ;)

def test_dalfox_on_xss_page(self) -> None:
task = Task(
{"type": TaskType.SERVICE.value, "service": Service.UNKNOWN.value},
payload={"url": "http://test_apache-with-sql-injection-xss/xss.php"},
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we shouldn't test some internal pages - we should test whether this module crawls on its own

Copy link
Collaborator Author

@michalkrzem michalkrzem left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

approvuje zmiany kazeta

Copy link
Collaborator Author

@michalkrzem michalkrzem left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

approvuje zmiany kazeta

Copy link
Collaborator Author

@michalkrzem michalkrzem left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I approve.

@kazet kazet merged commit f0850f0 into main Oct 16, 2024
4 checks passed
@kazet kazet deleted the 248-check-for-xss-eg-using-httpsgithubcomhahwuldalfox branch October 16, 2024 07:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Check for XSS, e.g. using https://github.com/hahwul/dalfox
2 participants