Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Scan Rule Deprecations #2297

Merged
merged 1 commit into from
Feb 7, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions addOns/pscanrules/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,9 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
- This addresses errors such as `[ZAP-PassiveScanner] ERROR org.zaproxy.zap.extension.pscanrules.InformationDisclosureInURL - No such file: .... /xml/URL-information-disclosure-messages.txt`
- 'Application Error' scan rule now supports custom payloads when used in conjunction with the Custom Payloads addon.

### Removed
- 'Header XSS Protection' was deprecated and removed (Issue 5849).

## [26] - 2020-01-17

### Changed
Expand Down

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -115,14 +115,6 @@ <H2>CSRF Countermeasures</H2>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/master/addOns/pscanrules/src/main/java/org/zaproxy/zap/extension/pscanrules/CSRFCountermeasures.java">CSRFCountermeasures.java</a>

<H2>Header XSS Protection</H2>
Checks for the existence of and value/setting of the X-XSS-Protection header.
This response header can be used to configure a user-agent's built-in reflective XSS protection.<br>
At MEDIUM and HIGH thresholds only non-error or non-redirect HTML responses are considered.<br>
At LOW threshold all text responses are considered including errors and redirects.
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/master/addOns/pscanrules/src/main/java/org/zaproxy/zap/extension/pscanrules/HeaderXssProtectionScanner.java">HeaderXssProtectionScanner.java</a>

<H2>Information Disclosure: Debug Errors</H2>
This passive scanner checks the content of web responses for known Debug Error message fragments.
Access to such details may provide a malicious individual with means by which to further abuse the web site.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -47,12 +47,6 @@ pscanrules.cookielooselyscoped.refs=https://tools.ietf.org/html/rfc6265#section-
pscanrules.cookielooselyscoped.extrainfo=The origin domain used for comparison was: \r\n{0}\r\n{1}
pscanrules.cookielooselyscoped.extrainfo.cookie={0}\r\n

pscanrules.headerxssprotectionscanner.name = Web Browser XSS Protection Not Enabled
pscanrules.headerxssprotectionscanner.desc = Web Browser XSS Protection is not enabled, or is disabled by the configuration of the 'X-XSS-Protection' HTTP response header on the web server
pscanrules.headerxssprotectionscanner.refs = https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet\nhttps://www.veracode.com/blog/2014/03/guidelines-for-setting-security-headers/
pscanrules.headerxssprotectionscanner.extrainfo = The X-XSS-Protection HTTP response header allows the web server to enable or disable the web browser's XSS protection mechanism. The following values would attempt to enable it: \nX-XSS-Protection: 1; mode=block\nX-XSS-Protection: 1; report=http://www.example.com/xss\nThe following values would disable it:\nX-XSS-Protection: 0\nThe X-XSS-Protection HTTP response header is currently supported on Internet Explorer, Chrome and Safari (WebKit).\nNote that this alert is only raised if the response body could potentially contain an XSS payload (with a text-based content type, with a non-zero length).
pscanrules.headerxssprotectionscanner.soln = Ensure that the web browser's XSS filter is enabled, by setting the X-XSS-Protection HTTP response header to '1'.

pscanrules.informationdisclosuredebugerrors.name=Information Disclosure - Debug Error Messages
pscanrules.informationdisclosuredebugerrors.desc=The response appeared to contain common error messages returned by platforms such as ASP.NET, and Web-servers such as IIS and Apache. You can configure the list of common debug messages.
pscanrules.informationdisclosuredebugerrors.soln=Disable debugging messages before pushing to production.
Expand Down
Loading