Skip to content

Commit

Permalink
Merge pull request #1986 from zapbot/update-alerts
Browse files Browse the repository at this point in the history
Update alert pages
  • Loading branch information
thc202 authored Jul 14, 2023
2 parents 3565f72 + 62ce212 commit d583dc0
Show file tree
Hide file tree
Showing 16 changed files with 47 additions and 47 deletions.
6 changes: 3 additions & 3 deletions site/content/docs/alerts/10099.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 10099
alertindex: 1009900
alerttype: "Passive"
alertcount: 1
status: alpha
status: beta
type: alert
risk: Medium
solution: "Ensure that application Source Code is not available with alternative extensions, and ensure that source code is not present within other files or data deployed to the web server, or served by the web server. "
Expand All @@ -15,7 +15,7 @@ wasc: 13
alerttags:
- OWASP_2017_A06
- OWASP_2021_A05
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesAlpha/src/main/java/org/zaproxy/zap/extension/pscanrulesAlpha/SourceCodeDisclosureScanRule.java
linktext: "org/zaproxy/zap/extension/pscanrulesAlpha/SourceCodeDisclosureScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/SourceCodeDisclosureScanRule.java
linktext: "org/zaproxy/zap/extension/pscanrulesBeta/SourceCodeDisclosureScanRule.java"
---
Application Source Code was disclosed by the web server - PHP
6 changes: 3 additions & 3 deletions site/content/docs/alerts/40042.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 40042
alertindex: 4004200
alerttype: "Active"
alertcount: 1
status: beta
status: release
type: alert
risk: Medium
solution: "Disable the Health Actuators and other actuators, or restrict them to administrative users."
Expand All @@ -19,7 +19,7 @@ alerttags:
- OWASP_2017_A05
- OWASP_2021_A01
- WSTG-v42-CONF-05
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/SpringActuatorScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesBeta/SpringActuatorScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/SpringActuatorScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrules/SpringActuatorScanRule.java"
---
Spring Actuator for Health is enabled and may reveal sensitive information about this application. Spring Actuators can be used for real monitoring purposes, but should be used with caution as to not expose too much information about the application or the infrastructure running it.
6 changes: 3 additions & 3 deletions site/content/docs/alerts/40043-1.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 40043-1
alertindex: 4004301
alerttype: "Active"
alertcount: 2
status: beta
status: release
type: alert
risk: High
solution: "Upgrade Log4j2 to version 2.17.1 or newer. In previous releases (>2.10) this behavior can be mitigated by setting system property 'log4j2.formatMsgNoLookups' to 'true' or by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Java 8u121 (see https://www.oracle.com/java/technologies/javase/8u121-relnotes.html) protects against remote code execution by defaulting 'com.sun.jndi.rmi.object.trustURLCodebase' and 'com.sun.jndi.cosnaming.object.trustURLCodebase' to 'false'."
Expand All @@ -21,7 +21,7 @@ alerttags:
- OWASP_2017_A09
- OWASP_2021_A06
- WSTG-v42-INPV-11
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/Log4ShellScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesBeta/Log4ShellScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/Log4ShellScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrules/Log4ShellScanRule.java"
---
Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default.
6 changes: 3 additions & 3 deletions site/content/docs/alerts/40043-2.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 40043-2
alertindex: 4004302
alerttype: "Active"
alertcount: 2
status: beta
status: release
type: alert
risk: High
solution: "Upgrade Log4j2 to version 2.17.1 or newer."
Expand All @@ -21,7 +21,7 @@ alerttags:
- OWASP_2017_A09
- OWASP_2021_A06
- WSTG-v42-INPV-11
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/Log4ShellScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesBeta/Log4ShellScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/Log4ShellScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrules/Log4ShellScanRule.java"
---
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments.
6 changes: 3 additions & 3 deletions site/content/docs/alerts/40043.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: "Log4Shell"
alertid: 40043
alertindex: 4004300
alerttype: "Active"
status: beta
status: release
type: alertset
alerts:
40043-1:
Expand All @@ -12,6 +12,6 @@ alerts:
40043-2:
alertid: 40043-2
name: "Log4Shell (CVE-2021-45046)"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/Log4ShellScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesBeta/Log4ShellScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/Log4ShellScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrules/Log4ShellScanRule.java"
---
6 changes: 3 additions & 3 deletions site/content/docs/alerts/40045.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 40045
alertindex: 4004500
alerttype: "Active"
alertcount: 1
status: beta
status: release
type: alert
risk: High
solution: "Upgrade Spring Framework to versions 5.3.18, 5.2.20, or newer."
Expand All @@ -25,7 +25,7 @@ alerttags:
- OWASP_2021_A03
- OWASP_2021_A06
- WSTG-v42-INPV-12
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/Spring4ShellScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesBeta/Spring4ShellScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/Spring4ShellScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrules/Spring4ShellScanRule.java"
---
The application appears to be vulnerable to CVE-2022-22965 (otherwise known as Spring4Shell) - remote code execution (RCE) via data binding.
6 changes: 3 additions & 3 deletions site/content/docs/alerts/40046.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 40046
alertindex: 4004600
alerttype: "Active"
alertcount: 1
status: alpha
status: beta
type: alert
risk: High
solution: "Do not accept remote addresses as request parameters, and if you must, ensure that they are validated against an allow-list of expected values."
Expand All @@ -16,7 +16,7 @@ alerttags:
- OUT_OF_BAND
- OWASP_2021_A10
- WSTG-v42-INPV-19
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/SsrfScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesAlpha/SsrfScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/SsrfScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesBeta/SsrfScanRule.java"
---
The web server receives a remote address and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
8 changes: 4 additions & 4 deletions site/content/docs/alerts/40047.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,12 +4,12 @@ alertid: 40047
alertindex: 4004700
alerttype: "Active"
alertcount: 1
status: alpha
status: beta
type: alert
risk: High
solution: "Upgrade Apache Commons Text prior to version 1.10.0 or newer."
references:
- https://www.cve.org/CVERecord?id=CVE-2022-42889
- https://nvd.nist.gov/vuln/detail/CVE-2022-42889
- https://securitylab.github.com/advisories/GHSL-2022-018_Apache_Commons_Text/
cwe: 117
wasc: 20
Expand All @@ -21,7 +21,7 @@ alerttags:
- OWASP_2017_A09
- OWASP_2021_A06
- WSTG-v42-INPV-11
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Text4ShellScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesAlpha/Text4ShellScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/Text4ShellScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesBeta/Text4ShellScanRule.java"
---
Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults.Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded.The application has been shown to initial contact with remote servers via variable interpolation and may well be vulnerable to Remote Code Execution (RCE).
6 changes: 3 additions & 3 deletions site/content/docs/alerts/90004-1.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 90004-1
alertindex: 9000401
alerttype: "Passive"
alertcount: 3
status: alpha
status: beta
type: alert
risk: Low
solution: "Ensure that the application/web server sets the Cross-Origin-Resource-Policy header appropriately, and that it sets the Cross-Origin-Resource-Policy header to 'same-origin' for all web pages.
Expand All @@ -18,7 +18,7 @@ wasc: 14
alerttags:
- OWASP_2017_A03
- OWASP_2021_A04
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesAlpha/src/main/java/org/zaproxy/zap/extension/pscanrulesAlpha/SiteIsolationScanRule.java
linktext: "org/zaproxy/zap/extension/pscanrulesAlpha/SiteIsolationScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/SiteIsolationScanRule.java
linktext: "org/zaproxy/zap/extension/pscanrulesBeta/SiteIsolationScanRule.java"
---
Cross-Origin-Resource-Policy header is an opt-in header designed to counter side-channels attacks like Spectre. Resource should be specifically set as shareable amongst different origins.
6 changes: 3 additions & 3 deletions site/content/docs/alerts/90004-2.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 90004-2
alertindex: 9000402
alerttype: "Passive"
alertcount: 3
status: alpha
status: beta
type: alert
risk: Low
solution: "Ensure that the application/web server sets the Cross-Origin-Embedder-Policy header appropriately, and that it sets the Cross-Origin-Embedder-Policy header to 'require-corp' for documents.
Expand All @@ -16,7 +16,7 @@ wasc: 14
alerttags:
- OWASP_2017_A03
- OWASP_2021_A04
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesAlpha/src/main/java/org/zaproxy/zap/extension/pscanrulesAlpha/SiteIsolationScanRule.java
linktext: "org/zaproxy/zap/extension/pscanrulesAlpha/SiteIsolationScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/SiteIsolationScanRule.java
linktext: "org/zaproxy/zap/extension/pscanrulesBeta/SiteIsolationScanRule.java"
---
Cross-Origin-Embedder-Policy header is a response header that prevents a document from loading any cross-origin resources that don't explicitly grant the document permission (using CORP or CORS).
6 changes: 3 additions & 3 deletions site/content/docs/alerts/90004-3.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 90004-3
alertindex: 9000403
alerttype: "Passive"
alertcount: 3
status: alpha
status: beta
type: alert
risk: Low
solution: "Ensure that the application/web server sets the Cross-Origin-Opener-Policy header appropriately, and that it sets the Cross-Origin-Opener-Policy header to 'same-origin' for documents.
Expand All @@ -17,7 +17,7 @@ wasc: 14
alerttags:
- OWASP_2017_A03
- OWASP_2021_A04
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesAlpha/src/main/java/org/zaproxy/zap/extension/pscanrulesAlpha/SiteIsolationScanRule.java
linktext: "org/zaproxy/zap/extension/pscanrulesAlpha/SiteIsolationScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/SiteIsolationScanRule.java
linktext: "org/zaproxy/zap/extension/pscanrulesBeta/SiteIsolationScanRule.java"
---
Cross-Origin-Opener-Policy header is a response header that allows a site to control if others included documents share the same browsing context. Sharing the same browsing context with untrusted documents might lead to data leak.
6 changes: 3 additions & 3 deletions site/content/docs/alerts/90004.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: "Insufficient Site Isolation Against Spectre Vulnerability"
alertid: 90004
alertindex: 9000400
alerttype: "Passive"
status: alpha
status: beta
type: alertset
alerts:
90004-1:
Expand All @@ -15,6 +15,6 @@ alerts:
90004-3:
alertid: 90004-3
name: "Insufficient Site Isolation Against Spectre Vulnerability"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesAlpha/src/main/java/org/zaproxy/zap/extension/pscanrulesAlpha/SiteIsolationScanRule.java
linktext: "org/zaproxy/zap/extension/pscanrulesAlpha/SiteIsolationScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/SiteIsolationScanRule.java
linktext: "org/zaproxy/zap/extension/pscanrulesBeta/SiteIsolationScanRule.java"
---
6 changes: 3 additions & 3 deletions site/content/docs/alerts/90021.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 90021
alertindex: 9002100
alerttype: "Active"
alertcount: 1
status: beta
status: release
type: alert
risk: High
solution: "Use parameterized XPath queries (e.g. using XQuery). This will help ensure separation between data plane and control plane.
Expand All @@ -19,8 +19,8 @@ alerttags:
- OWASP_2017_A01
- OWASP_2021_A03
- WSTG-v42-INPV-09
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/XpathInjectionScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesBeta/XpathInjectionScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/XpathInjectionScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrules/XpathInjectionScanRule.java"
---
XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. It can be used directly by an application to query an XML document, as part of a larger operation such as applying an XSLT transformation to an XML document, or applying an XQuery to an XML document. The syntax of XPath bears some resemblance to an SQL query, and indeed, it is possible to form SQL-like queries on an XML document using XPath.

Expand Down
6 changes: 3 additions & 3 deletions site/content/docs/alerts/90035.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 90035
alertindex: 9003500
alerttype: "Active"
alertcount: 1
status: beta
status: release
type: alert
risk: High
solution: "Instead of inserting the user input in the template, use it as rendering argument."
Expand All @@ -13,7 +13,7 @@ references:
cwe: 94
wasc: 20
alerttags:
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/SstiScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesBeta/SstiScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/SstiScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrules/SstiScanRule.java"
---
When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.
6 changes: 3 additions & 3 deletions site/content/docs/alerts/90036.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ alertid: 90036
alertindex: 9003600
alerttype: "Active"
alertcount: 1
status: beta
status: release
type: alert
risk: High
solution: "Instead of inserting the user input in the template, use it as rendering argument."
Expand All @@ -13,7 +13,7 @@ references:
cwe: 74
wasc: 20
alerttags:
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/SstiBlindScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrulesBeta/SstiBlindScanRule.java"
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/SstiBlindScanRule.java
linktext: "org/zaproxy/zap/extension/ascanrules/SstiBlindScanRule.java"
---
When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.
2 changes: 1 addition & 1 deletion site/data/alerttags.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ CVE-2022-22965:
link: https://nvd.nist.gov/vuln/detail/CVE-2022-22965

CVE-2022-42889:
link:
link: https://nvd.nist.gov/vuln/detail/CVE-2022-42889

OUT_OF_BAND:
link: https://www.zaproxy.org/docs/desktop/addons/oast-support/
Expand Down

0 comments on commit d583dc0

Please sign in to comment.