Skip to content

Commit fa2c195

Browse files
authored
Merge pull request #6663 from kingthorin/oast-doc-tweaks
ascanrules & ascanrulesBeta: Add notes about behavior of OAST alerts
2 parents 5523e9c + b0ac61c commit fa2c195

5 files changed

Lines changed: 18 additions & 1 deletion

File tree

  • addOns
    • ascanrulesBeta
    • ascanrules
    • oast/src/main/javahelp/org/zaproxy/addon/oast/resources/help/contents

addOns/ascanrules/CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
1919
- For Alerts raised by the SQL Injection scan rules the Attack field values are now simply the payload, not an assembled description.
2020
- The Cross Site Scripting (Reflected) scan rule was updated to address potential false negatives when the injection context is a tag name and there is some filtering.
2121
- The Path Traversal scan rule now includes further details when directory matches are made (Issue 8379).
22+
- Add help details about behavior of scan rules which leverage OAST (Issue 8682).
2223

2324
### Added
2425
- Rules (as applicable) have been tagged in relation to HIPAA and PCI DSS.

addOns/ascanrules/src/main/javahelp/org/zaproxy/zap/extension/ascanrules/resources/help/contents/ascanrules.html

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,8 @@ <H2 id="id-40043">Log4Shell (CVE-2021-44228 and CVE-2021-45046)</H2>
230230
It relies on the OAST add-on to generate out-of-band payloads and verify DNS interactions.
231231
We recommend that this scan rule is used with header injection enabled for maximum coverage.
232232
<p>
233+
See also: <a href="https://www.zaproxy.org/docs/desktop/addons/oast-support/#alerts">OAST</a>.
234+
<p>
233235
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/Log4ShellScanRule.java">Log4ShellScanRule.java</a>
234236
<br>
235237
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/40043/">40043</a>.
@@ -304,6 +306,9 @@ <H2 id="id-90035">Server Side Template Injection</H2>
304306

305307
<H2 id="id-90036">Server Side Template Injection (Blind)</H2>
306308
This rule goes one step further than the SSTI scan rule and attempts to find places where the impact of the user input is not immediately obvious, such as when used by an admin panel, report output, invoice, etc.
309+
It leverages the OAST add-on for out-of-band interactions.
310+
<p>
311+
See also: <a href="https://www.zaproxy.org/docs/desktop/addons/oast-support/#alerts">OAST</a>.
307312
<p>
308313
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/SstiBlindScanRule.java">SstiBlindScanRule.java</a>
309314
<br>
@@ -492,6 +497,8 @@ <H2 id="id-90023">XXE</H2>
492497
It is also recommended that you test that the Callbacks service in the OAST add-on is correctly configured for your target site.
493498
If the target system cannot connect to the Callback Address then some XXE vulnerabilities will not be detected.
494499
<p>
500+
See also: <a href="https://www.zaproxy.org/docs/desktop/addons/oast-support/#alerts">OAST</a>.
501+
<p>
495502
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrules/src/main/java/org/zaproxy/zap/extension/ascanrules/XxeScanRule.java">XxeScanRule.java</a>
496503
<br>
497504
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/90023/">90023</a>.

addOns/ascanrulesBeta/CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
66
## Unreleased
77
### Changed
88
- Depends on an updated version of the Common Library add-on.
9+
- Add help details about behavior of scan rules which leverage OAST (Issue 8682)
910

1011
### Fixed
1112
- Error logs to always include stack trace.

addOns/ascanrulesBeta/src/main/javahelp/org/zaproxy/zap/extension/ascanrulesBeta/resources/help/contents/ascanbeta.html

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,9 @@ <H2 id="id-41">Source Code Disclosure - Git</H2>
193193
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/41/">41</a>.
194194

195195
<H2 id="id-40046">Server Side Request Forgery</H2>
196-
This rule attempts to find Server Side Request Forgery vulnerabilities by injecting out-of-band payloads in request parameters.
196+
This rule attempts to find Server Side Request Forgery vulnerabilities by injecting out-of-band payloads from the OAST add-on in request parameters.
197+
<p>
198+
See also: <a href="https://www.zaproxy.org/docs/desktop/addons/oast-support/#alerts">OAST</a>.
197199
<p>
198200
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/SsrfScanRule.java">SsrfScanRule.java</a>
199201
<br>
@@ -203,6 +205,8 @@ <H2 id="id-40047">Text4shell (CVE-2022-42889)</H2>
203205
This rule attempts to discover the Text4shell (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42889">CVE-2022-42889</a>) vulnerability.
204206
It relies on the OAST add-on to generate out-of-band payloads and verify DNS interactions.
205207
<p>
208+
See also: <a href="https://www.zaproxy.org/docs/desktop/addons/oast-support/#alerts">OAST</a>.
209+
<p>
206210
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesBeta/src/main/java/org/zaproxy/zap/extension/ascanrulesBeta/Text4ShellScanRule.java">Text4ShellScanRule.java</a>
207211
<br>
208212
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/40047/">40047</a>.

addOns/oast/src/main/javahelp/org/zaproxy/addon/oast/resources/help/contents/oast.html

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,10 @@ <h2>Scripts</h2>
2323
whenever an out-of-band request is discovered. This action could be anything like sending yourself an email or
2424
executing another script in ZAP.
2525

26+
<h2>Alerts</h2>
27+
28+
Scan rules which leverage OAST may result in alerts which are not immediately seen, or are not attributed to a specific active scan, since they happen out of band and potentially at a later time.
29+
2630
<H2>See also</H2>
2731
<table>
2832
<tr>

0 commit comments

Comments
 (0)