diff --git a/alerttags/index.html b/alerttags/index.html index a0ba3f498c..b2d62c00f1 100644 --- a/alerttags/index.html +++ b/alerttags/index.html @@ -673,6 +673,48 @@

Alert Tags

+ + POLICY_API + + + + + + POLICY_DEV_CICD + + + + + + POLICY_DEV_FULL + + + + + + POLICY_DEV_STD + + + + + + POLICY_QA_FULL + + + + + + POLICY_QA_STD + + + + + + POLICY_SEQUENCE + + + + TEST_TIMING diff --git a/alerttags/index.xml b/alerttags/index.xml index e6aa904068..6df3a2344a 100644 --- a/alerttags/index.xml +++ b/alerttags/index.xml @@ -630,6 +630,55 @@ /alerttags/owasp_2021_a10/ + + POLICY_API + /alerttags/policy_api/ + Mon, 01 Jan 0001 00:00:00 +0000 + /alerttags/policy_api/ + + + + POLICY_DEV_CICD + /alerttags/policy_dev_cicd/ + Mon, 01 Jan 0001 00:00:00 +0000 + /alerttags/policy_dev_cicd/ + + + + POLICY_DEV_FULL + /alerttags/policy_dev_full/ + Mon, 01 Jan 0001 00:00:00 +0000 + /alerttags/policy_dev_full/ + + + + POLICY_DEV_STD + /alerttags/policy_dev_std/ + Mon, 01 Jan 0001 00:00:00 +0000 + /alerttags/policy_dev_std/ + + + + POLICY_QA_FULL + /alerttags/policy_qa_full/ + Mon, 01 Jan 0001 00:00:00 +0000 + /alerttags/policy_qa_full/ + + + + POLICY_QA_STD + /alerttags/policy_qa_std/ + Mon, 01 Jan 0001 00:00:00 +0000 + /alerttags/policy_qa_std/ + + + + POLICY_SEQUENCE + /alerttags/policy_sequence/ + Mon, 01 Jan 0001 00:00:00 +0000 + /alerttags/policy_sequence/ + + TEST_TIMING /alerttags/test_timing/ diff --git a/alerttags/owasp_2017_a07/index.html b/alerttags/owasp_2017_a07/index.html index 67f69cc6f8..639580f8ce 100644 --- a/alerttags/owasp_2017_a07/index.html +++ b/alerttags/owasp_2017_a07/index.html @@ -157,6 +157,18 @@

Cross Site Scripting (Persistent) - Prime + + + + + + Cross Site Scripting (Persistent) - Spider + + + + Cross Site Scripting (Reflected) diff --git a/alerttags/owasp_2017_a07/index.xml b/alerttags/owasp_2017_a07/index.xml index d21dfea033..a8969712aa 100644 --- a/alerttags/owasp_2017_a07/index.xml +++ b/alerttags/owasp_2017_a07/index.xml @@ -21,6 +21,20 @@ /docs/alerts/40014/ <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + Cross Site Scripting (Persistent) - Prime + /docs/alerts/40016/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40016/ + + + + Cross Site Scripting (Persistent) - Spider + /docs/alerts/40017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40017/ + + Cross Site Scripting (Reflected) /docs/alerts/40012/ diff --git a/alerttags/owasp_2021_a03/index.html b/alerttags/owasp_2021_a03/index.html index 06f9ddc77a..f7fa06c4ef 100644 --- a/alerttags/owasp_2021_a03/index.html +++ b/alerttags/owasp_2021_a03/index.html @@ -181,6 +181,18 @@

https://owasp.org/Top1 + + Cross Site Scripting (Persistent) - Prime + + + + + + Cross Site Scripting (Persistent) - Spider + + + + Cross Site Scripting (Reflected) diff --git a/alerttags/owasp_2021_a03/index.xml b/alerttags/owasp_2021_a03/index.xml index 0e4486837c..caeedfaf10 100644 --- a/alerttags/owasp_2021_a03/index.xml +++ b/alerttags/owasp_2021_a03/index.xml @@ -49,6 +49,20 @@ /docs/alerts/40014/ <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + Cross Site Scripting (Persistent) - Prime + /docs/alerts/40016/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40016/ + + + + Cross Site Scripting (Persistent) - Spider + /docs/alerts/40017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40017/ + + Cross Site Scripting (Reflected) /docs/alerts/40012/ diff --git a/alerttags/policy_api/index.html b/alerttags/policy_api/index.html new file mode 100644 index 0000000000..8baca5f272 --- /dev/null +++ b/alerttags/policy_api/index.html @@ -0,0 +1,369 @@ + + + + + + + + + + ZAP – POLICY_API + + + + + + + + + + + + + + + +
+
+ + + +
+
+ +

Alert Tag: POLICY_API

+ +
+
+ + +
+ + + + + + +
+ + diff --git a/alerttags/policy_api/index.xml b/alerttags/policy_api/index.xml new file mode 100644 index 0000000000..ff66b4b811 --- /dev/null +++ b/alerttags/policy_api/index.xml @@ -0,0 +1,200 @@ + + + + POLICY_API on ZAP + /alerttags/policy_api/ + Recent content in POLICY_API on ZAP + Hugo + en-us + + + Buffer Overflow + /docs/alerts/30001/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/30001/ + <p>Buffer overflow errors are characterized by the overwriting of memory spaces of the background web process, which should have never been modified intentionally or unintentionally. Overwriting values of the IP (Instruction Pointer), BP (Base Pointer) and other registers causes exceptions, segmentation faults, and other process errors to occur. Usually these errors end execution of the application in an unexpected way.</p> + + + Cloud Metadata Potentially Exposed + /docs/alerts/90034/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90034/ + <p>The Cloud Metadata Attack attempts to abuse a misconfigured NGINX server in order to access the instance metadata maintained by cloud service providers such as AWS, GCP and Azure. All of these providers provide metadata via an internal unroutable IP address &lsquo;169.254.169.254&rsquo; - this can be exposed by incorrectly configured NGINX servers and accessed by using this IP address in the Host header field.</p> + + + CRLF Injection + /docs/alerts/40003/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40003/ + <p>Cookie can be set via CRLF injection. It may also be possible to set arbitrary HTTP response headers. In addition, by carefully crafting the injected response using cross-site script, cache poisoning vulnerability may also exist.</p> + + + Directory Browsing + /docs/alerts/0/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/0/ + <p>It is possible to view the directory listing. Directory listing may reveal hidden scripts, include files, backup source files, etc. which can be accessed to read sensitive information.</p> + + + Exponential Entity Expansion (Billion Laughs Attack) + /docs/alerts/40044/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40044/ + <p>An exponential entity expansion, or &ldquo;billion laughs&rdquo; attack is a type of denial-of-service (DoS) attack. It is aimed at parsers of markup languages like XML or YAML that allow macro expansions.</p> + + + Expression Language Injection + /docs/alerts/90025/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90025/ + <p>The software constructs all or part of an expression language (EL) statement in a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed. In certain versions of Spring 3.0.5 and earlier, there was a vulnerability (CVE-2011-2730) in which Expression Language tags would be evaluated twice, which effectively exposed any application to EL injection. However, even for later versions, this weakness is still possible depending on configuration.</p> + + + External Redirect + /docs/alerts/20019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-1/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-2/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-3/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-4/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + Format String Error + /docs/alerts/30002/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/30002/ + <p>A Format String error occurs when the submitted data of an input string is evaluated as a command by the application.</p> + + + Integer Overflow Error + /docs/alerts/30003/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/30003/ + <p>An integer overflow condition exists when an integer used in a compiled program extends beyond the range limits and has not been properly checked from the input stream.</p> + + + Parameter Tampering + /docs/alerts/40008/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40008/ + <p>Parameter manipulation caused an error page or Java stack trace to be displayed. This indicated lack of exception handling and potential areas for further exploit.</p> + + + Remote File Inclusion + /docs/alerts/7/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/7/ + <p>Remote File Include (RFI) is an attack technique used to exploit &ldquo;dynamic file include&rdquo; mechanisms in web applications. When web applications take user input (URL, parameter value, etc.) and pass them into file include commands, the web application might be tricked into including remote files with malicious code.</p> + + + Remote OS Command Injection + /docs/alerts/90020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90020/ + <p>Attack technique used for unauthorized execution of operating system commands. This attack is possible when an application accepts untrusted input to build operating system commands in an insecure manner involving improper data sanitization, and/or improper calling of external programs.</p> + + + Server Side Code Injection - ASP Code Injection + /docs/alerts/90019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90019-2/ + <p>A code injection may be possible including custom code that will be evaluated by the scripting engine.</p> + + + Server Side Code Injection - PHP Code Injection + /docs/alerts/90019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90019-1/ + <p>A code injection may be possible including custom code that will be evaluated by the scripting engine.</p> + + + Server Side Include + /docs/alerts/40009/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40009/ + <p>Certain parameters may cause Server Side Include commands to be executed. This may allow database connection or arbitrary code to be executed.</p> + + + Server Side Template Injection + /docs/alerts/90035/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90035/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + Server Side Template Injection (Blind) + /docs/alerts/90036/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90036/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + SOAP Action Spoofing + /docs/alerts/90026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90026/ + <p>An unintended SOAP operation was executed by the server.</p> + + + SOAP XML Injection + /docs/alerts/90029/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90029/ + <p>Some XML injected code has been interpreted by the server.</p> + + + Spring Actuator Information Leak + /docs/alerts/40042/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40042/ + <p>Spring Actuator for Health is enabled and may reveal sensitive information about this application. Spring Actuators can be used for real monitoring purposes, but should be used with caution as to not expose too much information about the application or the infrastructure running it.</p> + + + SQL Injection + /docs/alerts/40018/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40018/ + <p>SQL injection may be possible.</p> + + + XML External Entity Attack + /docs/alerts/90023/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90023/ + <p>This technique takes advantage of a feature of XML to build documents dynamically at the time of processing. An XML message can either provide data explicitly or by pointing to an URI where the data exists. In the attack technique, external entities may replace the entity value with malicious data, alternate referrals or may compromise the security of the data the server/XML application has access to. Attackers may also use External Entities to have the web services server download malicious code or content to the server for use in secondary or follow on attacks.</p> + + + XPath Injection + /docs/alerts/90021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90021/ + <p>XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. It can be used directly by an application to query an XML document, as part of a larger operation such as applying an XSLT transformation to an XML document, or applying an XQuery to an XML document. The syntax of XPath bears some resemblance to an SQL query, and indeed, it is possible to form SQL-like queries on an XML document using XPath.</p> + + + XSLT Injection + /docs/alerts/90017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90017/ + <p>Injection using XSL transformations may be possible, and may allow an attacker to read system information, read and write files, or execute arbitrary code.</p> + + + diff --git a/alerttags/policy_dev_cicd/index.html b/alerttags/policy_dev_cicd/index.html new file mode 100644 index 0000000000..78ac98bccb --- /dev/null +++ b/alerttags/policy_dev_cicd/index.html @@ -0,0 +1,285 @@ + + + + + + + + + + ZAP – POLICY_DEV_CICD + + + + + + + + + + + + + + + +
+
+ + + +
+
+ +

Alert Tag: POLICY_DEV_CICD

+ +
+
+
+ + + + + + +

POLICY_DEV_CICD

+ + All of the alerts which use this tag: + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TagLink
Cross Site Scripting (Reflected)
External Redirect
External Redirect
External Redirect
External Redirect
Remote OS Command Injection
Server Side Template Injection
SOAP Action Spoofing
SOAP XML Injection
SQL Injection
XML External Entity Attack
XPath Injection
XSLT Injection
+
+
+ +
+ + + + + + +
+ + diff --git a/alerttags/policy_dev_cicd/index.xml b/alerttags/policy_dev_cicd/index.xml new file mode 100644 index 0000000000..b2cd466ccf --- /dev/null +++ b/alerttags/policy_dev_cicd/index.xml @@ -0,0 +1,102 @@ + + + + POLICY_DEV_CICD on ZAP + /alerttags/policy_dev_cicd/ + Recent content in POLICY_DEV_CICD on ZAP + Hugo + en-us + + + Cross Site Scripting (Reflected) + /docs/alerts/40012/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40012/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + External Redirect + /docs/alerts/20019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-1/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-2/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-3/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-4/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + Remote OS Command Injection + /docs/alerts/90020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90020/ + <p>Attack technique used for unauthorized execution of operating system commands. This attack is possible when an application accepts untrusted input to build operating system commands in an insecure manner involving improper data sanitization, and/or improper calling of external programs.</p> + + + Server Side Template Injection + /docs/alerts/90035/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90035/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + SOAP Action Spoofing + /docs/alerts/90026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90026/ + <p>An unintended SOAP operation was executed by the server.</p> + + + SOAP XML Injection + /docs/alerts/90029/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90029/ + <p>Some XML injected code has been interpreted by the server.</p> + + + SQL Injection + /docs/alerts/40018/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40018/ + <p>SQL injection may be possible.</p> + + + XML External Entity Attack + /docs/alerts/90023/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90023/ + <p>This technique takes advantage of a feature of XML to build documents dynamically at the time of processing. An XML message can either provide data explicitly or by pointing to an URI where the data exists. In the attack technique, external entities may replace the entity value with malicious data, alternate referrals or may compromise the security of the data the server/XML application has access to. Attackers may also use External Entities to have the web services server download malicious code or content to the server for use in secondary or follow on attacks.</p> + + + XPath Injection + /docs/alerts/90021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90021/ + <p>XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. It can be used directly by an application to query an XML document, as part of a larger operation such as applying an XSLT transformation to an XML document, or applying an XQuery to an XML document. The syntax of XPath bears some resemblance to an SQL query, and indeed, it is possible to form SQL-like queries on an XML document using XPath.</p> + + + XSLT Injection + /docs/alerts/90017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90017/ + <p>Injection using XSL transformations may be possible, and may allow an attacker to read system information, read and write files, or execute arbitrary code.</p> + + + diff --git a/alerttags/policy_dev_full/index.html b/alerttags/policy_dev_full/index.html new file mode 100644 index 0000000000..534c9eaf61 --- /dev/null +++ b/alerttags/policy_dev_full/index.html @@ -0,0 +1,435 @@ + + + + + + + + + + ZAP – POLICY_DEV_FULL + + + + + + + + + + + + + + + +
+
+ + + +
+
+ +

Alert Tag: POLICY_DEV_FULL

+ +
+
+
+ + + + + + +

POLICY_DEV_FULL

+ + All of the alerts which use this tag: + + + +
+ +
+ + + + + + +
+ + diff --git a/alerttags/policy_dev_full/index.xml b/alerttags/policy_dev_full/index.xml new file mode 100644 index 0000000000..eb0c55956d --- /dev/null +++ b/alerttags/policy_dev_full/index.xml @@ -0,0 +1,277 @@ + + + + POLICY_DEV_FULL on ZAP + /alerttags/policy_dev_full/ + Recent content in POLICY_DEV_FULL on ZAP + Hugo + en-us + + + CRLF Injection + /docs/alerts/40003/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40003/ + <p>Cookie can be set via CRLF injection. It may also be possible to set arbitrary HTTP response headers. In addition, by carefully crafting the injected response using cross-site script, cache poisoning vulnerability may also exist.</p> + + + Cross Site Scripting (DOM Based) + /docs/alerts/40026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40026/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Cross Site Scripting (Persistent) + /docs/alerts/40014/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40014/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Cross Site Scripting (Persistent) - Prime + /docs/alerts/40016/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40016/ + + + + Cross Site Scripting (Persistent) - Spider + /docs/alerts/40017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40017/ + + + + Cross Site Scripting (Reflected) + /docs/alerts/40012/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40012/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + External Redirect + /docs/alerts/20019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-1/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-2/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-3/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-4/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + Insecure HTTP Method + /docs/alerts/90028/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90028/ + <p>The most common methodology for attackers is to first footprint the target&rsquo;s web presence and enumerate as much information as possible. With this information, the attacker may develop an accurate attack scenario, which will effectively exploit a vulnerability in the software type/version being utilized by the target host.</p> + + + Out of Band XSS + /docs/alerts/40031/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40031/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Parameter Tampering + /docs/alerts/40008/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40008/ + <p>Parameter manipulation caused an error page or Java stack trace to be displayed. This indicated lack of exception handling and potential areas for further exploit.</p> + + + Path Traversal + /docs/alerts/6-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-1/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-2/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-3/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-4/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-5/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-5/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Remote File Inclusion + /docs/alerts/7/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/7/ + <p>Remote File Include (RFI) is an attack technique used to exploit &ldquo;dynamic file include&rdquo; mechanisms in web applications. When web applications take user input (URL, parameter value, etc.) and pass them into file include commands, the web application might be tricked into including remote files with malicious code.</p> + + + Remote OS Command Injection + /docs/alerts/90020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90020/ + <p>Attack technique used for unauthorized execution of operating system commands. This attack is possible when an application accepts untrusted input to build operating system commands in an insecure manner involving improper data sanitization, and/or improper calling of external programs.</p> + + + Server Side Code Injection - ASP Code Injection + /docs/alerts/90019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90019-2/ + <p>A code injection may be possible including custom code that will be evaluated by the scripting engine.</p> + + + Server Side Code Injection - PHP Code Injection + /docs/alerts/90019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90019-1/ + <p>A code injection may be possible including custom code that will be evaluated by the scripting engine.</p> + + + Server Side Include + /docs/alerts/40009/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40009/ + <p>Certain parameters may cause Server Side Include commands to be executed. This may allow database connection or arbitrary code to be executed.</p> + + + Server Side Request Forgery + /docs/alerts/40046/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40046/ + <p>The web server receives a remote address and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.</p> + + + Server Side Template Injection + /docs/alerts/90035/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90035/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + Server Side Template Injection (Blind) + /docs/alerts/90036/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90036/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + SOAP Action Spoofing + /docs/alerts/90026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90026/ + <p>An unintended SOAP operation was executed by the server.</p> + + + SOAP XML Injection + /docs/alerts/90029/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90029/ + <p>Some XML injected code has been interpreted by the server.</p> + + + SQL Injection + /docs/alerts/40018/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40018/ + <p>SQL injection may be possible.</p> + + + SQL Injection - Hypersonic SQL + /docs/alerts/40020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40020/ + <p>SQL injection may be possible.</p> + + + SQL Injection - MsSQL + /docs/alerts/40027/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40027/ + <p>SQL injection may be possible.</p> + + + SQL Injection - MySQL + /docs/alerts/40019/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40019/ + <p>SQL injection may be possible.</p> + + + SQL Injection - Oracle + /docs/alerts/40021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40021/ + <p>SQL injection may be possible.</p> + + + SQL Injection - PostgreSQL + /docs/alerts/40022/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40022/ + <p>SQL injection may be possible.</p> + + + Text4shell (CVE-2022-42889) + /docs/alerts/40047/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40047/ + <p>Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults.Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded.The application has been shown to initial contact with remote servers via variable interpolation and may well be vulnerable to Remote Code Execution (RCE).</p> + + + XML External Entity Attack + /docs/alerts/90023/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90023/ + <p>This technique takes advantage of a feature of XML to build documents dynamically at the time of processing. An XML message can either provide data explicitly or by pointing to an URI where the data exists. In the attack technique, external entities may replace the entity value with malicious data, alternate referrals or may compromise the security of the data the server/XML application has access to. Attackers may also use External Entities to have the web services server download malicious code or content to the server for use in secondary or follow on attacks.</p> + + + XPath Injection + /docs/alerts/90021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90021/ + <p>XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. It can be used directly by an application to query an XML document, as part of a larger operation such as applying an XSLT transformation to an XML document, or applying an XQuery to an XML document. The syntax of XPath bears some resemblance to an SQL query, and indeed, it is possible to form SQL-like queries on an XML document using XPath.</p> + + + XSLT Injection + /docs/alerts/90017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90017/ + <p>Injection using XSL transformations may be possible, and may allow an attacker to read system information, read and write files, or execute arbitrary code.</p> + + + diff --git a/alerttags/policy_dev_std/index.html b/alerttags/policy_dev_std/index.html new file mode 100644 index 0000000000..6b812dae24 --- /dev/null +++ b/alerttags/policy_dev_std/index.html @@ -0,0 +1,327 @@ + + + + + + + + + + ZAP – POLICY_DEV_STD + + + + + + + + + + + + + + + +
+
+ + + +
+
+ +

Alert Tag: POLICY_DEV_STD

+ +
+
+
+ + + + + + +

POLICY_DEV_STD

+ + All of the alerts which use this tag: + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TagLink
Cross Site Scripting (Reflected)
External Redirect
External Redirect
External Redirect
External Redirect
Path Traversal
Path Traversal
Path Traversal
Path Traversal
Path Traversal
Remote File Inclusion
Remote OS Command Injection
Server Side Include
Server Side Template Injection
SOAP Action Spoofing
SOAP XML Injection
SQL Injection
XML External Entity Attack
XPath Injection
XSLT Injection
+
+
+ +
+ + + + + + +
+ + diff --git a/alerttags/policy_dev_std/index.xml b/alerttags/policy_dev_std/index.xml new file mode 100644 index 0000000000..e4d2c3af10 --- /dev/null +++ b/alerttags/policy_dev_std/index.xml @@ -0,0 +1,151 @@ + + + + POLICY_DEV_STD on ZAP + /alerttags/policy_dev_std/ + Recent content in POLICY_DEV_STD on ZAP + Hugo + en-us + + + Cross Site Scripting (Reflected) + /docs/alerts/40012/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40012/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + External Redirect + /docs/alerts/20019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-1/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-2/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-3/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-4/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + Path Traversal + /docs/alerts/6-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-1/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-2/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-3/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-4/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-5/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-5/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Remote File Inclusion + /docs/alerts/7/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/7/ + <p>Remote File Include (RFI) is an attack technique used to exploit &ldquo;dynamic file include&rdquo; mechanisms in web applications. When web applications take user input (URL, parameter value, etc.) and pass them into file include commands, the web application might be tricked into including remote files with malicious code.</p> + + + Remote OS Command Injection + /docs/alerts/90020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90020/ + <p>Attack technique used for unauthorized execution of operating system commands. This attack is possible when an application accepts untrusted input to build operating system commands in an insecure manner involving improper data sanitization, and/or improper calling of external programs.</p> + + + Server Side Include + /docs/alerts/40009/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40009/ + <p>Certain parameters may cause Server Side Include commands to be executed. This may allow database connection or arbitrary code to be executed.</p> + + + Server Side Template Injection + /docs/alerts/90035/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90035/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + SOAP Action Spoofing + /docs/alerts/90026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90026/ + <p>An unintended SOAP operation was executed by the server.</p> + + + SOAP XML Injection + /docs/alerts/90029/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90029/ + <p>Some XML injected code has been interpreted by the server.</p> + + + SQL Injection + /docs/alerts/40018/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40018/ + <p>SQL injection may be possible.</p> + + + XML External Entity Attack + /docs/alerts/90023/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90023/ + <p>This technique takes advantage of a feature of XML to build documents dynamically at the time of processing. An XML message can either provide data explicitly or by pointing to an URI where the data exists. In the attack technique, external entities may replace the entity value with malicious data, alternate referrals or may compromise the security of the data the server/XML application has access to. Attackers may also use External Entities to have the web services server download malicious code or content to the server for use in secondary or follow on attacks.</p> + + + XPath Injection + /docs/alerts/90021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90021/ + <p>XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. It can be used directly by an application to query an XML document, as part of a larger operation such as applying an XSLT transformation to an XML document, or applying an XQuery to an XML document. The syntax of XPath bears some resemblance to an SQL query, and indeed, it is possible to form SQL-like queries on an XML document using XPath.</p> + + + XSLT Injection + /docs/alerts/90017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90017/ + <p>Injection using XSL transformations may be possible, and may allow an attacker to read system information, read and write files, or execute arbitrary code.</p> + + + diff --git a/alerttags/policy_qa_full/index.html b/alerttags/policy_qa_full/index.html new file mode 100644 index 0000000000..a3847189fd --- /dev/null +++ b/alerttags/policy_qa_full/index.html @@ -0,0 +1,663 @@ + + + + + + + + + + ZAP – POLICY_QA_FULL + + + + + + + + + + + + + + + +
+
+ + + +
+
+ +

Alert Tag: POLICY_QA_FULL

+ +
+
+
+ + + + + + +

POLICY_QA_FULL

+ + All of the alerts which use this tag: + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TagLink
.env Information Leak
.htaccess Information Leak
Anti-CSRF Tokens Check
Backup File Disclosure
Bypassing 403
Cloud Metadata Potentially Exposed
CORS Header
CORS Misconfiguration
CORS Misconfiguration
CRLF Injection
Cross Site Scripting (DOM Based)
Cross Site Scripting (Persistent)
Cross Site Scripting (Persistent) - Prime
Cross Site Scripting (Persistent) - Spider
Cross Site Scripting (Reflected)
Cross-Domain Misconfiguration - Adobe - Read
Cross-Domain Misconfiguration - Adobe - Send
Cross-Domain Misconfiguration - Silverlight
Directory Browsing
ELMAH Information Leak
Exponential Entity Expansion (Billion Laughs Attack)
Expression Language Injection
External Redirect
External Redirect
External Redirect
External Redirect
Format String Error
Generic Padding Oracle
GET for POST
Heartbleed OpenSSL Vulnerability
Hidden File Found
HTTP Only Site
Httpoxy - Proxy Header Misuse
HTTPS Content Available via HTTP
Insecure HTTP Method
Log4Shell (CVE-2021-44228)
Log4Shell (CVE-2021-45046)
Out of Band XSS
Parameter Tampering
Path Traversal
Path Traversal
Path Traversal
Path Traversal
Path Traversal
Properties File Disclosure - /WEB-INF folder
Relative Path Confusion
Remote Code Execution - CVE-2012-1823
Remote File Inclusion
Remote OS Command Injection
Server Side Code Injection - ASP Code Injection
Server Side Code Injection - PHP Code Injection
Server Side Include
Server Side Request Forgery
Server Side Template Injection
Server Side Template Injection (Blind)
SOAP Action Spoofing
SOAP XML Injection
Source Code Disclosure - /WEB-INF Folder
Source Code Disclosure - CVE-2012-1823
Source Code Disclosure - File Inclusion
Source Code Disclosure - Git
Source Code Disclosure - SVN
Spring Actuator Information Leak
Spring4Shell
SQL Injection
SQL Injection - Hypersonic SQL
SQL Injection - MsSQL
SQL Injection - MySQL
SQL Injection - Oracle
SQL Injection - PostgreSQL
SQL Injection - SQLite
Text4shell (CVE-2022-42889)
Trace.axd Information Leak
XML External Entity Attack
XPath Injection
XSLT Injection
+
+
+ +
+ + + + + + +
+ + diff --git a/alerttags/policy_qa_full/index.xml b/alerttags/policy_qa_full/index.xml new file mode 100644 index 0000000000..fc3daccdea --- /dev/null +++ b/alerttags/policy_qa_full/index.xml @@ -0,0 +1,543 @@ + + + + POLICY_QA_FULL on ZAP + /alerttags/policy_qa_full/ + Recent content in POLICY_QA_FULL on ZAP + Hugo + en-us + + + .env Information Leak + /docs/alerts/40034/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40034/ + <p>One or more .env files seems to have been located on the server. These files often expose infrastructure or administrative account credentials, API or APP keys, or other sensitive configuration information.</p> + + + .htaccess Information Leak + /docs/alerts/40032/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40032/ + <p>htaccess files can be used to alter the configuration of the Apache Web Server software to enable/disable additional functionality and features that the Apache Web Server software has to offer.</p> + + + Anti-CSRF Tokens Check + /docs/alerts/20012/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20012/ + <p>A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The underlying cause is application functionality using predictable URL/form actions in a repeatable way. The nature of the attack is that CSRF exploits the trust that a web site has for a user. By contrast, cross-site scripting (XSS) exploits the trust that a user has for a web site. Like XSS, CSRF attacks are not necessarily cross-site, but they can be. Cross-site request forgery is also known as CSRF, XSRF, one-click attack, session riding, confused deputy, and sea surf.</p> + + + Backup File Disclosure + /docs/alerts/10095/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/10095/ + <p>A backup of the file was disclosed by the web server.</p> + + + Bypassing 403 + /docs/alerts/40038/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40038/ + <p>Bypassing 403 endpoints may be possible, the scan rule sent a payload that caused the response to be accessible (status code 200).</p> + + + Cloud Metadata Potentially Exposed + /docs/alerts/90034/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90034/ + <p>The Cloud Metadata Attack attempts to abuse a misconfigured NGINX server in order to access the instance metadata maintained by cloud service providers such as AWS, GCP and Azure. All of these providers provide metadata via an internal unroutable IP address &lsquo;169.254.169.254&rsquo; - this can be exposed by incorrectly configured NGINX servers and accessed by using this IP address in the Host header field.</p> + + + CORS Header + /docs/alerts/40040-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40040-1/ + <p>Cross-Origin Resource Sharing (CORS) is an HTTP-header based mechanism that allows a server to indicate any other origins (domain, scheme, or port) than its own from which a browser should permit loading of resources. It relaxes the Same-Origin Policy (SOP).</p> + + + CORS Misconfiguration + /docs/alerts/40040-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40040-2/ + <p>This CORS misconfiguration could allow an attacker to perform AJAX queries to the vulnerable website from a malicious page loaded by the victim&rsquo;s user agent. In order to perform authenticated AJAX queries, the server must specify the header &ldquo;Access-Control-Allow-Credentials: true&rdquo; and the &ldquo;Access-Control-Allow-Origin&rdquo; header must be set to null or the malicious page&rsquo;s domain. Even if this misconfiguration doesn&rsquo;t allow authenticated AJAX requests, unauthenticated sensitive content can still be accessed (e.g intranet websites). A malicious page can belong to a malicious website but also a trusted website with flaws (e.g XSS, support of HTTP without TLS allowing code injection through MITM, etc).</p> + + + CORS Misconfiguration + /docs/alerts/40040-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40040-3/ + <p>This CORS misconfiguration could allow an attacker to perform AJAX queries to the vulnerable website from a malicious page loaded by the victim&rsquo;s user agent. In order to perform authenticated AJAX queries, the server must specify the header &ldquo;Access-Control-Allow-Credentials: true&rdquo; and the &ldquo;Access-Control-Allow-Origin&rdquo; header must be set to null or the malicious page&rsquo;s domain. Even if this misconfiguration doesn&rsquo;t allow authenticated AJAX requests, unauthenticated sensitive content can still be accessed (e.g intranet websites). A malicious page can belong to a malicious website but also a trusted website with flaws (e.g XSS, support of HTTP without TLS allowing code injection through MITM, etc).</p> + + + CRLF Injection + /docs/alerts/40003/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40003/ + <p>Cookie can be set via CRLF injection. It may also be possible to set arbitrary HTTP response headers. In addition, by carefully crafting the injected response using cross-site script, cache poisoning vulnerability may also exist.</p> + + + Cross Site Scripting (DOM Based) + /docs/alerts/40026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40026/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Cross Site Scripting (Persistent) + /docs/alerts/40014/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40014/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Cross Site Scripting (Persistent) - Prime + /docs/alerts/40016/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40016/ + + + + Cross Site Scripting (Persistent) - Spider + /docs/alerts/40017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40017/ + + + + Cross Site Scripting (Reflected) + /docs/alerts/40012/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40012/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Cross-Domain Misconfiguration - Adobe - Read + /docs/alerts/20016-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20016-1/ + <p>Flash/Silverlight based cross-site request forgery may be possible, due to a misconfiguration on the web server.</p> + + + Cross-Domain Misconfiguration - Adobe - Send + /docs/alerts/20016-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20016-2/ + <p>Flash/Silverlight based cross-site request forgery may be possible, due to a misconfiguration on the web server.</p> + + + Cross-Domain Misconfiguration - Silverlight + /docs/alerts/20016-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20016-3/ + <p>Silverlight based cross-site request forgery may be possible, due to a misconfiguration on the web server.</p> + + + Directory Browsing + /docs/alerts/0/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/0/ + <p>It is possible to view the directory listing. Directory listing may reveal hidden scripts, include files, backup source files, etc. which can be accessed to read sensitive information.</p> + + + ELMAH Information Leak + /docs/alerts/40028/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40028/ + <p>The Error Logging Modules and Handlers (ELMAH [elmah.axd]) HTTP Module was found to be available. This module can leak a significant amount of valuable information.</p> + + + Exponential Entity Expansion (Billion Laughs Attack) + /docs/alerts/40044/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40044/ + <p>An exponential entity expansion, or &ldquo;billion laughs&rdquo; attack is a type of denial-of-service (DoS) attack. It is aimed at parsers of markup languages like XML or YAML that allow macro expansions.</p> + + + Expression Language Injection + /docs/alerts/90025/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90025/ + <p>The software constructs all or part of an expression language (EL) statement in a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed. In certain versions of Spring 3.0.5 and earlier, there was a vulnerability (CVE-2011-2730) in which Expression Language tags would be evaluated twice, which effectively exposed any application to EL injection. However, even for later versions, this weakness is still possible depending on configuration.</p> + + + External Redirect + /docs/alerts/20019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-1/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-2/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-3/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-4/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + Format String Error + /docs/alerts/30002/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/30002/ + <p>A Format String error occurs when the submitted data of an input string is evaluated as a command by the application.</p> + + + Generic Padding Oracle + /docs/alerts/90024/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90024/ + <p>By manipulating the padding on an encrypted string, an attacker is able to generate an error message that indicates a likely &lsquo;padding oracle&rsquo; vulnerability. Such a vulnerability can affect any application or framework that uses encryption improperly, such as some versions of ASP.net, Java Server Faces, and Mono. An attacker may exploit this issue to decrypt data and recover encryption keys, potentially viewing and modifying confidential data. This rule should detect the MS10-070 padding oracle vulnerability in ASP.net if CustomErrors are enabled for that.</p> + + + GET for POST + /docs/alerts/10058/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/10058/ + <p>A request that was originally observed as a POST was also accepted as a GET. This issue does not represent a security weakness unto itself, however, it may facilitate simplification of other attacks. For example if the original POST is subject to Cross-Site Scripting (XSS), then this finding may indicate that a simplified (GET based) XSS may also be possible.</p> + + + Heartbleed OpenSSL Vulnerability + /docs/alerts/20015/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20015/ + <p>The TLS implementation in OpenSSL 1.0.1 before 1.0.1g does not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, potentially disclosing sensitive information.</p> + + + Hidden File Found + /docs/alerts/40035/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40035/ + <p>A sensitive file was identified as accessible or available. This may leak administrative, configuration, or credential information which can be leveraged by a malicious individual to further attack the system or conduct social engineering efforts.</p> + + + HTTP Only Site + /docs/alerts/10106/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/10106/ + <p>The site is only served under HTTP and not HTTPS.</p> + + + Httpoxy - Proxy Header Misuse + /docs/alerts/10107/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/10107/ + <p>The server initiated a proxied request via the proxy specified in the HTTP Proxy header of the request.Httpoxy typically affects code running in CGI or CGI like environments. This may allow attackers to:</p> <ul> <li>Proxy the outgoing HTTP requests made by the web application</li> <li>Direct the server to open outgoing connections to an address and port of their choosing or</li> <li>Tie up server resources by forcing the vulnerable software to use a malicious proxy.</li> </ul> + + + HTTPS Content Available via HTTP + /docs/alerts/10047/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/10047/ + <p>Content which was initially accessed via HTTPS (i.e.: using SSL/TLS encryption) is also accessible via HTTP (without encryption).</p> + + + Insecure HTTP Method + /docs/alerts/90028/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90028/ + <p>The most common methodology for attackers is to first footprint the target&rsquo;s web presence and enumerate as much information as possible. With this information, the attacker may develop an accurate attack scenario, which will effectively exploit a vulnerability in the software type/version being utilized by the target host.</p> + + + Log4Shell (CVE-2021-44228) + /docs/alerts/40043-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40043-1/ + <p>Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default.</p> + + + Log4Shell (CVE-2021-45046) + /docs/alerts/40043-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40043-2/ + <p>It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments.</p> + + + Out of Band XSS + /docs/alerts/40031/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40031/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Parameter Tampering + /docs/alerts/40008/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40008/ + <p>Parameter manipulation caused an error page or Java stack trace to be displayed. This indicated lack of exception handling and potential areas for further exploit.</p> + + + Path Traversal + /docs/alerts/6-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-1/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-2/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-3/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-4/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-5/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-5/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Properties File Disclosure - /WEB-INF folder + /docs/alerts/10045-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/10045-2/ + <p>A Java class in the /WEB-INF folder disclosed the presence of the properties file. Properties file are not intended to be publicly accessible, and typically contain configuration information, application credentials, or cryptographic keys.</p> + + + Relative Path Confusion + /docs/alerts/10051/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/10051/ + <p>The web server is configured to serve responses to ambiguous URLs in a manner that is likely to lead to confusion about the correct &ldquo;relative path&rdquo; for the URL. Resources (CSS, images, etc.) are also specified in the page response using relative, rather than absolute URLs. In an attack, if the web browser parses the &ldquo;cross-content&rdquo; response in a permissive manner, or can be tricked into permissively parsing the &ldquo;cross-content&rdquo; response, using techniques such as framing, then the web browser may be fooled into interpreting HTML as CSS (or other content types), leading to an XSS vulnerability.</p> + + + Remote Code Execution - CVE-2012-1823 + /docs/alerts/20018/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20018/ + <p>Some PHP versions, when configured to run using CGI, do not correctly handle query strings that lack an unescaped &ldquo;=&rdquo; character, enabling arbitrary code execution. In this case, an operating system command was caused to be executed on the web server, and the results were returned to the web browser.</p> + + + Remote File Inclusion + /docs/alerts/7/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/7/ + <p>Remote File Include (RFI) is an attack technique used to exploit &ldquo;dynamic file include&rdquo; mechanisms in web applications. When web applications take user input (URL, parameter value, etc.) and pass them into file include commands, the web application might be tricked into including remote files with malicious code.</p> + + + Remote OS Command Injection + /docs/alerts/90020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90020/ + <p>Attack technique used for unauthorized execution of operating system commands. This attack is possible when an application accepts untrusted input to build operating system commands in an insecure manner involving improper data sanitization, and/or improper calling of external programs.</p> + + + Server Side Code Injection - ASP Code Injection + /docs/alerts/90019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90019-2/ + <p>A code injection may be possible including custom code that will be evaluated by the scripting engine.</p> + + + Server Side Code Injection - PHP Code Injection + /docs/alerts/90019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90019-1/ + <p>A code injection may be possible including custom code that will be evaluated by the scripting engine.</p> + + + Server Side Include + /docs/alerts/40009/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40009/ + <p>Certain parameters may cause Server Side Include commands to be executed. This may allow database connection or arbitrary code to be executed.</p> + + + Server Side Request Forgery + /docs/alerts/40046/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40046/ + <p>The web server receives a remote address and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.</p> + + + Server Side Template Injection + /docs/alerts/90035/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90035/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + Server Side Template Injection (Blind) + /docs/alerts/90036/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90036/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + SOAP Action Spoofing + /docs/alerts/90026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90026/ + <p>An unintended SOAP operation was executed by the server.</p> + + + SOAP XML Injection + /docs/alerts/90029/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90029/ + <p>Some XML injected code has been interpreted by the server.</p> + + + Source Code Disclosure - /WEB-INF Folder + /docs/alerts/10045-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/10045-1/ + <p>Java source code was disclosed by the web server in Java class files in the WEB-INF folder. The class files can be dis-assembled to produce source code which very closely matches the original source code.</p> + + + Source Code Disclosure - CVE-2012-1823 + /docs/alerts/20017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20017/ + <p>Some PHP versions, when configured to run using CGI, do not correctly handle query strings that lack an unescaped &ldquo;=&rdquo; character, enabling PHP source code disclosure, and arbitrary code execution. In this case, the contents of the PHP file were served directly to the web browser. This output will typically contain PHP, although it may also contain straight HTML.</p> + + + Source Code Disclosure - File Inclusion + /docs/alerts/43/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/43/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Source Code Disclosure - Git + /docs/alerts/41/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/41/ + <p>The source code for the current page was disclosed by the web server.</p> + + + Source Code Disclosure - SVN + /docs/alerts/42/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/42/ + <p>The source code for the current page was disclosed by the web server.</p> + + + Spring Actuator Information Leak + /docs/alerts/40042/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40042/ + <p>Spring Actuator for Health is enabled and may reveal sensitive information about this application. Spring Actuators can be used for real monitoring purposes, but should be used with caution as to not expose too much information about the application or the infrastructure running it.</p> + + + Spring4Shell + /docs/alerts/40045/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40045/ + <p>The application appears to be vulnerable to CVE-2022-22965 (otherwise known as Spring4Shell) - remote code execution (RCE) via data binding.</p> + + + SQL Injection + /docs/alerts/40018/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40018/ + <p>SQL injection may be possible.</p> + + + SQL Injection - Hypersonic SQL + /docs/alerts/40020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40020/ + <p>SQL injection may be possible.</p> + + + SQL Injection - MsSQL + /docs/alerts/40027/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40027/ + <p>SQL injection may be possible.</p> + + + SQL Injection - MySQL + /docs/alerts/40019/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40019/ + <p>SQL injection may be possible.</p> + + + SQL Injection - Oracle + /docs/alerts/40021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40021/ + <p>SQL injection may be possible.</p> + + + SQL Injection - PostgreSQL + /docs/alerts/40022/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40022/ + <p>SQL injection may be possible.</p> + + + SQL Injection - SQLite + /docs/alerts/40024/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40024/ + <p>SQL injection may be possible.</p> + + + Text4shell (CVE-2022-42889) + /docs/alerts/40047/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40047/ + <p>Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults.Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded.The application has been shown to initial contact with remote servers via variable interpolation and may well be vulnerable to Remote Code Execution (RCE).</p> + + + Trace.axd Information Leak + /docs/alerts/40029/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40029/ + <p>The ASP.NET Trace Viewer (trace.axd) was found to be available. This component can leak a significant amount of valuable information.</p> + + + XML External Entity Attack + /docs/alerts/90023/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90023/ + <p>This technique takes advantage of a feature of XML to build documents dynamically at the time of processing. An XML message can either provide data explicitly or by pointing to an URI where the data exists. In the attack technique, external entities may replace the entity value with malicious data, alternate referrals or may compromise the security of the data the server/XML application has access to. Attackers may also use External Entities to have the web services server download malicious code or content to the server for use in secondary or follow on attacks.</p> + + + XPath Injection + /docs/alerts/90021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90021/ + <p>XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. It can be used directly by an application to query an XML document, as part of a larger operation such as applying an XSLT transformation to an XML document, or applying an XQuery to an XML document. The syntax of XPath bears some resemblance to an SQL query, and indeed, it is possible to form SQL-like queries on an XML document using XPath.</p> + + + XSLT Injection + /docs/alerts/90017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90017/ + <p>Injection using XSL transformations may be possible, and may allow an attacker to read system information, read and write files, or execute arbitrary code.</p> + + + diff --git a/alerttags/policy_qa_std/index.html b/alerttags/policy_qa_std/index.html new file mode 100644 index 0000000000..308a7fc7fe --- /dev/null +++ b/alerttags/policy_qa_std/index.html @@ -0,0 +1,441 @@ + + + + + + + + + + ZAP – POLICY_QA_STD + + + + + + + + + + + + + + + +
+
+ + + +
+
+ +

Alert Tag: POLICY_QA_STD

+ +
+
+
+ + + + + + +

POLICY_QA_STD

+ + All of the alerts which use this tag: + + + +
+ +
+ + + + + + +
+ + diff --git a/alerttags/policy_qa_std/index.xml b/alerttags/policy_qa_std/index.xml new file mode 100644 index 0000000000..b383fe556f --- /dev/null +++ b/alerttags/policy_qa_std/index.xml @@ -0,0 +1,284 @@ + + + + POLICY_QA_STD on ZAP + /alerttags/policy_qa_std/ + Recent content in POLICY_QA_STD on ZAP + Hugo + en-us + + + Anti-CSRF Tokens Check + /docs/alerts/20012/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20012/ + <p>A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The underlying cause is application functionality using predictable URL/form actions in a repeatable way. The nature of the attack is that CSRF exploits the trust that a web site has for a user. By contrast, cross-site scripting (XSS) exploits the trust that a user has for a web site. Like XSS, CSRF attacks are not necessarily cross-site, but they can be. Cross-site request forgery is also known as CSRF, XSRF, one-click attack, session riding, confused deputy, and sea surf.</p> + + + CORS Header + /docs/alerts/40040-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40040-1/ + <p>Cross-Origin Resource Sharing (CORS) is an HTTP-header based mechanism that allows a server to indicate any other origins (domain, scheme, or port) than its own from which a browser should permit loading of resources. It relaxes the Same-Origin Policy (SOP).</p> + + + CORS Misconfiguration + /docs/alerts/40040-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40040-2/ + <p>This CORS misconfiguration could allow an attacker to perform AJAX queries to the vulnerable website from a malicious page loaded by the victim&rsquo;s user agent. In order to perform authenticated AJAX queries, the server must specify the header &ldquo;Access-Control-Allow-Credentials: true&rdquo; and the &ldquo;Access-Control-Allow-Origin&rdquo; header must be set to null or the malicious page&rsquo;s domain. Even if this misconfiguration doesn&rsquo;t allow authenticated AJAX requests, unauthenticated sensitive content can still be accessed (e.g intranet websites). A malicious page can belong to a malicious website but also a trusted website with flaws (e.g XSS, support of HTTP without TLS allowing code injection through MITM, etc).</p> + + + CORS Misconfiguration + /docs/alerts/40040-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40040-3/ + <p>This CORS misconfiguration could allow an attacker to perform AJAX queries to the vulnerable website from a malicious page loaded by the victim&rsquo;s user agent. In order to perform authenticated AJAX queries, the server must specify the header &ldquo;Access-Control-Allow-Credentials: true&rdquo; and the &ldquo;Access-Control-Allow-Origin&rdquo; header must be set to null or the malicious page&rsquo;s domain. Even if this misconfiguration doesn&rsquo;t allow authenticated AJAX requests, unauthenticated sensitive content can still be accessed (e.g intranet websites). A malicious page can belong to a malicious website but also a trusted website with flaws (e.g XSS, support of HTTP without TLS allowing code injection through MITM, etc).</p> + + + Cross Site Scripting (DOM Based) + /docs/alerts/40026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40026/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Cross Site Scripting (Persistent) + /docs/alerts/40014/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40014/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Cross Site Scripting (Persistent) - Prime + /docs/alerts/40016/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40016/ + + + + Cross Site Scripting (Persistent) - Spider + /docs/alerts/40017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40017/ + + + + Cross Site Scripting (Reflected) + /docs/alerts/40012/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40012/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Directory Browsing + /docs/alerts/0/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/0/ + <p>It is possible to view the directory listing. Directory listing may reveal hidden scripts, include files, backup source files, etc. which can be accessed to read sensitive information.</p> + + + Exponential Entity Expansion (Billion Laughs Attack) + /docs/alerts/40044/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40044/ + <p>An exponential entity expansion, or &ldquo;billion laughs&rdquo; attack is a type of denial-of-service (DoS) attack. It is aimed at parsers of markup languages like XML or YAML that allow macro expansions.</p> + + + Expression Language Injection + /docs/alerts/90025/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90025/ + <p>The software constructs all or part of an expression language (EL) statement in a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed. In certain versions of Spring 3.0.5 and earlier, there was a vulnerability (CVE-2011-2730) in which Expression Language tags would be evaluated twice, which effectively exposed any application to EL injection. However, even for later versions, this weakness is still possible depending on configuration.</p> + + + External Redirect + /docs/alerts/20019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-1/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-2/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-3/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-4/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + GET for POST + /docs/alerts/10058/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/10058/ + <p>A request that was originally observed as a POST was also accepted as a GET. This issue does not represent a security weakness unto itself, however, it may facilitate simplification of other attacks. For example if the original POST is subject to Cross-Site Scripting (XSS), then this finding may indicate that a simplified (GET based) XSS may also be possible.</p> + + + Path Traversal + /docs/alerts/6-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-1/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-2/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-3/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-4/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-5/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-5/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Remote File Inclusion + /docs/alerts/7/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/7/ + <p>Remote File Include (RFI) is an attack technique used to exploit &ldquo;dynamic file include&rdquo; mechanisms in web applications. When web applications take user input (URL, parameter value, etc.) and pass them into file include commands, the web application might be tricked into including remote files with malicious code.</p> + + + Remote OS Command Injection + /docs/alerts/90020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90020/ + <p>Attack technique used for unauthorized execution of operating system commands. This attack is possible when an application accepts untrusted input to build operating system commands in an insecure manner involving improper data sanitization, and/or improper calling of external programs.</p> + + + Server Side Code Injection - ASP Code Injection + /docs/alerts/90019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90019-2/ + <p>A code injection may be possible including custom code that will be evaluated by the scripting engine.</p> + + + Server Side Code Injection - PHP Code Injection + /docs/alerts/90019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90019-1/ + <p>A code injection may be possible including custom code that will be evaluated by the scripting engine.</p> + + + Server Side Include + /docs/alerts/40009/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40009/ + <p>Certain parameters may cause Server Side Include commands to be executed. This may allow database connection or arbitrary code to be executed.</p> + + + Server Side Template Injection + /docs/alerts/90035/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90035/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + SOAP Action Spoofing + /docs/alerts/90026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90026/ + <p>An unintended SOAP operation was executed by the server.</p> + + + SOAP XML Injection + /docs/alerts/90029/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90029/ + <p>Some XML injected code has been interpreted by the server.</p> + + + SQL Injection + /docs/alerts/40018/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40018/ + <p>SQL injection may be possible.</p> + + + SQL Injection - Hypersonic SQL + /docs/alerts/40020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40020/ + <p>SQL injection may be possible.</p> + + + SQL Injection - MsSQL + /docs/alerts/40027/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40027/ + <p>SQL injection may be possible.</p> + + + SQL Injection - MySQL + /docs/alerts/40019/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40019/ + <p>SQL injection may be possible.</p> + + + SQL Injection - Oracle + /docs/alerts/40021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40021/ + <p>SQL injection may be possible.</p> + + + SQL Injection - PostgreSQL + /docs/alerts/40022/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40022/ + <p>SQL injection may be possible.</p> + + + XML External Entity Attack + /docs/alerts/90023/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90023/ + <p>This technique takes advantage of a feature of XML to build documents dynamically at the time of processing. An XML message can either provide data explicitly or by pointing to an URI where the data exists. In the attack technique, external entities may replace the entity value with malicious data, alternate referrals or may compromise the security of the data the server/XML application has access to. Attackers may also use External Entities to have the web services server download malicious code or content to the server for use in secondary or follow on attacks.</p> + + + XPath Injection + /docs/alerts/90021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90021/ + <p>XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. It can be used directly by an application to query an XML document, as part of a larger operation such as applying an XSLT transformation to an XML document, or applying an XQuery to an XML document. The syntax of XPath bears some resemblance to an SQL query, and indeed, it is possible to form SQL-like queries on an XML document using XPath.</p> + + + XSLT Injection + /docs/alerts/90017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90017/ + <p>Injection using XSL transformations may be possible, and may allow an attacker to read system information, read and write files, or execute arbitrary code.</p> + + + diff --git a/alerttags/policy_sequence/index.html b/alerttags/policy_sequence/index.html new file mode 100644 index 0000000000..c8f6e7fa8f --- /dev/null +++ b/alerttags/policy_sequence/index.html @@ -0,0 +1,399 @@ + + + + + + + + + + ZAP – POLICY_SEQUENCE + + + + + + + + + + + + + + + +
+
+ + + +
+
+ +

Alert Tag: POLICY_SEQUENCE

+ +
+
+
+ + + + + + +

POLICY_SEQUENCE

+ + All of the alerts which use this tag: + + + +
+ +
+ + + + + + +
+ + diff --git a/alerttags/policy_sequence/index.xml b/alerttags/policy_sequence/index.xml new file mode 100644 index 0000000000..9d20e73d92 --- /dev/null +++ b/alerttags/policy_sequence/index.xml @@ -0,0 +1,235 @@ + + + + POLICY_SEQUENCE on ZAP + /alerttags/policy_sequence/ + Recent content in POLICY_SEQUENCE on ZAP + Hugo + en-us + + + CRLF Injection + /docs/alerts/40003/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40003/ + <p>Cookie can be set via CRLF injection. It may also be possible to set arbitrary HTTP response headers. In addition, by carefully crafting the injected response using cross-site script, cache poisoning vulnerability may also exist.</p> + + + Cross Site Scripting (DOM Based) + /docs/alerts/40026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40026/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Cross Site Scripting (Reflected) + /docs/alerts/40012/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40012/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + External Redirect + /docs/alerts/20019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-1/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-2/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-3/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + External Redirect + /docs/alerts/20019-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/20019-4/ + <p>URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.</p> + + + Out of Band XSS + /docs/alerts/40031/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40031/ + <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + + Path Traversal + /docs/alerts/6-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-1/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-2/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-3/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-3/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-4/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-4/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Path Traversal + /docs/alerts/6-5/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/6-5/ + <p>The Path Traversal attack technique allows an attacker access to files, directories, and commands that potentially reside outside the web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the contents of arbitrary files anywhere on the web server. Any device that exposes an HTTP-based interface is potentially vulnerable to Path Traversal.</p> + + + Remote File Inclusion + /docs/alerts/7/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/7/ + <p>Remote File Include (RFI) is an attack technique used to exploit &ldquo;dynamic file include&rdquo; mechanisms in web applications. When web applications take user input (URL, parameter value, etc.) and pass them into file include commands, the web application might be tricked into including remote files with malicious code.</p> + + + Remote OS Command Injection + /docs/alerts/90020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90020/ + <p>Attack technique used for unauthorized execution of operating system commands. This attack is possible when an application accepts untrusted input to build operating system commands in an insecure manner involving improper data sanitization, and/or improper calling of external programs.</p> + + + Server Side Code Injection - ASP Code Injection + /docs/alerts/90019-2/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90019-2/ + <p>A code injection may be possible including custom code that will be evaluated by the scripting engine.</p> + + + Server Side Code Injection - PHP Code Injection + /docs/alerts/90019-1/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90019-1/ + <p>A code injection may be possible including custom code that will be evaluated by the scripting engine.</p> + + + Server Side Request Forgery + /docs/alerts/40046/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40046/ + <p>The web server receives a remote address and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.</p> + + + Server Side Template Injection + /docs/alerts/90035/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90035/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + Server Side Template Injection (Blind) + /docs/alerts/90036/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90036/ + <p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p> + + + SOAP Action Spoofing + /docs/alerts/90026/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90026/ + <p>An unintended SOAP operation was executed by the server.</p> + + + SOAP XML Injection + /docs/alerts/90029/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90029/ + <p>Some XML injected code has been interpreted by the server.</p> + + + SQL Injection + /docs/alerts/40018/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40018/ + <p>SQL injection may be possible.</p> + + + SQL Injection - Hypersonic SQL + /docs/alerts/40020/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40020/ + <p>SQL injection may be possible.</p> + + + SQL Injection - MsSQL + /docs/alerts/40027/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40027/ + <p>SQL injection may be possible.</p> + + + SQL Injection - MySQL + /docs/alerts/40019/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40019/ + <p>SQL injection may be possible.</p> + + + SQL Injection - Oracle + /docs/alerts/40021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40021/ + <p>SQL injection may be possible.</p> + + + SQL Injection - PostgreSQL + /docs/alerts/40022/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40022/ + <p>SQL injection may be possible.</p> + + + Text4shell (CVE-2022-42889) + /docs/alerts/40047/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40047/ + <p>Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults.Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded.The application has been shown to initial contact with remote servers via variable interpolation and may well be vulnerable to Remote Code Execution (RCE).</p> + + + XML External Entity Attack + /docs/alerts/90023/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90023/ + <p>This technique takes advantage of a feature of XML to build documents dynamically at the time of processing. An XML message can either provide data explicitly or by pointing to an URI where the data exists. In the attack technique, external entities may replace the entity value with malicious data, alternate referrals or may compromise the security of the data the server/XML application has access to. Attackers may also use External Entities to have the web services server download malicious code or content to the server for use in secondary or follow on attacks.</p> + + + XPath Injection + /docs/alerts/90021/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90021/ + <p>XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. It can be used directly by an application to query an XML document, as part of a larger operation such as applying an XSLT transformation to an XML document, or applying an XQuery to an XML document. The syntax of XPath bears some resemblance to an SQL query, and indeed, it is possible to form SQL-like queries on an XML document using XPath.</p> + + + XSLT Injection + /docs/alerts/90017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/90017/ + <p>Injection using XSL transformations may be possible, and may allow an attacker to read system information, read and write files, or execute arbitrary code.</p> + + + diff --git a/alerttags/wstg-v42-cryp-03/index.html b/alerttags/wstg-v42-cryp-03/index.html index 365c0b9930..b8d3c968ff 100644 --- a/alerttags/wstg-v42-cryp-03/index.html +++ b/alerttags/wstg-v42-cryp-03/index.html @@ -145,6 +145,12 @@

HTTP Only Site + + + + HTTP to HTTPS Insecure Transition in Form Post diff --git a/alerttags/wstg-v42-cryp-03/index.xml b/alerttags/wstg-v42-cryp-03/index.xml index 40f46511ca..3bbebe93d0 100644 --- a/alerttags/wstg-v42-cryp-03/index.xml +++ b/alerttags/wstg-v42-cryp-03/index.xml @@ -7,6 +7,13 @@ Hugo en-us + + HTTP Only Site + /docs/alerts/10106/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/10106/ + <p>The site is only served under HTTP and not HTTPS.</p> + HTTP to HTTPS Insecure Transition in Form Post /docs/alerts/10041/ diff --git a/alerttags/wstg-v42-inpv-02/index.html b/alerttags/wstg-v42-inpv-02/index.html index ffc0795d7c..1b5affc9ae 100644 --- a/alerttags/wstg-v42-inpv-02/index.html +++ b/alerttags/wstg-v42-inpv-02/index.html @@ -151,6 +151,18 @@

Cross Site Scripting (Persistent) - Prime + + + + + + Cross Site Scripting (Persistent) - Spider + + + + Out of Band XSS diff --git a/alerttags/wstg-v42-inpv-02/index.xml b/alerttags/wstg-v42-inpv-02/index.xml index cca36cfd8f..78747273ca 100644 --- a/alerttags/wstg-v42-inpv-02/index.xml +++ b/alerttags/wstg-v42-inpv-02/index.xml @@ -14,6 +14,20 @@ /docs/alerts/40014/ <p>Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology. When an attacker gets a user&rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.</p> + + Cross Site Scripting (Persistent) - Prime + /docs/alerts/40016/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40016/ + + + + Cross Site Scripting (Persistent) - Spider + /docs/alerts/40017/ + Mon, 01 Jan 0001 00:00:00 +0000 + /docs/alerts/40017/ + + Out of Band XSS /docs/alerts/40031/ diff --git a/alerttags/wstg-v42-sess-02/index.html b/alerttags/wstg-v42-sess-02/index.html index dea06b5bf5..5b5381feb1 100644 --- a/alerttags/wstg-v42-sess-02/index.html +++ b/alerttags/wstg-v42-sess-02/index.html @@ -181,12 +181,6 @@

HTTP Only Site - - - - Loosely Scoped Cookie diff --git a/alerttags/wstg-v42-sess-02/index.xml b/alerttags/wstg-v42-sess-02/index.xml index ced9f60e6b..6194b51df7 100644 --- a/alerttags/wstg-v42-sess-02/index.xml +++ b/alerttags/wstg-v42-sess-02/index.xml @@ -49,13 +49,6 @@ /docs/alerts/10011/ <p>A cookie has been set without the secure flag, which means that the cookie can be accessed via unencrypted connections.</p> - - HTTP Only Site - /docs/alerts/10106/ - Mon, 01 Jan 0001 00:00:00 +0000 - /docs/alerts/10106/ - <p>The site is only served under HTTP and not HTTPS.</p> - Loosely Scoped Cookie /docs/alerts/90033/ diff --git a/docs/alerts/0/index.html b/docs/alerts/0/index.html index c793120109..54c083e067 100644 --- a/docs/alerts/0/index.html +++ b/docs/alerts/0/index.html @@ -194,6 +194,12 @@

Directory Browsing

OWASP_2021_A01
+ POLICY_API
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ diff --git a/docs/alerts/10045-1/index.html b/docs/alerts/10045-1/index.html index d766756028..6123b66f82 100644 --- a/docs/alerts/10045-1/index.html +++ b/docs/alerts/10045-1/index.html @@ -194,6 +194,8 @@

Source Code Disclosure - /WEB-INF Folder

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-05
diff --git a/docs/alerts/10045-2/index.html b/docs/alerts/10045-2/index.html index e6959d1d89..b1f4e2bf75 100644 --- a/docs/alerts/10045-2/index.html +++ b/docs/alerts/10045-2/index.html @@ -194,6 +194,8 @@

Properties File Disclosure - /WEB-INF folder

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-05
diff --git a/docs/alerts/10047/index.html b/docs/alerts/10047/index.html index 1c65516f56..c8319349bc 100644 --- a/docs/alerts/10047/index.html +++ b/docs/alerts/10047/index.html @@ -194,6 +194,8 @@

HTTPS Content Available via HTTP

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CRYP-03
diff --git a/docs/alerts/10051/index.html b/docs/alerts/10051/index.html index d931a1b5b7..48d0c13362 100644 --- a/docs/alerts/10051/index.html +++ b/docs/alerts/10051/index.html @@ -194,6 +194,8 @@

Relative Path Confusion

OWASP_2021_A05
+ POLICY_QA_FULL
+ diff --git a/docs/alerts/10058/index.html b/docs/alerts/10058/index.html index 8f33b6e6f8..cc44f7105d 100644 --- a/docs/alerts/10058/index.html +++ b/docs/alerts/10058/index.html @@ -194,6 +194,10 @@

GET for POST

OWASP_2021_A04
+ POLICY_QA_FULL
+ + POLICY_QA_STD
+ WSTG-V42-CONF-06
diff --git a/docs/alerts/10095/index.html b/docs/alerts/10095/index.html index c13409e8e4..789f6b00c0 100644 --- a/docs/alerts/10095/index.html +++ b/docs/alerts/10095/index.html @@ -194,6 +194,8 @@

Backup File Disclosure

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-04
diff --git a/docs/alerts/10106/index.html b/docs/alerts/10106/index.html index e4031db89d..9563315c51 100644 --- a/docs/alerts/10106/index.html +++ b/docs/alerts/10106/index.html @@ -194,7 +194,9 @@

HTTP Only Site

OWASP_2021_A05
- WSTG-V42-SESS-02
+ POLICY_QA_FULL
+ + WSTG-V42-CRYP-03
diff --git a/docs/alerts/10107/index.html b/docs/alerts/10107/index.html index a68adcbfe5..a5a4d707df 100644 --- a/docs/alerts/10107/index.html +++ b/docs/alerts/10107/index.html @@ -194,6 +194,8 @@

Httpoxy - Proxy Header Misuse

OWASP_2021_A06
+ POLICY_QA_FULL
+ diff --git a/docs/alerts/20012/index.html b/docs/alerts/20012/index.html index 0d8f903b6b..7898bda385 100644 --- a/docs/alerts/20012/index.html +++ b/docs/alerts/20012/index.html @@ -194,6 +194,10 @@

Anti-CSRF Tokens Check

OWASP_2021_A05
+ POLICY_QA_FULL
+ + POLICY_QA_STD
+ WSTG-V42-SESS-05
diff --git a/docs/alerts/20015/index.html b/docs/alerts/20015/index.html index 537a5be2b1..0b18dfb56b 100644 --- a/docs/alerts/20015/index.html +++ b/docs/alerts/20015/index.html @@ -196,6 +196,8 @@

Heartbleed OpenSSL Vulnerability

OWASP_2021_A06
+ POLICY_QA_FULL
+ WSTG-V42-CRYP-01
diff --git a/docs/alerts/20016-1/index.html b/docs/alerts/20016-1/index.html index d5a37a9616..0a96cc7605 100644 --- a/docs/alerts/20016-1/index.html +++ b/docs/alerts/20016-1/index.html @@ -194,6 +194,8 @@

Cross-Domain Misconfiguration - Adobe - Read

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-08
diff --git a/docs/alerts/20016-2/index.html b/docs/alerts/20016-2/index.html index 5516fb2e5c..7034356f9a 100644 --- a/docs/alerts/20016-2/index.html +++ b/docs/alerts/20016-2/index.html @@ -194,6 +194,8 @@

Cross-Domain Misconfiguration - Adobe - Send

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-08
diff --git a/docs/alerts/20016-3/index.html b/docs/alerts/20016-3/index.html index 8626be1312..edb66cc806 100644 --- a/docs/alerts/20016-3/index.html +++ b/docs/alerts/20016-3/index.html @@ -194,6 +194,8 @@

Cross-Domain Misconfiguration - Silverlight

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-08
diff --git a/docs/alerts/20017/index.html b/docs/alerts/20017/index.html index 7eb5b451f5..70d1b51279 100644 --- a/docs/alerts/20017/index.html +++ b/docs/alerts/20017/index.html @@ -198,6 +198,8 @@

Source Code Disclosure - CVE-2012-1823

OWASP_2021_A06
+ POLICY_QA_FULL
+ diff --git a/docs/alerts/20018/index.html b/docs/alerts/20018/index.html index 7c92d5cdbb..b4df9127ba 100644 --- a/docs/alerts/20018/index.html +++ b/docs/alerts/20018/index.html @@ -198,6 +198,8 @@

Remote Code Execution - CVE-2012-1823

OWASP_2021_A06
+ POLICY_QA_FULL
+ WSTG-V42-INPV-12
diff --git a/docs/alerts/20019-1/index.html b/docs/alerts/20019-1/index.html index f3efcc914e..4f39086977 100644 --- a/docs/alerts/20019-1/index.html +++ b/docs/alerts/20019-1/index.html @@ -194,6 +194,20 @@

External Redirect

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-CLNT-04
diff --git a/docs/alerts/20019-2/index.html b/docs/alerts/20019-2/index.html index c4112f472b..41174d73cd 100644 --- a/docs/alerts/20019-2/index.html +++ b/docs/alerts/20019-2/index.html @@ -194,6 +194,20 @@

External Redirect

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-CLNT-04
diff --git a/docs/alerts/20019-3/index.html b/docs/alerts/20019-3/index.html index e2d5d75498..26145e051f 100644 --- a/docs/alerts/20019-3/index.html +++ b/docs/alerts/20019-3/index.html @@ -194,6 +194,20 @@

External Redirect

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-CLNT-04
diff --git a/docs/alerts/20019-4/index.html b/docs/alerts/20019-4/index.html index 7438b0cabd..50d936c99b 100644 --- a/docs/alerts/20019-4/index.html +++ b/docs/alerts/20019-4/index.html @@ -194,6 +194,20 @@

External Redirect

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-CLNT-04
diff --git a/docs/alerts/30001/index.html b/docs/alerts/30001/index.html index 77179ed6ab..905e6bb823 100644 --- a/docs/alerts/30001/index.html +++ b/docs/alerts/30001/index.html @@ -196,6 +196,8 @@

Buffer Overflow

OWASP_2021_A03
+ POLICY_API
+ diff --git a/docs/alerts/30002/index.html b/docs/alerts/30002/index.html index 357317ba2b..bb051e49b0 100644 --- a/docs/alerts/30002/index.html +++ b/docs/alerts/30002/index.html @@ -196,6 +196,10 @@

Format String Error

OWASP_2021_A03
+ POLICY_API
+ + POLICY_QA_FULL
+ diff --git a/docs/alerts/30003/index.html b/docs/alerts/30003/index.html index de7bcdfb7d..6713af1b71 100644 --- a/docs/alerts/30003/index.html +++ b/docs/alerts/30003/index.html @@ -196,6 +196,8 @@

Integer Overflow Error

OWASP_2021_A03
+ POLICY_API
+ diff --git a/docs/alerts/40003/index.html b/docs/alerts/40003/index.html index fa408e97f6..707fc71083 100644 --- a/docs/alerts/40003/index.html +++ b/docs/alerts/40003/index.html @@ -194,6 +194,14 @@

CRLF Injection

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-15
diff --git a/docs/alerts/40008/index.html b/docs/alerts/40008/index.html index 9e55f40df1..4229407c0c 100644 --- a/docs/alerts/40008/index.html +++ b/docs/alerts/40008/index.html @@ -194,6 +194,12 @@

Parameter Tampering

OWASP_2021_A04
+ POLICY_API
+ + POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ diff --git a/docs/alerts/40009/index.html b/docs/alerts/40009/index.html index 1c9b476627..a8d8928946 100644 --- a/docs/alerts/40009/index.html +++ b/docs/alerts/40009/index.html @@ -200,6 +200,16 @@

Server Side Include

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ WSTG-V42-INPV-11
diff --git a/docs/alerts/40012/index.html b/docs/alerts/40012/index.html index 26383adc63..73ce2e4786 100644 --- a/docs/alerts/40012/index.html +++ b/docs/alerts/40012/index.html @@ -194,6 +194,18 @@

Cross Site Scripting (Reflected)

OWASP_2021_A03
+ POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-01
diff --git a/docs/alerts/40014/index.html b/docs/alerts/40014/index.html index 16f9a40d7c..b7cf8d5f3a 100644 --- a/docs/alerts/40014/index.html +++ b/docs/alerts/40014/index.html @@ -192,6 +192,12 @@

Cross Site Scripting (Persistent)

OWASP_2021_A03
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ WSTG-V42-INPV-02
diff --git a/docs/alerts/40016/index.html b/docs/alerts/40016/index.html index 74b9df9aff..6d13f2853c 100644 --- a/docs/alerts/40016/index.html +++ b/docs/alerts/40016/index.html @@ -188,6 +188,18 @@

Cross Site Scripting (Persistent) - Prime

+ OWASP_2017_A07
+ + OWASP_2021_A03
+ + POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + WSTG-V42-INPV-02
+ diff --git a/docs/alerts/40017/index.html b/docs/alerts/40017/index.html index 9e6a4bcb20..d898fe3965 100644 --- a/docs/alerts/40017/index.html +++ b/docs/alerts/40017/index.html @@ -188,6 +188,18 @@

Cross Site Scripting (Persistent) - Spider

+ OWASP_2017_A07
+ + OWASP_2021_A03
+ + POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + WSTG-V42-INPV-02
+ diff --git a/docs/alerts/40018/index.html b/docs/alerts/40018/index.html index 1dcbcba6b5..7d235bc602 100644 --- a/docs/alerts/40018/index.html +++ b/docs/alerts/40018/index.html @@ -216,6 +216,20 @@

SQL Injection

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-05
diff --git a/docs/alerts/40019/index.html b/docs/alerts/40019/index.html index 5a49afe20f..2158ae449f 100644 --- a/docs/alerts/40019/index.html +++ b/docs/alerts/40019/index.html @@ -194,6 +194,14 @@

SQL Injection - MySQL

OWASP_2021_A03
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-05
diff --git a/docs/alerts/40020/index.html b/docs/alerts/40020/index.html index 000950b868..82d80dde3d 100644 --- a/docs/alerts/40020/index.html +++ b/docs/alerts/40020/index.html @@ -194,6 +194,14 @@

SQL Injection - Hypersonic SQL

OWASP_2021_A03
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-05
diff --git a/docs/alerts/40021/index.html b/docs/alerts/40021/index.html index 4c0ee1a0d3..0022b91b24 100644 --- a/docs/alerts/40021/index.html +++ b/docs/alerts/40021/index.html @@ -194,6 +194,14 @@

SQL Injection - Oracle

OWASP_2021_A03
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-05
diff --git a/docs/alerts/40022/index.html b/docs/alerts/40022/index.html index 6afa452a01..d3421745ce 100644 --- a/docs/alerts/40022/index.html +++ b/docs/alerts/40022/index.html @@ -194,6 +194,14 @@

SQL Injection - PostgreSQL

OWASP_2021_A03
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-05
diff --git a/docs/alerts/40023/index.html b/docs/alerts/40023/index.html index 986c71ee86..25f6ca2504 100644 --- a/docs/alerts/40023/index.html +++ b/docs/alerts/40023/index.html @@ -161,8 +161,8 @@

Possible Username Enumeration

CWE - - 200 + + 204 diff --git a/docs/alerts/40024/index.html b/docs/alerts/40024/index.html index 87215d228b..884fc09f03 100644 --- a/docs/alerts/40024/index.html +++ b/docs/alerts/40024/index.html @@ -194,6 +194,8 @@

SQL Injection - SQLite

OWASP_2021_A03
+ POLICY_QA_FULL
+ WSTG-V42-INPV-05
diff --git a/docs/alerts/40025/index.html b/docs/alerts/40025/index.html index 83ae7d9e59..593c93e704 100644 --- a/docs/alerts/40025/index.html +++ b/docs/alerts/40025/index.html @@ -161,8 +161,8 @@

Proxy Disclosure

CWE - - 200 + + 204 diff --git a/docs/alerts/40026/index.html b/docs/alerts/40026/index.html index ef626c2e10..6ead1a8ed4 100644 --- a/docs/alerts/40026/index.html +++ b/docs/alerts/40026/index.html @@ -194,6 +194,14 @@

Cross Site Scripting (DOM Based)

OWASP_2021_A03
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-CLNT-01
diff --git a/docs/alerts/40027/index.html b/docs/alerts/40027/index.html index 2c93ea484c..e397af8415 100644 --- a/docs/alerts/40027/index.html +++ b/docs/alerts/40027/index.html @@ -194,6 +194,14 @@

SQL Injection - MsSQL

OWASP_2021_A03
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-05
diff --git a/docs/alerts/40028/index.html b/docs/alerts/40028/index.html index efe592a77b..1d94991746 100644 --- a/docs/alerts/40028/index.html +++ b/docs/alerts/40028/index.html @@ -200,6 +200,8 @@

ELMAH Information Leak

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-05
diff --git a/docs/alerts/40029/index.html b/docs/alerts/40029/index.html index 335f7627eb..14e5e59599 100644 --- a/docs/alerts/40029/index.html +++ b/docs/alerts/40029/index.html @@ -200,6 +200,8 @@

Trace.axd Information Leak

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-05
diff --git a/docs/alerts/40031/index.html b/docs/alerts/40031/index.html index 0cc3d4432a..e7a5cdc0c2 100644 --- a/docs/alerts/40031/index.html +++ b/docs/alerts/40031/index.html @@ -194,6 +194,12 @@

Out of Band XSS

OWASP_2021_A03
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-01
WSTG-V42-INPV-02
diff --git a/docs/alerts/40032/index.html b/docs/alerts/40032/index.html index 6143676fd4..caeec893fa 100644 --- a/docs/alerts/40032/index.html +++ b/docs/alerts/40032/index.html @@ -194,6 +194,8 @@

.htaccess Information Leak

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-05
diff --git a/docs/alerts/40034/index.html b/docs/alerts/40034/index.html index 661cd416b5..ef1826015e 100644 --- a/docs/alerts/40034/index.html +++ b/docs/alerts/40034/index.html @@ -192,6 +192,8 @@

.env Information Leak

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-05
diff --git a/docs/alerts/40035/index.html b/docs/alerts/40035/index.html index c28915bf58..c5099fc67b 100644 --- a/docs/alerts/40035/index.html +++ b/docs/alerts/40035/index.html @@ -196,6 +196,8 @@

Hidden File Found

OWASP_2021_A05
+ POLICY_QA_FULL
+ WSTG-V42-CONF-05
diff --git a/docs/alerts/40038/index.html b/docs/alerts/40038/index.html index f3a3e22f65..7bc35935e3 100644 --- a/docs/alerts/40038/index.html +++ b/docs/alerts/40038/index.html @@ -192,6 +192,8 @@

Bypassing 403

OWASP_2021_A01
+ POLICY_QA_FULL
+ WSTG-V42-ATHN-04
diff --git a/docs/alerts/40040-1/index.html b/docs/alerts/40040-1/index.html index 7f2b5a13cf..28810d46d1 100644 --- a/docs/alerts/40040-1/index.html +++ b/docs/alerts/40040-1/index.html @@ -194,6 +194,10 @@

CORS Header

OWASP_2021_A01
+ POLICY_QA_FULL
+ + POLICY_QA_STD
+ WSTG-V42-CLNT-07
diff --git a/docs/alerts/40040-2/index.html b/docs/alerts/40040-2/index.html index 9417383549..47e0861f32 100644 --- a/docs/alerts/40040-2/index.html +++ b/docs/alerts/40040-2/index.html @@ -194,6 +194,10 @@

CORS Misconfiguration

OWASP_2021_A01
+ POLICY_QA_FULL
+ + POLICY_QA_STD
+ WSTG-V42-CLNT-07
diff --git a/docs/alerts/40040-3/index.html b/docs/alerts/40040-3/index.html index 659a9fa0ba..689c6ea0fb 100644 --- a/docs/alerts/40040-3/index.html +++ b/docs/alerts/40040-3/index.html @@ -194,6 +194,10 @@

CORS Misconfiguration

OWASP_2021_A01
+ POLICY_QA_FULL
+ + POLICY_QA_STD
+ WSTG-V42-CLNT-07
diff --git a/docs/alerts/40042/index.html b/docs/alerts/40042/index.html index 6d4de7a12b..bbd1219729 100644 --- a/docs/alerts/40042/index.html +++ b/docs/alerts/40042/index.html @@ -198,6 +198,10 @@

Spring Actuator Information Leak

OWASP_2021_A01
+ POLICY_API
+ + POLICY_QA_FULL
+ WSTG-V42-CONF-05
diff --git a/docs/alerts/40043-1/index.html b/docs/alerts/40043-1/index.html index 13687aeb0d..5cc73e469d 100644 --- a/docs/alerts/40043-1/index.html +++ b/docs/alerts/40043-1/index.html @@ -200,6 +200,8 @@

Log4Shell (CVE-2021-44228)

OWASP_2021_A06
+ POLICY_QA_FULL
+ WSTG-V42-INPV-11
diff --git a/docs/alerts/40043-2/index.html b/docs/alerts/40043-2/index.html index fb3032d971..2a5106da14 100644 --- a/docs/alerts/40043-2/index.html +++ b/docs/alerts/40043-2/index.html @@ -200,6 +200,8 @@

Log4Shell (CVE-2021-45046)

OWASP_2021_A06
+ POLICY_QA_FULL
+ WSTG-V42-INPV-11
diff --git a/docs/alerts/40044/index.html b/docs/alerts/40044/index.html index 2be2108f09..cade820572 100644 --- a/docs/alerts/40044/index.html +++ b/docs/alerts/40044/index.html @@ -192,6 +192,12 @@

Exponential Entity Expansion (Billion Laughs Attack)

OWASP_2021_A04
+ POLICY_API
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ WSTG-V42-BUSL-09
diff --git a/docs/alerts/40045/index.html b/docs/alerts/40045/index.html index f739c2a6dc..73a42a6f4b 100644 --- a/docs/alerts/40045/index.html +++ b/docs/alerts/40045/index.html @@ -204,6 +204,8 @@

Spring4Shell

OWASP_2021_A06
+ POLICY_QA_FULL
+ WSTG-V42-INPV-12
diff --git a/docs/alerts/40046/index.html b/docs/alerts/40046/index.html index f1b954dfed..90f75032e8 100644 --- a/docs/alerts/40046/index.html +++ b/docs/alerts/40046/index.html @@ -194,6 +194,12 @@

Server Side Request Forgery

OWASP_2021_A10
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-19
diff --git a/docs/alerts/40047/index.html b/docs/alerts/40047/index.html index dcbf9e6496..11f5b3fdc1 100644 --- a/docs/alerts/40047/index.html +++ b/docs/alerts/40047/index.html @@ -200,6 +200,12 @@

Text4shell (CVE-2022-42889)

OWASP_2021_A06
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-11
diff --git a/docs/alerts/41/index.html b/docs/alerts/41/index.html index b8205f060d..c243aa0a82 100644 --- a/docs/alerts/41/index.html +++ b/docs/alerts/41/index.html @@ -194,6 +194,8 @@

Source Code Disclosure - Git

OWASP_2021_A05
+ POLICY_QA_FULL
+ diff --git a/docs/alerts/42/index.html b/docs/alerts/42/index.html index 6c0ae4f5a7..becd5865d8 100644 --- a/docs/alerts/42/index.html +++ b/docs/alerts/42/index.html @@ -194,6 +194,8 @@

Source Code Disclosure - SVN

OWASP_2021_A05
+ POLICY_QA_FULL
+ diff --git a/docs/alerts/43/index.html b/docs/alerts/43/index.html index 016a3cf0f7..c622d50525 100644 --- a/docs/alerts/43/index.html +++ b/docs/alerts/43/index.html @@ -194,6 +194,8 @@

Source Code Disclosure - File Inclusion

OWASP_2021_A05
+ POLICY_QA_FULL
+ diff --git a/docs/alerts/6-1/index.html b/docs/alerts/6-1/index.html index 989daca336..5385ae494c 100644 --- a/docs/alerts/6-1/index.html +++ b/docs/alerts/6-1/index.html @@ -194,6 +194,16 @@

Path Traversal

OWASP_2021_A01
+ POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-ATHZ-01
diff --git a/docs/alerts/6-2/index.html b/docs/alerts/6-2/index.html index 1e9f48300e..4b758350e2 100644 --- a/docs/alerts/6-2/index.html +++ b/docs/alerts/6-2/index.html @@ -194,6 +194,16 @@

Path Traversal

OWASP_2021_A01
+ POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-ATHZ-01
diff --git a/docs/alerts/6-3/index.html b/docs/alerts/6-3/index.html index 667a0fc857..8a9301f985 100644 --- a/docs/alerts/6-3/index.html +++ b/docs/alerts/6-3/index.html @@ -194,6 +194,16 @@

Path Traversal

OWASP_2021_A01
+ POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-ATHZ-01
diff --git a/docs/alerts/6-4/index.html b/docs/alerts/6-4/index.html index df1071a246..94cbeacf1a 100644 --- a/docs/alerts/6-4/index.html +++ b/docs/alerts/6-4/index.html @@ -194,6 +194,16 @@

Path Traversal

OWASP_2021_A01
+ POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-ATHZ-01
diff --git a/docs/alerts/6-5/index.html b/docs/alerts/6-5/index.html index e9af213d53..42d95e017a 100644 --- a/docs/alerts/6-5/index.html +++ b/docs/alerts/6-5/index.html @@ -194,6 +194,16 @@

Path Traversal

OWASP_2021_A01
+ POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-ATHZ-01
diff --git a/docs/alerts/7/index.html b/docs/alerts/7/index.html index 7511719b54..2bbc5959cd 100644 --- a/docs/alerts/7/index.html +++ b/docs/alerts/7/index.html @@ -194,6 +194,18 @@

Remote File Inclusion

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-11
diff --git a/docs/alerts/90017/index.html b/docs/alerts/90017/index.html index 7b950c1f19..461883039b 100644 --- a/docs/alerts/90017/index.html +++ b/docs/alerts/90017/index.html @@ -194,6 +194,20 @@

XSLT Injection

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ diff --git a/docs/alerts/90019-1/index.html b/docs/alerts/90019-1/index.html index 05effbe1e5..358b3037b5 100644 --- a/docs/alerts/90019-1/index.html +++ b/docs/alerts/90019-1/index.html @@ -198,6 +198,16 @@

Server Side Code Injection - PHP Code Injection

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-11
diff --git a/docs/alerts/90019-2/index.html b/docs/alerts/90019-2/index.html index fcdff81701..ea37905a45 100644 --- a/docs/alerts/90019-2/index.html +++ b/docs/alerts/90019-2/index.html @@ -198,6 +198,16 @@

Server Side Code Injection - ASP Code Injection

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-11
diff --git a/docs/alerts/90020/index.html b/docs/alerts/90020/index.html index 2d16471d42..59a4dcdc9a 100644 --- a/docs/alerts/90020/index.html +++ b/docs/alerts/90020/index.html @@ -200,6 +200,20 @@

Remote OS Command Injection

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-12
diff --git a/docs/alerts/90021/index.html b/docs/alerts/90021/index.html index 5d718770ef..f576d8da60 100644 --- a/docs/alerts/90021/index.html +++ b/docs/alerts/90021/index.html @@ -194,6 +194,20 @@

XPath Injection

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-09
diff --git a/docs/alerts/90023/index.html b/docs/alerts/90023/index.html index f69cfd7a7a..3dd85973d3 100644 --- a/docs/alerts/90023/index.html +++ b/docs/alerts/90023/index.html @@ -194,6 +194,20 @@

XML External Entity Attack

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-07
diff --git a/docs/alerts/90024/index.html b/docs/alerts/90024/index.html index 6f71f587ac..cbe1c924f2 100644 --- a/docs/alerts/90024/index.html +++ b/docs/alerts/90024/index.html @@ -194,6 +194,8 @@

Generic Padding Oracle

OWASP_2021_A02
+ POLICY_QA_FULL
+ WSTG-V42-CRYP-02
diff --git a/docs/alerts/90025/index.html b/docs/alerts/90025/index.html index 8e5473d8c5..b0546641e5 100644 --- a/docs/alerts/90025/index.html +++ b/docs/alerts/90025/index.html @@ -194,6 +194,12 @@

Expression Language Injection

OWASP_2021_A03
+ POLICY_API
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ WSTG-V42-INPV-11
diff --git a/docs/alerts/90026/index.html b/docs/alerts/90026/index.html index 13fed3b343..2d18b6314d 100644 --- a/docs/alerts/90026/index.html +++ b/docs/alerts/90026/index.html @@ -192,6 +192,20 @@

SOAP Action Spoofing

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ diff --git a/docs/alerts/90028/index.html b/docs/alerts/90028/index.html index 0723ba1db2..88c16107bb 100644 --- a/docs/alerts/90028/index.html +++ b/docs/alerts/90028/index.html @@ -192,6 +192,10 @@

Insecure HTTP Method

OWASP_2021_A05
+ POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ WSTG-V42-CONF-06
diff --git a/docs/alerts/90029/index.html b/docs/alerts/90029/index.html index 0dd31373b2..cb1f6e3b64 100644 --- a/docs/alerts/90029/index.html +++ b/docs/alerts/90029/index.html @@ -192,6 +192,20 @@

SOAP XML Injection

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ diff --git a/docs/alerts/90034/index.html b/docs/alerts/90034/index.html index 21f0e5d900..ecc6817b63 100644 --- a/docs/alerts/90034/index.html +++ b/docs/alerts/90034/index.html @@ -192,6 +192,10 @@

Cloud Metadata Potentially Exposed

OWASP_2021_A05
+ POLICY_API
+ + POLICY_QA_FULL
+ diff --git a/docs/alerts/90035/index.html b/docs/alerts/90035/index.html index d6501a388a..61411a6fee 100644 --- a/docs/alerts/90035/index.html +++ b/docs/alerts/90035/index.html @@ -194,6 +194,20 @@

Server Side Template Injection

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_CICD
+ + POLICY_DEV_FULL
+ + POLICY_DEV_STD
+ + POLICY_QA_FULL
+ + POLICY_QA_STD
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-18
diff --git a/docs/alerts/90036/index.html b/docs/alerts/90036/index.html index 0a3410902b..a4ad95d92f 100644 --- a/docs/alerts/90036/index.html +++ b/docs/alerts/90036/index.html @@ -194,6 +194,14 @@

Server Side Template Injection (Blind)

OWASP_2021_A03
+ POLICY_API
+ + POLICY_DEV_FULL
+ + POLICY_QA_FULL
+ + POLICY_SEQUENCE
+ WSTG-V42-INPV-18
diff --git a/docs/alerts/index.html b/docs/alerts/index.html index f6157cb226..47319779e4 100644 --- a/docs/alerts/index.html +++ b/docs/alerts/index.html @@ -1937,7 +1937,7 @@

ZAP Alert Details

beta Informational Active - 200 + 204 13 @@ -1957,7 +1957,7 @@

ZAP Alert Details

beta Medium Active - 200 + 204 45 diff --git a/sitemap.xml b/sitemap.xml index 795fb8bb56..4a6f6c479e 100644 --- a/sitemap.xml +++ b/sitemap.xml @@ -2555,6 +2555,20 @@ /docs/statistics/pie-charts/ /docs/alerts/10062/ + + /alerttags/policy_api/ + + /alerttags/policy_dev_cicd/ + + /alerttags/policy_dev_full/ + + /alerttags/policy_dev_std/ + + /alerttags/policy_qa_full/ + + /alerttags/policy_qa_std/ + + /alerttags/policy_sequence/ /docs/alerts/40023/