The following alpha status passive scan rules are included in this add-on:
This implements an example passive scan rule that loads strings from a file that the user can edit.
For more details see: Hacking ZAP Part 3: Passive Scan Rules.
Latest code: ExampleFilePassiveScanRule.java
Note: At Low Threshold all occurrences within each response will be included.
Latest code: Base64Disclosure.java
Alert ID: 10094.
This implements a very simple example passive scan rule.
For more details see: Hacking ZAP Part 3: Passive Scan Rules.
Latest code: ExampleSimplePassiveScanRule.java
Fetch Metadata Request headers are HTTP request headers that provide additional information about a request’s origin. This additional information helps the server to implement resource isolation policy, allowing external sites to request only those resources that are intended for sharing, and that are used appropriately. This approach can help mitigate common cross-site web vulnerabilities such as CSRF, Cross-site Script Inclusion, timing attacks, and cross-origin information leaks. The Fetch Metadata Request headers are:
(from Fetch Metadata Headers)
Sec-Fetch-Site indicates the relationship between a request initiator’s origin and the origin of requested resource. (from Sec-Fetch-Site)
Sec-Fetch-Mode allows the server to distinguish between requests originating from a user navigating between HTML pages and requests to load images and other resources. (from Sec-Fetch-Mode)
Sec-Fetch-Dest indicates where and how the requested resource will be used. (from Sec-Fetch-Dest)
Sec-Fetch-User is only sent for requests initiated by user activation. (from Sec-Fetch-User)
Alerts generated:
Latest code: FetchMetadataRequestHeadersScanRule.java
Alert ID: 90005.
A Full Path Disclosure vulnerability is where the path to the root of the application providing valuable information for attackers. Examples of Full Path Disclosure Vulnerabilities are : /home/omg/htdocs/file/ or C:\Users\username\server\
The attacker could use this path to steal credentials or other private information. For more information visit : OWASP article.
Latest code: FullPathDisclosureScanRule.java
Alert ID: 110009.