Skip to content

Commit 38d8825

Browse files
authored
Merge pull request #2785 from zapbot/update-alerts
Update alert pages
2 parents 326c314 + 86e64ab commit 38d8825

File tree

6 files changed

+28
-6
lines changed

6 files changed

+28
-6
lines changed

site/content/docs/alerts/10004.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: "Tech Detected - Apache HTTP Server"
3+
alertid: 10004
4+
alertindex: 1000400
5+
alerttype: "Tool"
6+
alertcount: 1
7+
status: release
8+
type: alert
9+
risk: Informational
10+
solution: ""
11+
references:
12+
- https://httpd.apache.org
13+
other: "The following CPE is associated with the identified tech: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* The following version(s) is/are associated with the identified tech: 2.4.7"
14+
cwe: 200
15+
wasc: 13
16+
alerttags:
17+
- CWE-200
18+
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/wappalyzer/src/main/java/org/zaproxy/zap/extension/wappalyzer/ExtensionWappalyzer.java
19+
linktext: "org/zaproxy/zap/extension/wappalyzer/ExtensionWappalyzer.java"
20+
help: https://www.zaproxy.org/docs/desktop/addons/technology-detection/options/#10004
21+
---
22+
The following "Web servers" technology was identified: Apache HTTP Server.

site/content/docs/alerts/10094-1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,4 @@ code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesAlpha
2222
linktext: "org/zaproxy/zap/extension/pscanrulesAlpha/Base64Disclosure.java"
2323
help: https://www.zaproxy.org/docs/desktop/addons/passive-scan-rules-alpha/#id-10094
2424
---
25-
An ASP.NET ViewState was disclosed by the application/web server
25+
An ASP.NET ViewState was disclosed by the application/web server.

site/content/docs/alerts/10094-2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,4 @@ code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesAlpha
2222
linktext: "org/zaproxy/zap/extension/pscanrulesAlpha/Base64Disclosure.java"
2323
help: https://www.zaproxy.org/docs/desktop/addons/passive-scan-rules-alpha/#id-10094
2424
---
25-
The application does not use a Message Authentication Code (MAC) to protect the integrity of the ASP.NET ViewState, which can be tampered with by a malicious client
25+
The application does not use a Message Authentication Code (MAC) to protect the integrity of the ASP.NET ViewState, which can be tampered with by a malicious client.

site/content/docs/alerts/40015.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ alertcount: 1
77
status: alpha
88
type: alert
99
risk: High
10-
solution: "Validate and/or escape all user input before using it to create an LDAP query. In particular, the following characters (or combinations) should be deny listed: & | ! < > = ~= >= <= * ( ) , + - \" ' ; \\ / NUL character "
10+
solution: "Validate and/or escape all user input before using it to create an LDAP query. In particular, the following characters (or combinations) should be deny listed: & | ! < > = ~= >= <= * ( ) , + - \" ' ; \\ / NUL character "
1111
references:
1212
- https://owasp.org/www-community/attacks/LDAP_Injection
1313
- https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html
@@ -24,4 +24,4 @@ code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha
2424
linktext: "org/zaproxy/zap/extension/ascanrulesAlpha/LdapInjectionScanRule.java"
2525
help: https://www.zaproxy.org/docs/desktop/addons/active-scan-rules-alpha/#id-40015
2626
---
27-
LDAP Injection may be possible. It may be possible for an attacker to bypass authentication controls, and to view and modify arbitrary data in the LDAP directory.
27+
LDAP Injection may be possible. It may be possible for an attacker to bypass authentication controls, and to view and modify arbitrary data in the LDAP directory.

site/content/docs/alerts/40033.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ alertcount: 1
77
status: alpha
88
type: alert
99
risk: High
10-
solution: "Do not trust client side input and escape all data on the server side. Avoid to use the query input directly into the where and group clauses and upgrade all drivers at the latest available version."
10+
solution: "Do not trust client side input and escape all data on the server side. Avoid to use the query input directly into the where and group clauses and upgrade all drivers at the latest available version."
1111
references:
1212
- https://arxiv.org/pdf/1506.04082.pdf
1313
- https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/07-Input_Validation_Testing/05.6-Testing_for_NoSQL_Injection.html

site/content/docs/alerts/90039.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ alertcount: 1
77
status: alpha
88
type: alert
99
risk: High
10-
solution: "Do not trust client side input and escape all data on the server side. Avoid to use the query input directly into the where and group clauses and upgrade all drivers at the latest available version."
10+
solution: "Do not trust client side input and escape all data on the server side. Avoid to use the query input directly into the where and group clauses and upgrade all drivers at the latest available version."
1111
references:
1212
- https://arxiv.org/pdf/1506.04082.pdf
1313
- https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/07-Input_Validation_Testing/05.6-Testing_for_NoSQL_Injection.html

0 commit comments

Comments
 (0)