You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* 🟠 [Content Security Policy (CSP) Header Not Set](/docs/alerts/10038/)
49
+
50
+
It will create an HTML report in your CWD containing full details of all of the issues found.
51
+
18
52
### Potential Pitfalls
19
53
20
54
This is an online app which may be unavailable or broken at any point.
@@ -49,49 +83,58 @@ env:
49
83
contexts:
50
84
- name: testfire
51
85
urls:
52
-
- http://testfire.net
86
+
- http://demo.testfire.net
53
87
includePaths:
54
-
- http://testfire.net.*
55
-
excludePaths:
56
-
- http://testfire.net/logout.jsp
57
-
- http://testfire.net/doLogin
88
+
- https://demo.testfire.net.*
58
89
authentication:
59
90
method: browser
60
91
parameters:
61
-
loginPageUrl: http://testfire.net/login.jsp
92
+
loginPageUrl: https://demo.testfire.net/login.jsp
62
93
loginPageWait: 2
63
94
browserId: firefox
64
95
verification:
65
96
method: poll
66
97
loggedInRegex: \Q 200 OK\E
67
98
loggedOutRegex: \Q 302 Found\E
68
99
pollFrequency: 60
69
-
pollUnits: requests
70
-
pollUrl: http://testfire.net/bank/main.jsp
100
+
pollUnits: seconds
101
+
pollUrl: https://demo.testfire.net/bank/main.jsp
71
102
pollPostData: ""
72
103
sessionManagement:
73
104
method: headers
74
105
users:
75
-
- name: admin
106
+
- name: jsmith
76
107
credentials:
77
-
password: admin
78
-
username: admin
108
+
password: demo1234
109
+
username: jsmith
79
110
```
80
111
112
+
> [!NOTE]
113
+
> There are no exclude paths added in the environment definition. Logout avoidance is used in the Traditional Spider job example below.
114
+
> doLogin is left included as it is impacted by a SQLi vulnerability.
81
115
82
116
### Crawling
83
117
84
-
Any of the ZAP Spiders can be used to crawl AltoroJ.
118
+
Any of the ZAP Spiders can be used to crawl Testfire (AltoroJ).
119
+
120
+
For the [Traditional Spider](/docs/desktop/addons/spider/) we recommend the following configuration:
85
121
86
-
For the [Traditional Spider](/docs/desktop/addons/spider/) to be able to crawl the app you need to exclude the login and logout URLs from the context as above.
122
+
```yaml
123
+
- type: spider
124
+
parameters:
125
+
context: testfire
126
+
user: jsmith
127
+
url: https://demo.testfire.net
128
+
logoutAvoidance: true
129
+
```
87
130
88
131
For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the logout link:
89
132
90
133
```yaml
91
134
- type: spiderAjax
92
135
parameters:
93
136
context: testfire
94
-
user: admin
137
+
user: jsmith
95
138
browserId: firefox-headless
96
139
excludedElements:
97
140
- description: Logout
@@ -101,6 +144,6 @@ For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the
101
144
102
145
### Scanning
103
146
104
-
We are not aware of a definitive list of the vulnerabilities in AltoroJ.
147
+
We believe this is a definitive list of the vulnerabilities in Testfire (AltoroJ): https://help.hcl-software.com/appscan/ASoC/ja/PDF/Sample_DAST_Report.pdf
105
148
106
149
Not too surprisingly you will need to configure the [activeScan](/docs/desktop/addons/automation-framework/job-ascan/) job, and you will probably want to generate a [report](/docs/desktop/addons/report-generation/automation/).
0 commit comments