You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* 🟠 [Content Security Policy (CSP) Header Not Set](/docs/alerts/10038/)
43
+
* 🟠 [Secure Pages Include Mixed Content (Including Scripts)](/docs/alerts/10040/)
44
+
45
+
It will create an HTML report in your CWD containing full details of all of the issues found.
46
+
18
47
### Potential Pitfalls
19
48
20
49
This is an online app which may be unavailable or broken at any point.
@@ -49,49 +78,58 @@ env:
49
78
contexts:
50
79
- name: testfire
51
80
urls:
52
-
- http://testfire.net
81
+
- http://demo.testfire.net
53
82
includePaths:
54
-
- http://testfire.net.*
55
-
excludePaths:
56
-
- http://testfire.net/logout.jsp
57
-
- http://testfire.net/doLogin
83
+
- https://demo.testfire.net.*
58
84
authentication:
59
85
method: browser
60
86
parameters:
61
-
loginPageUrl: http://testfire.net/login.jsp
87
+
loginPageUrl: https://demo.testfire.net/login.jsp
62
88
loginPageWait: 2
63
89
browserId: firefox
64
90
verification:
65
91
method: poll
66
92
loggedInRegex: \Q 200 OK\E
67
93
loggedOutRegex: \Q 302 Found\E
68
94
pollFrequency: 60
69
-
pollUnits: requests
70
-
pollUrl: http://testfire.net/bank/main.jsp
95
+
pollUnits: seconds
96
+
pollUrl: https://demo.testfire.net/bank/main.jsp
71
97
pollPostData: ""
72
98
sessionManagement:
73
99
method: headers
74
100
users:
75
-
- name: admin
101
+
- name: jsmith
76
102
credentials:
77
-
password: admin
78
-
username: admin
103
+
password: demo1234
104
+
username: jsmith
79
105
```
80
106
107
+
> [!NOTE]
108
+
> There are no exclude paths added in the environment definition. Logout avoidance is used in the Traditional Spider job example below.
109
+
> doLogin is left included as it is impacted by a SQLi vulnerability.
81
110
82
111
### Crawling
83
112
84
-
Any of the ZAP Spiders can be used to crawl AltoroJ.
113
+
Any of the ZAP Spiders can be used to crawl Testfire (AltoroJ).
114
+
115
+
For the [Traditional Spider](/docs/desktop/addons/spider/) we recommend the following configuration:
85
116
86
-
For the [Traditional Spider](/docs/desktop/addons/spider/) to be able to crawl the app you need to exclude the login and logout URLs from the context as above.
117
+
```yaml
118
+
- type: spider
119
+
parameters:
120
+
context: testfire
121
+
user: jsmith
122
+
url: https://demo.testfire.net
123
+
logoutAvoidance: true
124
+
```
87
125
88
126
For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the logout link:
89
127
90
128
```yaml
91
129
- type: spiderAjax
92
130
parameters:
93
131
context: testfire
94
-
user: admin
132
+
user: jsmith
95
133
browserId: firefox-headless
96
134
excludedElements:
97
135
- description: Logout
@@ -101,6 +139,6 @@ For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the
101
139
102
140
### Scanning
103
141
104
-
We are not aware of a definitive list of the vulnerabilities in AltoroJ.
142
+
We believe this is a definitive list of the vulnerabilities in Testfire (AltoroJ): https://help.hcl-software.com/appscan/ASoC/ja/PDF/Sample_DAST_Report.pdf
105
143
106
144
Not too surprisingly you will need to configure the [activeScan](/docs/desktop/addons/automation-framework/job-ascan/) job, and you will probably want to generate a [report](/docs/desktop/addons/report-generation/automation/).
0 commit comments