You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Run ZAP using the stable Docker image, mapping the CWD so that Docker can access the file system and export the report
29
+
docker run -v $(pwd):/zap/wrk/:rw -t zaproxy/zap-stable zap.sh -cmd -autorun wrk/FullScanTestfireAuth.yaml
30
+
```
31
+
32
+
To run this command on Windows see the [relevant documentation](/docs/docker/about/#mounting-the-current-directory).
33
+
34
+
You will need to have Docker installed. If you do not want to use Docker then you can of course install ZAP locally.
35
+
36
+
The scan should find the following High and Medium risk alerts:
37
+
38
+
* 🔴 [Cross Site Scripting (Reflected](/docs/alerts/40012/)
39
+
* 🔴 [SQL Injection](/docs/alerts/40018/)
40
+
* 🔴 [External Redirect](/docs/alerts/20019/)
41
+
* 🔴 [PII Disclosure](/docs/alerts/10062/)
42
+
* 🟠 [Absence of Anti-CSRF Tokens](/docs/alerts/10202/)
43
+
* 🟠 [Content Security Policy (CSP) Header Not Set](/docs/alerts/10038/)
44
+
45
+
It will create an HTML report in your CWD containing full details of all of the issues found.
46
+
18
47
### Potential Pitfalls
19
48
20
49
This is an online app which may be unavailable or broken at any point.
@@ -52,9 +81,7 @@ env:
52
81
- http://testfire.net
53
82
includePaths:
54
83
- http://testfire.net.*
55
-
excludePaths:
56
-
- http://testfire.net/logout.jsp
57
-
- http://testfire.net/doLogin
84
+
- https://testfire.net.*
58
85
authentication:
59
86
method: browser
60
87
parameters:
@@ -66,7 +93,7 @@ env:
66
93
loggedInRegex: \Q 200 OK\E
67
94
loggedOutRegex: \Q 302 Found\E
68
95
pollFrequency: 60
69
-
pollUnits: requests
96
+
pollUnits: seconds
70
97
pollUrl: http://testfire.net/bank/main.jsp
71
98
pollPostData: ""
72
99
sessionManagement:
@@ -78,12 +105,20 @@ env:
78
105
username: admin
79
106
```
80
107
81
-
82
108
### Crawling
83
109
84
-
Any of the ZAP Spiders can be used to crawl AltoroJ.
110
+
Any of the ZAP Spiders can be used to crawl Testfire (AltoroJ).
85
111
86
-
For the [Traditional Spider](/docs/desktop/addons/spider/) to be able to crawl the app you need to exclude the login and logout URLs from the context as above.
112
+
For the [Traditional Spider](/docs/desktop/addons/spider/) we recommend enabling
113
+
114
+
```yaml
115
+
- type: spider
116
+
parameters:
117
+
context: testfire
118
+
user: jsmith
119
+
url: http://testfire.net
120
+
logoutAvoidance: true
121
+
```
87
122
88
123
For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the logout link:
89
124
@@ -101,6 +136,6 @@ For the [AJAX Spider](/docs/desktop/addons/ajax-spider/) you need to exclude the
101
136
102
137
### Scanning
103
138
104
-
We are not aware of a definitive list of the vulnerabilities in AltoroJ.
139
+
We believe this is a definitive list of the vulnerabilities in Testfire (AltoroJ): https://help.hcl-software.com/appscan/ASoC/ja/PDF/Sample_DAST_Report.pdf
105
140
106
141
Not too surprisingly you will need to configure the [activeScan](/docs/desktop/addons/automation-framework/job-ascan/) job, and you will probably want to generate a [report](/docs/desktop/addons/report-generation/automation/).
0 commit comments