--
You received this message because you are subscribed to the Google Groups "OWASP ZAP Developer Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to zaproxy-devel...@googlegroups.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/zaproxy-develop/CAMtJAtp5KaNe_3FYLM-7_O2%3DOBwvjB1kaURZN19LM-8c%2BhxHGg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
To view this discussion on the web, visit https://groups.google.com/d/msgid/zaproxy-develop/CAOZ036G70q7pTc2iEca4tRgSAVa4DyAHqTfNQhGqHrVNFE%2BBCQ%40mail.gmail.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/zaproxy-develop/CAMtJAtq5QYrQ0w1Gt0aRvQDyg4o98d24_6cYJPtsPs9-aA7WbQ%40mail.gmail.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/zaproxy-develop/CAOZ036GiNyNjaWnE3kPRAu_gchDxehUqA6bGg7VKxrvr8UWOFw%40mail.gmail.com.
Hi.
No, to my knowledge, there is no jsf viewstate decoder or visualiser in zap.
I still think there's merit in debugging lnyourface for your sample data. If you have functional decoding code (and no licensing issues), we *could* potentially do some of the following in zap:
- implement a parameter variant (which would allow the individual viewstate fields to be attacked using existing scanners)
- implement a viewstate 'viewer', perhaps in the 'encode/ decode' screen.
Do you have a specification for the viewstate fornat and some sample viewstate data, by any chance?
Colm
> To view this discussion on the web, visit https://groups.google.com/d/msgid/zaproxy-develop/CAMtJAtrW1OSSAJG28jD9MLe7POEpYgyqLfaOB2p3ZtUAhkdEwQ%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "OWASP ZAP Developer Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to zaproxy-devel...@googlegroups.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/zaproxy-develop/d65b8c64-a580-4b9b-8862-b1183c4c19e7%40googlegroups.com.
I've used ysoserial payloads with 'great success' against both raw Java serialisation vulnerabilities, and against vulnerabilities introduced as a result of insecure components such as commons collections 3.2.1 and earlier.. Do you have a test case or two to work with? If not, I can point you at a nice sample: Jenkins versions prior to December 2015 are vulnerable, IIRC.
Does that help?
Colm
To view this discussion on the web, visit https://groups.google.com/d/msgid/zaproxy-develop/CAMtJAtr7bJdZV486sRx1CM7BNU-49hf_-%3DF%3DQu31PLBffcSX6A%40mail.gmail.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/zaproxy-develop/CAOZ036FYPug%2B7fpqb-%2BO_%2B-JY4Nyyg79Vp6uvtU5j3OcFD0MMA%40mail.gmail.com.