Hello everyone,
We have a problem where our zaproxy run has identified various SQL injections. Our application responds to the attack attempt with a Bad Request (HTTP 400). For every request to our application, a request-id is generated, which can be seen in the X-Request-Id header and changes with each request. We are using the following Docker image: zaproxy/zap-bare:latest.
An example URL looks like this:
https://example.domain.net/endpoint/pageFavoriteAddInternal/page/-U9DEcUIQzm4v6Zph6Annw?versionState=published&editmode=false AND 1=1 --&_csrf=dPveI88G-O3HVaN48fcAlEwOzKdWVlfX9VIRgJhXCMj9S2flhDog
Can you tell us what we can do in our case? We believe these are false positives.