--
You received this message because you are subscribed to a topic in the Google Groups "OWASP ZAP User Group" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/zaproxy-users/Gg5I9MSLnJs/unsubscribe.
To unsubscribe from this group and all its topics, send an email to zaproxy-user...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Hi Colm,thanks for your answer. I've redone tests on wackoPicko and I don't get this results anymore... However when I scan my private website I always get up to 10 sql injection false positive of this type.Here are my configuration:- which precise Zap version => 2.2.2-Owasp BWA version => 1.1.1- which OS => Kali Linux 3.12- which specific plugins you have enabled in the scan policy => Path traversal, remote file inclusion, Url redir. abuse, server side abuse, server side include, Sql injection, directory browsing, secure page browser cache, external redirect, parameter tampering. (for passive : Cookie no http-only flag, cookie without secure flag, session ID in URL rewrite)- what attack strength and thresholds value you're using in the scan => Medium/Medium- which specific plugin is raising the alert (or the title of the alert, if you're not sure) => the name of the alert is "Sql injection)- what mechanism you're using to scan the URL (as part of a context, or as a single url, for instance) => I crawl manually the root address manually with the proxy. Then I use spider-subtree (on the root adress in History). Finally I click on the same link on History on attack-active scan subtree.- how many scanning threads are enabled in the options => 10 threads for attack.Here are two more examples of sql injection Zap alerts when I scan my personal website:POST http://www.example.org/report HTTP/1.1Host: www.example.org
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0;) AND 1=1 --Pragma: no-cacheCache-control: no-cacheContent-Type: application/x-www-form-urlencoded
Content-length: 302SQL injection may be possible
The page results were successfully manipulated using the boolean conditions [Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0;) AND 1=1 -- ] and [Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0;) AND 1=2 -- ]The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparisonData was returned for the original parameter.The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter
----------------------------------------------------------------------POST http://www.example.org/report HTTP/1.1Host: www.example.org AND 1=1 --
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0;)
Pragma: no-cacheCache-control: no-cacheContent-Type: application/x-www-form-urlencoded
Content-length: 302SQL injection may be possibleThe page results were successfully manipulated using the boolean conditions [www.example.org AND 1=1 -- ] and [www.example.org AND 1=2 -- ]
The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparisonData was returned for the original parameter.The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter
Thank you very much for your help!Merok