Defaulting ZAP install dir to /ZaProxy/ZAP_2.12.0
1143 [main] INFO org.parosproxy.paros.Constant - Backing up config file to /.ZAP/config.xml.bak
1162 [main] INFO org.parosproxy.paros.Constant - Upgraded from 20011001
Job authentication set parameters = {port=8090}
Job passiveScan-config set maxAlertsPerRule = 0
Job passiveScan-config set maxBodySizeInBytesToScan = 0
Job spider set acceptCookies = true
Job spider set handleODataParametersVisited = false
Job spider set handleParameters = USE_ALL
Job spider set maxDepth = 5
Job spider set maxDuration = 0
Job spider set maxParseSizeBytes = 2,621,440
Job spider set parseComments = true
Job spider set parseGit = false
Job spider set parseRobotsTxt = true
Job spider set parseSVNEntries = false
Job spider set parseSitemapXml = true
Job spider set postForm = true
Job spider set processForm = true
Job spider set requestWaitTime = 200
Job spider set sendRefererHeader = true
Job spider set threadCount = 2
Job spider set url =
http://www.expample/app/v1.0?WSDL Job passiveScan-wait set maxDuration = 0
Job activeScan set addQueryParam = false
Job activeScan set delayInMs = 0
Job activeScan set handleAntiCSRFTokens = true
Job activeScan set injectPluginIdInHeader = false
Job activeScan set maxRuleDurationInMins = 0
Job activeScan set maxScanDurationInMins = 0
Job activeScan set scanHeadersAllRequests = false
Job activeScan set threadPerHost = 2
Job soap set wsdlUrl =
http://www.expample/app/v1.0?WSDL Job outputSummary set format = LONG
Job outputSummary set summaryFile = /ZaProxy/reports/zapOS.json
Job report set displayReport = false
Job report set reportDir = /ZaProxy/reports
Job report set reportFile = zapsoap.html
Job report set reportTitle = ZAP Scanning Report
Job report set template =
risk-confidence-html
Job passiveScan-config started
Job passiveScan-config finished
Job spider started
Job spider requesting
http://www.expample/app/v1.0?WSDLJob spider found 0 URLs
Job spider finished
Job delay started
Job delay ended after specified time null
Job delay finished
Job passiveScan-wait started
Job passiveScan-wait finished
Job activeScan started
Job activeScan finished
Job soap started
Job soap finished
Job outputSummary started
Total of 5 URLs
PASS: Vulnerable JS Library (Powered by Retire.js) [10003]
PASS: Cookie No HttpOnly Flag [10010]
PASS: Cookie Without Secure Flag [10011]
PASS: Re-examine Cache-control Directives [10015]
PASS: Cross-Domain JavaScript Source File Inclusion [10017]
PASS: Content-Type Header Missing [10019]
PASS: Anti-clickjacking Header [10020]
PASS: X-Content-Type-Options Header Missing [10021]
PASS: Information Disclosure - Debug Error Messages [10023]
PASS: Information Disclosure - Sensitive Information in URL [10024]
PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025]
PASS: Information Disclosure - Suspicious Comments [10027]
PASS: Open Redirect [10028]
PASS: Cookie Poisoning [10029]
PASS: User Controllable Charset [10030]
PASS: User Controllable HTML Element Attribute (Potential XSS) [10031]
PASS: Viewstate [10032]
PASS: Directory Browsing [10033]
PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034]
PASS: Strict-Transport-Security Header [10035]
PASS: HTTP Server Response Header [10036]
PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037]
PASS: Content Security Policy (CSP) Header Not Set [10038]
PASS: X-Backend-Server Header Information Leak [10039]
PASS: Secure Pages Include Mixed Content [10040]
PASS: HTTP to HTTPS Insecure Transition in Form Post [10041]
PASS: HTTPS to HTTP Insecure Transition in Form Post [10042]
PASS: User Controllable JavaScript Event (XSS) [10043]
PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044]
PASS: Retrieved from Cache [10050]
PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052]
PASS: Cookie without SameSite Attribute [10054]
PASS: CSP [10055]
PASS: X-Debug-Token Information Leak [10056]
PASS: Username Hash Found [10057]
PASS: X-AspNet-Version Response Header [10061]
PASS: PII Disclosure [10062]
PASS: Timestamp Disclosure [10096]
PASS: Hash Disclosure [10097]
PASS: Cross-Domain Misconfiguration [10098]
PASS: Weak Authentication Method [10105]
PASS: Reverse Tabnabbing [10108]
PASS: Modern Web Application [10109]
PASS: Absence of Anti-CSRF Tokens [10202]
PASS: Private IP Disclosure [2]
PASS: Session ID in URL Rewrite [3]
PASS: Script Passive Scan Rules [50001]
PASS: Stats Passive Scan Rule [50003]
PASS: Insecure JSF ViewState [90001]
PASS: Charset Mismatch [90011]
PASS: Application Error Disclosure [90022]
PASS: WSDL File Detection [90030]
PASS: Loosely Scoped Cookie [90033]
FAIL-NEW: 0 FAIL-INPROG: 0 WARN-NEW: 0 WARN-INPROG: 0 INFO: 0 IGNORE: 0 PASS: 53
Job outputSummary finished
Job report started
Job report generated report /ZaProxy/reports/zapsoap.html
Job report finished
Automation plan succeeded!
but the report comes out like in the screenshot and the GUI's automated scan results are not the same (GUI has soap action spoofing and all. but this doesn't show them).
I've also tried other reports like modern, high-level-report, tradition-html-plus. everything comes out without vulnerabilities and the CSS script, like the photo attached.
Am I using the config.yaml correctly to scan soap URL?
Thanks & Regards
Sai Theja Pamarty