Hello, I have also recently experienced this issue and can supply some details. I am trying to create a false positive filter to get rid of an .htaccess alert. The other issues I created filters for were filtered successfully (CSP, Hidden file), but this one will not go away. The section of context file looks like this for .htaccess:
<filter>true;40032;-1;;false;;false;;false;;false;</filter>
Parameter field was empty
The Evidence is that the app returns a 200:
HTTP/1.1 200
For the vulnerability itself, I get that the file is still there and returning a 200, so ZAP flags it. That makes sense.
But if the context file has the filter of 40032, shouldn't it block any instance of htaccess from appearing at all? If the filter was set to global everything?
I did make some observations about filters, namely the version of ZAP makes a difference. If I make a filter in 2.14, its usually not backwards compatible with previous versions. Even for issues that have not changed between versions. Forwards compatibility has less issues, but I have still seen this happen. I looked for any patch notes about this, but didnt have much luck. Nothing in the context file format has changed recently either, so I am not sure why version has so much to do with it. But this htaccess specifically has not worked in any version. 2.11, 2.12, or 2.14 from what I have tested. Do the labels of issues change much? Was htaccess not always 40032? I am curious to hear your thoughts.
Also, I always appreciate how active you all are with this community. Rarely have I had to reach out about an issue, usually I find the answer very quickly.