Groups
Groups
Sign in
Groups
Groups
ZAP User Group
Conversations
About
Send feedback
Help
ZAP alerts and associated CWE ID
729 views
Skip to first unread message
Vinda Parab
unread,
Dec 3, 2021, 1:46:04 AM
12/3/21
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to OWASP ZAP User Group
Hello Team,
Is there a quick way to get the list of all the ZAP Alerts with associated CWE Ids?
https://www.zaproxy.org/docs/alerts/
Regards,
Vinda
kingthorin+owaspzap
unread,
Dec 3, 2021, 9:51:46 AM
12/3/21
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to OWASP ZAP User Group
Not currently.
You could install all the scan rules then run this:
https://github.com/zaproxy/community-scripts/blob/main/standalone/scan_rule_list.js
(though it'll require some modifications to include the CWEs).
kingthorin+owaspzap
unread,
Dec 3, 2021, 10:49:26 AM
12/3/21
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to OWASP ZAP User Group
// This script gives details about all of the scan rules installed
extAscan = org.parosproxy.paros.control.Control.getSingleton().
getExtensionLoader().getExtension(
org.zaproxy.zap.extension.ascan.ExtensionActiveScan.NAME
);
plugins = extAscan.getPolicyManager().getDefaultScanPolicy().getPluginFactory().getAllPlugin().toArray();
print('Plugin ID\tName\tType\tStatus\tCWE');
for (var i=0; i < plugins.length; i++) {
try {
var cwe = '';
try {
cwe = plugins[i].getCweId()
} catch (e) {
cwe = "";
}
print(plugins[i].getId()+ '\t' + plugins[i].getName() + '\tActive' + '\t' + plugins[i].getStatus() + '\t' + cwe);
} catch (e) {
print(e);
}
}
extPscan = org.parosproxy.paros.control.Control.getSingleton().
getExtensionLoader().getExtension(
org.zaproxy.zap.extension.pscan.ExtensionPassiveScan.NAME
);
plugins = extPscan.getPluginPassiveScanners().toArray();
for (var i=0; i < plugins.length; i++) {
try {
var cwe = '';
try {
cwe = plugins[i].getCweId()
} catch (e) {
cwe = "";
}
print(plugins[i].getPluginId()+ '\t' + plugins[i].getName() + '\tPassive' + '\t' + plugins[i].getStatus() + '\t' + cwe);
} catch (e) {
print(e);
}
}
Plugin ID Name Type Status CWE
6 Path Traversal Active release 22
7 Remote File Inclusion Active release 98
10045 Source Code Disclosure - /WEB-INF folder Active release 541
20019 External Redirect Active release 601
40009 Server Side Include Active release 97
40012 Cross Site Scripting (Reflected) Active release 79
40014 Cross Site Scripting (Persistent) Active release 79
40018 SQL Injection Active release 89
90019 Server Side Code Injection Active release 94
90020 Remote OS Command Injection Active release 78
0 Directory Browsing Active release 548
30001 Buffer Overflow Active release 120
30002 Format String Error Active release 134
40003 CRLF Injection Active release 113
40008 Parameter Tampering Active release 472
40028 ELMAH Information Leak Active release 94
40032 .htaccess Information Leak Active release 94
40016 Cross Site Scripting (Persistent) - Prime Active release 79
40017 Cross Site Scripting (Persistent) - Spider Active release 79
50000 Script Active Scan Rules Active release 0
41 Source Code Disclosure - Git Active beta 541
43 Source Code Disclosure - File Inclusion Active beta 541
10048 Remote Code Execution - Shell Shock Active beta 78
10107 Httpoxy - Proxy Header Misuse Active beta 20
20012 Anti-CSRF Tokens Check Active beta 352
20015 Heartbleed OpenSSL Vulnerability Active beta 119
20016 Cross-Domain Misconfiguration Active beta 264
20017 Source Code Disclosure - CVE-2012-1823 Active beta 20
20018 Remote Code Execution - CVE-2012-1823 Active beta 20
40013 Session Fixation Active beta 384
40019 SQL Injection - MySQL Active beta 89
40020 SQL Injection - Hypersonic SQL Active beta 89
40021 SQL Injection - Oracle Active beta 89
40022 SQL Injection - PostgreSQL Active beta 89
40024 SQL Injection - SQLite Active beta 89
40026 Cross Site Scripting (DOM Based) Active beta 79
40027 SQL Injection - MsSQL Active beta 89
90021 XPath Injection Active beta 643
90023 XML External Entity Attack Active beta 611
90024 Generic Padding Oracle Active beta 209
90025 Expression Language Injection Active beta 917
90034 Cloud Metadata Potentially Exposed Active beta 0
42 Source Code Disclosure - SVN Active beta 541
10051 Relative Path Confusion Active beta 20
10095 Backup File Disclosure Active beta 530
10106 HTTP Only Site Active beta 311
30003 Integer Overflow Error Active beta 190
40025 Proxy Disclosure Active beta 200
40029 Trace.axd Information Leak Active beta 215
40034 .env Information Leak Active beta 215
40035 Hidden File Finder Active beta 538
90017 XSLT Injection Active beta 91
90028 Insecure HTTP Method Active beta 200
10047 HTTPS Content Available via HTTP Active beta 311
10058 GET for POST Active beta 16
10104 User Agent Fuzzer Active beta 0
20014 HTTP Parameter Pollution Active beta 20
40023 Possible Username Enumeration Active beta 200
90027 Cookie Slack Detector Active beta 200
40015 LDAP Injection Active alpha 90
40033 NoSQL Injection - MongoDB Active alpha 943
60100 Example Active Scan Rule: Denial of Service Active alpha 0
60101 An example active scan rule which loads data from a file Active alpha 0
40038 Bypassing 403 Active alpha 0
40039 Web Cache Deception Active alpha 0
40040 CORS Header Active alpha 942
40042 Spring Actuator Information Leak Active alpha 215
50001 Script Passive Scan Rules Passive release
50003 Stats Passive Scan Rule Passive release
10103 Image Location and Privacy Scanner Passive beta
10003 Vulnerable JS Library Passive release
10044 Big Redirect Detected (Potential Sensitive Information Leak) Passive beta
10038 Content Security Policy (CSP) Header Not Set Passive beta
10033 Directory Browsing Passive beta
10097 Hash Disclosure Passive beta
10034 Heartbleed OpenSSL Vulnerability (Indicative) Passive beta
10041 HTTP to HTTPS Insecure Transition in Form Post Passive beta
10042 HTTPS to HTTP Insecure Transition in Form Post Passive beta
10108 Reverse Tabnabbing Passive beta
10109 Modern Web Application Passive beta
10062 PII Disclosure Passive beta
10050 Retrieved from Cache Passive beta
10036 HTTP Server Response Header Passive beta
10026 HTTP Parameter Override Passive beta
10035 Strict-Transport-Security Header Passive beta
10030 User Controllable Charset Passive beta
10029 Cookie Poisoning Passive beta
10031 User Controllable HTML Element Attribute (Potential XSS) Passive beta
10043 User Controllable JavaScript Event (XSS) Passive beta
10028 Open Redirect Passive beta
10039 X-Backend-Server Header Information Leak Passive beta
10052 X-ChromeLogger-Data (XCOLD) Header Information Leak Passive beta
90022 Application Error Disclosure Passive release 200
10015 Incomplete or No Cache-control Header Set Passive release 525
90011 Charset Mismatch Passive release 436
10055 CSP Passive release 693
10019 Content-Type Header Missing Passive release 345
10010 Cookie No HttpOnly Flag Passive release 1004
90033 Loosely Scoped Cookie Passive release 565
10054 Cookie without SameSite Attribute Passive release 1275
10011 Cookie Without Secure Flag Passive release 614
10098 Cross-Domain Misconfiguration Passive release 264
10017 Cross-Domain JavaScript Source File Inclusion Passive release 829
10202 Absence of Anti-CSRF Tokens Passive release 352
2 Private IP Disclosure Passive release 200
3 Session ID in URL Rewrite Passive release 200
10023 Information Disclosure - Debug Error Messages Passive release 200
10024 Information Disclosure - Sensitive Information in URL Passive release 200
10025 Information Disclosure - Sensitive Information in HTTP Referrer Header Passive release 200
10027 Information Disclosure - Suspicious Comments Passive release 200
10105 Weak Authentication Method Passive release 326
90001 Insecure JSF ViewState Passive release 642
10040 Secure Pages Include Mixed Content Passive release 311
10096 Timestamp Disclosure Passive release 200
10057 Username Hash Found Passive release 284
10032 Viewstate Passive release 642
10061 X-AspNet-Version Response Header Passive release 933
10021 X-Content-Type-Options Header Missing Passive release 693
10056 X-Debug-Token Information Leak Passive release 200
10020 X-Frame-Options Header Passive release 1021
10037 Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) Passive release 200
10094 Base64 Disclosure Passive alpha
10049 Content Cacheability Passive alpha
60001 An example passive scan rule which loads data from a file. Passive alpha
60000 Example Passive Scan Rule: Denial of Service Passive alpha
10009 In Page Banner Information Leak Passive alpha
10110 Dangerous JS Functions Passive alpha
90002 Java Serialization Object Passive alpha
10063 Permissions Policy Header Not Set Passive alpha
90004 Insufficient Site Isolation Against Spectre Vulnerability Passive alpha
10099 Source Code Disclosure Passive alpha
90003 Sub Resource Integrity Attribute Missing Passive alpha
kingthorin+owaspzap
unread,
Dec 3, 2021, 10:50:19 AM
12/3/21
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to OWASP ZAP User Group
The script code isn't perfect but it should give you what you need.
Reply all
Reply to author
Forward
0 new messages