Hi.
Which ZAP version are you using?
The "Remote OS Command Injection" scanner had an issue that caused time
related false positives. [1]
[1]
https://github.com/zaproxy/zaproxy/issues/1592
Best regards.
On 24/06/15 21:13, Albert Z wrote:
> In a recent scan Remote OS Command Injection issues were identified.
> Upon analysis, the OS command "|Timout /T 5" was injected in values that
> are not in any way used on the server. The values are used on the
> browser and sent back because they are part of the model. After the
> request, the response is a 302 Found status code with a link that
> automatically redirects the browser. Using Fiddler I have injected
> several OS commands just to see if any reaction was given by the OS, but
> nothing. The values are not read from the post, they are not used on the
> server side.
>
> If this would be real I would say, yes it is a high severity security
> issue. However, talking it through with the architect there is no way
> that these values are used in OS instructions.
>
> My questions are:
>
> * Why would a 302 response mean that there is an issue?
> * What response does this test expect? What kind of response makes the
> test identify an issue? Where can I find more details about the
> test? A bit more than the text in the report.
> * Without suppressing the test, can ZAP be configured to handle this
> test differently?
>
> Regards,
> Albert
>
> --
> You received this message because you are subscribed to the Google
> Groups "OWASP ZAP User Group" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to
zaproxy-user...@googlegroups.com
> <mailto:
zaproxy-user...@googlegroups.com>.
> For more options, visit
https://groups.google.com/d/optout.