Yes, probably in this case more information would be good.
ZAP is really helpful and most of the errors are self explanatory and I had no problem tracking down the causes. Looking at an issue, its details, attack URLs or the request / response makes it usually quite obvious what to do.
Out of 15 issues I only had problems with two and one of them was
immediately fixed after posting it here.
So this remaining one is a tough nut to crack.
- At first I did check the server side quite intensively. Since it is a client side thing it obviously didn't help
- I searched the web and did find some
infos but also unanswered questions (e.g.
here)
- then I analyzed what '#' inside a link means, which led me to "fragments". This would have been helpful in the description of the error.
- then I intensively tried to reproduce the error but I couldn't. Probably modern browsers prevent such things from happening (and I tried like 15 different browsers/browser versions)
- It felt like a ZAP bug that the request/response section was empty (my above screenshots) and also that later the attack-string in the URL is missing (is irritating).
- then I posted here and kingthorin suggested to install the juice-shop and let ZAP run against it. I did however the DOM-XSS wasn't found. Maybe I need to crawl better...
- he also suggested that a click might be necessary - which was the helpful hint. I created a test page and then I was able to trigger the error for the first time (even though the code has nothing to do with our application). But my example helped me to see that this might be an actual issue...
So what can be improved?
- the error description. E.g. mentioning the whole fragments / Clientside thing
- the request/response "suddenly" is empty or shows not all the information (but in many other cases it did and is thus a valuable place for info) => Some advice that this can be the case would be good.
- the issue was reported by ZAP, so it did react to something (e.g. javascript execution?) and whatever it was, it would be helpful if it could be made more transparent somehow?
- the "source" page/link where those ZAP identified vulnerable links are used, would be helpful. (The actual link ZAP reported does not contain any HTML/JS in our case). I kind of narrowed it down by stopping the active scan shortly after the error appeared and then I checked the links in the ZAP console.