When running an Active scanner against my 'test' Web App Environment is it possible for a SQL Injection attack to alter tables in schemas other than the ones used with the DB connection object defined in the Web App itself?
If yes, my concern would be that a ZAP Active Scan could alter our production schemas on our IBM i midrange system.
Looking at the Default Scan Policy and the Injection Tests what Threshold and Strength settings would you recommend for the SQL Injection and XSS Active Scan Attack?
The IBM i uses a Library/Schema List to create a container that a job runs in.
It's a top down approach where when a job requests to access an object the Library/Schema List is searched top-down until the first occurrence of the object is found and used.
This limits the scope of the job to only be able to access objects within the job's Library/Schema list.
Will the ZAP SQL Injection Test be confined to only attack database Files/Tables within the Libraries/Schemas used in the DB Connection routine?
Same goes for XSS. If the ZAP active scan does inject a malicious script within one of the 'Test' Web App *.JS scripts will that be confined to the JS Script source under the www/htdocs/…
Below is the Virtual Host entry from the Apache Web Server spraying the Zend App Server:
Could XSS attacks alter the existing JS scripts in my Web App or would they only potentially be added - stored on our IBM i server ( Stored XSS Attacks)
Listen *:199999
NameVirtualHost *:199999
<VirtualHost *:10089>
# RedirectMatch ^/$ /ZendServer/
ServerName
plinktst.polarbev.com DocumentRoot
/usr/local/MyWebApp_test_php7/public/ <Directory /usr/local/polarlink_test_php7>
Options FollowSymLinks
AllowOverride None
order allow,deny
Allow from all
</Directory>
<Directory "
/usr/local/MyWebApp_test_php7/public">
AllowOverride All
order allow,deny
Allow from all
</Directory>
</VirtualHost>
The data in the Libraries/Schemas used by this 'test' Web App environment are rebuilt/refreshed weekly so a SQL Injection Attack altering them is not a concern.
Could a SQL Injection attack potentially drop a File/Table within the 'Test' Libraries/Schemas that the test Web App is pointed at?
If yes, then that is ok if the SQL Injection Attack is confined to the test libraries/schemas that the Test Web App environment is pointed at.
Could you please suggest what precautions I should take prior to running a ZAP Active Scan on my 'Test Environment' PHP Web App.