-
Updated
Jul 21, 2021 - Python
owasp
Here are 432 public repositories matching this topic...
-
Updated
Nov 11, 2020
-
Updated
Jul 20, 2021 - Python
-
Updated
Jul 19, 2021 - Go
⭐ Challenge idea
Description
Several users originally missing security question answers - most notably bjoern.k
-
Updated
Apr 12, 2021 - PHP
What would you like to happen?
The sections 4.7.11.1 Testing for Local File Inclusion & 4.7.11.2 Testing for Remote File Inclusion address two attack vectors that are very similar one to the other. Given this situation and the few documentation on the Remote injection one, my proposal would be to merge both in a single section called Testing for File Injection.
-
Updated
Jun 30, 2021 - Ruby
-
Updated
Jul 17, 2021 - Go
-
Updated
Dec 30, 2020 - Python
Slack us first!
Hello. I write about problem here:
https://owasp.slack.com/archives/C2P5BA8MN/p1624892081234100
Be informative
As additional into slack I find the same behaviour with Risk Accepted findings. Into Metrics I see 0 Risk Accepted findings, but I have 1 Risk Accepted finding
Bug description
No error. Metrics into product, or metrics dushboard has incorrect info
Description
BeanUtils is a library that is doing automatic mapping to Java object.
It can cause arm when the attack controls part of the list of properties being sets. BeanUtils does not blacklist properties like class, classloader or other objects that are likely to load arbitrary classes and possibly run code.
Code
import org.apache.commons.beanutils.BeanUtils;
public
-
Updated
Jul 14, 2021 - JavaScript
-
Updated
Jul 22, 2021 - Python
-
Updated
Jul 5, 2021 - HTML
-
Updated
Jul 22, 2021 - C
-
Updated
Jul 22, 2021 - Python
-
Updated
Oct 1, 2020
Current Behavior:
When viewing vulns in the Audit Vulnerabilities tab. the Analysis column appears to contain code (enum?) names, e.g. NOT_SET, FALSE_POSITIVE. This problem also occurs in Policy Violations tab.
Steps to Reproduce:
Open the Audit Vulnerabilities tab.
Expected Behavior:
The Analysis column contains language specific analysis values, e.g. Not Set, False Positive
-
Updated
Jul 13, 2021 - Raku
-
Updated
Feb 24, 2021 - Python
-
Updated
Jul 22, 2021 - Java
-
Updated
Jul 18, 2021
https://github.com/OWASP/www-community/blob/master/pages/CRV2_AppThreatModeling.md
Contains a bunch of HTML based tables that need attention. They did not auto-migrate well and at a certain point break the rendering of the majority of the page.
Improve this page
Add a description, image, and links to the owasp topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the owasp topic, visit your repo's landing page and select "manage topics."
Decimal numbers like
52.5702100309281,
trigger the PII scan rule, and they shouldnt.Example page: https://www.discoverireland.ie/limerick/glin-heritage-trails-knight-s-walk
They could be excluded using a similar check to https://github.com/zaproxy/zap-extensions/blob/master/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PiiScanRule.java#L118-L139
cc @HugoBar