-
-
Notifications
You must be signed in to change notification settings - Fork 431
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Scanner Endpoint ❤️ vuln.json #164
Comments
Hi @bkimminich, I think the idea of having well known vulnerability identifiers (OWASP- or CWE- etc) is amazing and that helps in reducing the mapping of arbitrary keys between systems like ZAP and VulnerableApp/Juice Shop. Regarding not exposing this information using an endpoint, i think Sure it would be great to work on the specification. Actually i was talking with @psiinon a week back about this and i think if we make such a specification then not only for vulnerable apps but any application which wants to effectively use the scanners like ZAP/Burp, can expose the information (may be in testing systems) and scanner's can use this information to find the vulnerabilities. thanks, |
If I understand you correctly, then the goal of I guess that's also why I assume most entries in such a spec file are spoilers to humans, because they contain parts of the expected finding or URL or similar. |
Hi @bkimminich , Oh, got your point. Actually IMO, from scanner perspective finding the Also i think, mostly What do you think ? thanks, |
Hi @bkimminich , I am thinking of adding CWE identifier along with custom vulnerability identifiers. Also please let me know if you have some other suggestions related to thanks, |
CWE would be as cool to have for your /scanner as for my vuln.json approach, sure! |
Hi! I really like your idea of having a kind of manifest of contained vulns in the application. There was actually an attempt to define a "standard" for this driven by https://github.com/OWASP/OWASP-VWAD in 2018 with @psiinon and others but it was dropped due to lack of interest/time/adoption rate/... at some point.
I dug up the artifacts of the
__vulns.json
proposal from the repo:The idea back then was, to have a very simple definition file that only maps some kind of
flag
(could be a URL part or something else that would probably show up in a scanner's finding or report) with atype
of vulnerability where we defined a very limited list of things that scanners might be realistically able to find. At least I think that was the rationale...Now with +2,5 years of experience with the https://github.com/bkimminich/juice-shop project, I would probably do some things a bit different, like rather specifying a known vuln identifier (OWASP-___ or CWE-_____ etc.) than an arbitrary key. Again, something that could easily be found in a scanner's report, so checking it's match rate would be relatively easy.
What I would stick to is having a file (JSON or YAML) in the repo rather than an endpoint to provide this information to the scanner. It can also be retrieved via HTTP-GET from GitHub but it would not spoiler all vulns too easily for human users of the vulnapp.
If you're interested in working out a shared specification, I would consider adding such a file to the Juice Shop as well. And maybe we could motivate others to do the same then.
The text was updated successfully, but these errors were encountered: