Releases: zaproxy/community-scripts
Releases · zaproxy/community-scripts
v19
Added
- extender/arpSyndicateSubdomainDiscovery.js - uses the API of ARPSyndicate's Subdomain Center
to find and add subdomains to the Sites Tree. - passive/JavaDisclosure.js - Passive scan for Java error messages leaks
- httpsender/RsaEncryptPayloadForZap.py - A script that encrypts requests using RSA
- selenium/FillOTPInMFA.js - A script that fills the OTP in MFA
- authentication/KratosApiAuthentication.js - A script to authenticate with Kratos using the API flow
- authentication/KratosBrowserAuthentication.js - A script to authenticate with Kratos using the browser flow
Changed
- Update minimum ZAP version to 2.15.0.
- Use Prettier to format all JavaScript scripts.
- Update the following scripts to implement the
getMetadata()
function with revised metadata:- active/Cross Site WebSocket Hijacking.js
- active/cve-2019-5418.js
- active/gof_lite.js
- active/JWT None Exploit.js
- active/SSTI.js
- passive/clacks.js
- passive/CookieHTTPOnly.js
- passive/detect_csp_notif_and_reportonly.js
- passive/detect_samesite_protection.js
- passive/f5_bigip_cookie_internal_ip.js
- passive/find base64 strings.js
- passive/Find Credit Cards.js
- passive/Find Emails.js
- passive/Find Hashes.js
- passive/Find HTML Comments.js
- passive/Find IBANs.js
- passive/Find Internal IPs.js
- passive/find_reflected_params.py
- passive/HUNT.py
- passive/Mutliple Security Header Check.js
- passive/google_api_keys_finder.js
- passive/JavaDisclosure.js
- passive/Report non static sites.js
- passive/RPO.js
- passive/s3.js
- passive/Server Header Disclosure.js
- passive/SQL injection detection.js
- passive/Telerik Using Poor Crypto.js
- passive/Upload form discovery.js
- passive/X-Powered-By_header_checker.js
- httpsender/Alert on Unexpected Content Types.js now checks for common content-types (
json
,xml
, andyaml
) more consistently. - targeted/request_to_xml.js no longer uses deprecated method to show the message in the editor dialogue.
v18
Added
- httpsender/RsaSigningForZap.py - A script that signs requests using RSA
Changed
- Update minimum ZAP version to 2.14.0.
- Remove checks for CFU initiator in HTTP Sender scripts and docs, no longer needed.
- Rename AWS signing script.
- Update descriptions/comments in scripts.
- standalone/Open Fortune 500 websites in a browser.zst - Fix typo in
http://www,pbfenergy.com
v17
Added
- targeted/SQLMapCommandGenerator.js - it will generate and copy sqlmap command based on the request
- encode-decode/JwtDecode.js - Decodes JWTs
Changed
- Update minimum ZAP version to 2.12.0:
- Remove compatibility code that provided the singletons (
control
andmodel
) in JavaScript scripts, they can now be accessed directly always. - Use provided singletons (
control
andmodel
) in Python scripts. - Use non-deprecated
HttpSender
constructor. - extender/Simple Reverse Proxy.js - replace usage of deprecated core classes.
- Remove compatibility code that provided the singletons (
- Remove statements that return the message in HTTP Sender scripts, the message passed as parameter is used/sent always.
v16
Added
- httpsender/UpgradeHttp1To2.js - changes all HTTP/1.1 requests to use HTTP/2
- standalone/devTools.js - Tools used to explore objects returned by the Java engine and better plug Nashorn objects into it
Changed
- encode-decode/double-spacer.js - adapted to the functionality of Encoder 1.0.0.
Removed
- standalone/Run report.js - no longer working, the old/deprecated class that it used was removed.
Fixed
- active/User defined attacks.js - correctly escape dot character in some evidence strings.
- targeted/curl_command_generator.js - prevent and warn on local file inclusion when generating the command.
Thanks to James Kettle (@albinowax) for reporting.
v15
Added
- active/RCE.py
- active/SSTI.py
- active/SSTI.js - An active scan script to check for SSTI in 14 different template engines.
- httpfuzzerprocessor/addCacheBusting.js - Fuzzing with cache busting.
- encode-decode
- README.md - Summary of the script type.
- double-spacer.js - A script that inserts a space after every character in a string.
- standalone/SecurityCrawlMazeScore.js
- scan-hooks/LogMessagesHook.py and httpsender/LogMessages.js to help debugging, especially in docker.
Changed
- standalone/enableDebugLogging.js > Updated for more recent logging funtionality.
- Update JS scripts to use passed singleton variables (control, model, view) if available (>= ZAP 2.12.0).
- passive/Server Header Disclosure.js > Updated to check that the Server Header contains something that looks like a semantic version component.
v14
Added
- variant/CompoundCookies.js - An input vector script that handles splitting of compound cookies (Issue 6582).
- active/corsair.py > An active scan script to check for CORS related issues.)
- payloadgenerator/securerandom.js > A fuzzer payload generator script that uses Java's SecureRandom as it's source (related to issue 6892).
- active/bxss.py > an active scan script for inject blind xss payloads to the parameters
v13
Fixed
- targeted/cve-2021-41773-apache-path-trav.js - Set path as escaped so that it's handled properly, set pluginid properly.
v12
Added
- authentication/OfflineTokenRefresh.js - refresh oauth2 offline tokens
- httpsender/AddBearerTokenHeader.js - refresh oauth2 offline tokens
- targeted/WordPress Username Enumeration.js - A targeted script to check for WordPress Username Enumeration via author archives
- targeted/cve-2021-41773-apache-path-trav.js - an active scan script to test for Apache 2.4.49 CVE-2021-41773 path traversal.
Changed
- Update minimum ZAP version to 2.11.0.
v11
Added
- active/Cross Site WebSocket Hijacking.js > an active scan for Cross-Site WebSocket Hijacking vulnerability
- targeted/cve-2021-22214.js > A targeted script to check for Unauthorised SSRF on GitLab - CVE 2021-22214
- httpsender/full-session-n-csrf-nashorn.js > full session and csrf token management.
- httpfuzzerprocessor/unexpected_responses.js > compare response codes to a (pass/fail) regex and generate alerts
- targeted/dns-email-spoofing > Check if DMARC / SPF policies are configured on a domain.
- httpsender/add-more-headers.js > Add caller-specified headers to all requests.
Changed
- Update links in READMEs.
- Update JavaDoc links to latest version.
v10
Added
- standalone/load_context_from_burp -> import context from burp config file
- Passive scan script for finding potential s3 Bucket URLs
- payloadprocessor/to-hex.js > string to hex payload script.
- selenium and session scripts.
- httpfuzzerprocessor/random_x_forwarded_for_ip.js > Set 'X-Forwarded-For' to a random IP value.
- httpfuzzerprocessor/randomUserAgent.js > Set 'User-Agent' to a random user-agent.
- Add the following Payload Processor scripts ported from SQLMap:
- apostrophemask
- apostrophenullencode
- chardoubleencode
- charencode
- charunicodeencode
- equaltolike
- lowercase
- percentage
- randomcase
- space2comments
- Add Google API keys finder script
Changed
- Update minimum ZAP version to 2.10.0.
- Rename reliability to confidence.
- standalone/enableDebugLogging.js > use new Log4j 2 APIs.
- standalone/window_creation_template.js > no longer extend
AbstractFrame
. - httpsender/Alert on HTTP Response Code Errors.js and Alert on Unexpected Content Types.js:
- Check if messages being analyzed are globally excluded or not;
- Ignore check for update messages;
- Include more expected content types.
- httpsender/aws-signing-for-owasp-zap.py > read AWS environment variables for default values.
- active/TestInsecureHTTPVerbs.py and passive/HUNT.py > correct links to OWASP site.
Removed
- standalone/loadListInGlobalVariable.js > superseded by core functionality,
ScriptVars.setGlobalCustomVar(...)
andgetGlobalCustomVar(...)
.
Fixed
- extender/HTTP Message Logger.js > fix typo in Integer constant.