Closed gabriele-costa closed 10 months ago
The following issues were identified:
I’m confused is this a target for learning or a tool to scan things?
If the later this is not the place to add it.
Yes, that is quite an unusual perspective :). DVAS is an intentionally vulnerable web scanner that is meant to demonstrate and teach about "responsive" attacks. Basically, when someone makes a scan, she/he might become the target of a counterattack if a vulnerable scanner is used. Understanding this attack scenario is subtle and DVAS comes with an attack tool (called revok) that one can use to see the attack in action. However, the attack should be done manually when the goal is education/awareness.
@gabriele-costa nice research! OK for us (ZAP team) to reference it? If so is that the best URL for us to use?
And any more feedback on your ZAP testing would be appreciated, e.g. details of the 4 tained flows..
@psiinon Thank you! Yes, we would be very glad about that. Here are more details about the attacker model and vulnerabilities we found.
Let me know if I can provide further details
And any more feedback on your ZAP testing would be appreciated, e.g. details of the 4 tained flows..
I'm checking this out
And any more feedback on your ZAP testing would be appreciated, e.g. details of the 4 tained flows..
Here we are. We found 4 tainted flows (but no actual vulnerability) with destination in the HTML report exported by ZAP. In particular, the following HTTP response headers were included: X-Powered-By, Location, X-Content-Type, and X-AspNet-Version. These results refer to tests that were carried out in 2020, thus they might be different now. Also, if I'm not wrong, the reporting system of ZAP might have changed in the meantime. However, since HTML reports can still be exported, RevOK could be used to repeat the experiments. If you are interested, we can provide help and support on this.
Thanks. Any of the authors have twitter accounts I can mention?
Thanks. Any of the authors have twitter accounts I can mention?
Andrea has one https://twitter.com/avalz_
DVAS contains a collection of web-based (vulnerable) security scanners, including (but not limited to) the vulnerabilities from "Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners". DVAS also contains a simulation of CVE-2020-7354 and CVE-2020-7355 for Metasploit Pro.