souro1212 / JSON-XML-things

Validate , format and convert JSON & XML locally
https://json-xml-things.souradip.in/
MIT License
1 stars 0 forks source link

ZAP Full Scan Report #17

Open github-actions[bot] opened 1 year ago

github-actions[bot] commented 1 year ago

View the following link to download the report. RunnerID:4651651322

secure-code-warrior-for-github[bot] commented 1 year ago

Micro-Learning Topic: Clickjack (Detected by phrase)

Matched on "clickjack"

What is this? (2min video)

Clickjacking, which is also called UI redressing, is a trick which places an invisible panel or an identical control overlay in front of an existing application. The user clicking on that control or page is then used to perform some other action on behalf of that user i.e. Liking a social media page or posting a tweet. The click is then also passed on to the underlying application and the user is unaware that their identity has been misused.

Try a challenge in Secure Code Warrior

Micro-Learning Topic: Cross-site request forgery (Detected by phrase)

Matched on "CSRF"

What is this? (2min video)

Session-related but not session-based, this attack is based on the ability of an attacker to force an action on a user’s browser (commonly in the form of a POST request) to perform an unauthorized action on behalf of the user. This can often occur without the user even noticing it… or only noticing when it is too late. The root cause is that browsers automatically send session cookies with all requests to a given domain, regardless of where the source of the request came from, and the application server cannot differentiate between a request that came from pages it served or a request that came from an unrelated page.

Try a challenge in Secure Code Warrior

Helpful references

Micro-Learning Topic: Information disclosure (Detected by phrase)

Matched on "Information Disclosure"

Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

Try a challenge in Secure Code Warrior

github-actions[bot] commented 1 year ago

View the following link to download the report. RunnerID:4988914178

github-actions[bot] commented 1 year ago

View the following link to download the report. RunnerID:5239783742