From 11ea37ac32d796d2de59e4ce9fa0e7087b08afde Mon Sep 17 00:00:00 2001 From: timisenco2015 Date: Wed, 12 Jul 2023 22:39:16 +0000 Subject: [PATCH] =?UTF-8?q?Deploying=20to=20zap-scan=20from=20@=20bcgov/co?= =?UTF-8?q?mmon-hosted-form-service@0cb5ede1d39ccdf749cc71c148e820e8336ae2?= =?UTF-8?q?15=20=F0=9F=9A=80?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- report_html.html | 6 +++--- report_json.json | 20 ++++++++++---------- report_md.md | 4 ++-- 3 files changed, 15 insertions(+), 15 deletions(-) diff --git a/report_html.html b/report_html.html index b8e2c1a29..2ae5ac66a 100644 --- a/report_html.html +++ b/report_html.html @@ -127,7 +127,7 @@

- Generated on Wed, 12 Jul 2023 22:21:18 + Generated on Wed, 12 Jul 2023 22:39:11

@@ -1867,7 +1867,7 @@

Alert Detail

Evidence - f40fa87843e0b7a9121e6f431faf1bd2 + 42cd29436ef1184a7265565bc536e783 @@ -1893,7 +1893,7 @@

Alert Detail

Evidence - f40fa87843e0b7a9121e6f431faf1bd2 + 42cd29436ef1184a7265565bc536e783 diff --git a/report_json.json b/report_json.json index 726a4ba9a..56f557bc6 100644 --- a/report_json.json +++ b/report_json.json @@ -1,7 +1,7 @@ { "@programName": "OWASP ZAP", "@version": "2.13.0", - "@generated": "Wed, 12 Jul 2023 22:21:18", + "@generated": "Wed, 12 Jul 2023 22:39:11", "site":[ { "@name": "https://chefs-dev.apps.silver.devops.gov.bc.ca", @@ -85,7 +85,7 @@ "reference": "

https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy

https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html

http://www.w3.org/TR/CSP/

http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html

http://www.html5rocks.com/en/tutorials/security/content-security-policy/

http://caniuse.com/#feat=contentsecuritypolicy

http://content-security-policy.com/

", "cweid": "693", "wascid": "15", - "sourceid": "9" + "sourceid": "8" }, { "pluginid": "10020", @@ -147,7 +147,7 @@ "reference": "

https://tools.ietf.org/html/rfc7231#section-5.1.2

", "cweid": "200", "wascid": "45", - "sourceid": "766" + "sourceid": "620" }, { "pluginid": "10054", @@ -225,7 +225,7 @@ "reference": "

https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Feature-Policy

https://developers.google.com/web/updates/2018/06/feature-policy

https://scotthelme.co.uk/a-new-security-header-feature-policy/

https://w3c.github.io/webappsec-feature-policy/

https://www.smashingmagazine.com/2018/12/feature-policy/

", "cweid": "693", "wascid": "15", - "sourceid": "9" + "sourceid": "8" }, { "pluginid": "10037", @@ -311,7 +311,7 @@ "reference": "

https://cheatsheetseries.owasp.org/cheatsheets/HTTP_Strict_Transport_Security_Cheat_Sheet.html

https://owasp.org/www-community/Security_Headers

http://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security

http://caniuse.com/stricttransportsecurity

http://tools.ietf.org/html/rfc6797

", "cweid": "319", "wascid": "15", - "sourceid": "9" + "sourceid": "8" }, { "pluginid": "10021", @@ -373,7 +373,7 @@ "reference": "

http://projects.webappsec.org/Fingerprinting

", "cweid": "200", "wascid": "45", - "sourceid": "871" + "sourceid": "723" }, { "pluginid": "10109", @@ -451,7 +451,7 @@ "reference": "

https://tools.ietf.org/html/rfc7234

https://tools.ietf.org/html/rfc7231

http://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html (obsoleted by rfc7234)

", "cweid": "524", "wascid": "13", - "sourceid": "9" + "sourceid": "8" }, { "pluginid": "10015", @@ -495,7 +495,7 @@ "method": "GET", "param": "aa9bcdf2aa172bd4923c79a2c4e51d8e", "attack": "", - "evidence": "f40fa87843e0b7a9121e6f431faf1bd2", + "evidence": "42cd29436ef1184a7265565bc536e783", "otherinfo": "\ncookie:aa9bcdf2aa172bd4923c79a2c4e51d8e" }, { @@ -503,7 +503,7 @@ "method": "GET", "param": "aa9bcdf2aa172bd4923c79a2c4e51d8e", "attack": "", - "evidence": "f40fa87843e0b7a9121e6f431faf1bd2", + "evidence": "42cd29436ef1184a7265565bc536e783", "otherinfo": "\ncookie:aa9bcdf2aa172bd4923c79a2c4e51d8e" } ], @@ -655,7 +655,7 @@ "reference": "

https://owasp.org/wstg

", "cweid": "0", "wascid": "0", - "sourceid": "535" + "sourceid": "389" } ] } diff --git a/report_md.md b/report_md.md index 2c24910a8..e636eae8c 100644 --- a/report_md.md +++ b/report_md.md @@ -624,12 +624,12 @@ The given response has been identified as containing a session management token. * Method: `GET` * Parameter: `aa9bcdf2aa172bd4923c79a2c4e51d8e` * Attack: `` - * Evidence: `f40fa87843e0b7a9121e6f431faf1bd2` + * Evidence: `42cd29436ef1184a7265565bc536e783` * URL: https://chefs-dev.apps.silver.devops.gov.bc.ca/pr-874 * Method: `GET` * Parameter: `aa9bcdf2aa172bd4923c79a2c4e51d8e` * Attack: `` - * Evidence: `f40fa87843e0b7a9121e6f431faf1bd2` + * Evidence: `42cd29436ef1184a7265565bc536e783` Instances: 2