Taras,

On Fri, Mar 23, 2012 at 4:29 PM, Andres Riancho
<andres.rian...@gmail.com> wrote:
> Taras,
>
> On Tue, Mar 20, 2012 at 5:07 PM, Taras <ox...@oxdef.info> wrote:
>> Hi, all!
>>
>> I have proposal to add references to KB vuln object. For example for XSS
>> we can add references to:
>>
>> * CWE-79: Improper Neutralization of Input During Web Page Generation
>> ('Cross-site Scripting')
>> * OWASP: https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
>>
>> in xss.py it will looks like:
>> -------------------------------------------
>> v = vuln.vuln(mutant)
>> v.setPluginName(self.getName())
>> v.setId(response.id)
>> v.setName('Cross site scripting vulnerability')
>> v.setSeverity(severity.MEDIUM)
>> v.addReference('OWASP',
>> 'https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)')
>> v.addReference('CWE-79: Improper Neutralization of Input During Web Page
>> Generation',
>> 'http://cwe.mitre.org/data/definitions/79.html')
>> msg = 'Cross Site Scripting was found at: ' + mutant.foundAt()
>> msg += ' This vulnerability affects ' + ','.join(mutant.affected_browsers)
>> v.setDesc(msg)
>> v.addToHighlight(mod_value)
>> kb.kb.append(self, 'xss', v)
>> -------------------------------------------
>> we can use this additional information then in output plugins.
>> What do you think about it?
>
>    I think its a great idea! I would implement it in another way,
> because in a future we'll also want to add a long description to the
> vulnerability, recommendations for fixing, etc. and it doesn't sound
> like that info should be in the middle of the code. This was something
> that was already tackled a while ago and never got to trunk. The code
> is available here [0] , maybe we can steal some ideas from there. What
> do you think about this? [1] Maybe we should split this into different
> XML files, change the code a little bit and we're done?

    Will you work on this proposal?

> [0] http://sourceforge.net/apps/trac/w3af/browser/branches/rickybobby
> [1] 
> http://sourceforge.net/apps/trac/w3af/browser/branches/rickybobby/core/data/vulnReferences
>
> Regards,
>
>> --
>> Taras
>> http://oxdef.info
>>
>> ------------------------------------------------------------------------------
>> This SF email is sponsosred by:
>> Try Windows Azure free for 90 days Click Here
>> http://p.sf.net/sfu/sfd2d-msazure
>> _______________________________________________
>> W3af-develop mailing list
>> W3af-develop@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/w3af-develop
>
>
>
> --
> Andrés Riancho
> Director of Web Security at Rapid7 LLC
> Founder at Bonsai Information Security
> Project Leader at w3af



-- 
Andrés Riancho
Project Leader at w3af - http://w3af.org/
Web Application Attack and Audit Framework

------------------------------------------------------------------------------
Better than sec? Nothing is better than sec when it comes to
monitoring Big Data applications. Try Boundary one-second 
resolution app monitoring today. Free.
http://p.sf.net/sfu/Boundary-dev2dev
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to