Ben,

Please read inline,

On Mon, Jul 7, 2014 at 7:15 PM, Ben Kirk <davidbenk...@gmail.com> wrote:
> hi all,
> I may be misreading my scan output results, but I get the following and when
> I check all of these specific IDs they are for redirects like 302 or a 404.
> Should this even be reported for HTTP responses that are not really content
> for the user (like a normal 200 with HTML content)
>
> Is this something that can be filtered out? asking because I need to report
> these in our monthly deployments to production to our security team and I
> don't want to raise any unnecessary flags. I'm using the latest build in git
> as of today.
>
> However if these are truly issues I should fix I'm open to that.
>
> thanks for any discussion on this.
>
> [Mon Jul  7 22:06:42 2014 - vulnerability] The whole target web application
> has no protection (Pragma and Cache-Control headers) against sensitive
> content caching. This vulnerability was found in the requests with ids 16,
> 36, 42 to 43 and 50.

Well, you raise an interesting point. I agree that it doesn't make
sense for these to be checked against 30x. I would be more than happy
to receive a pull-request which adds a check around here [0] for the
30x codes. Actually, believe it or not, that if in [0] was intended to
match that situation, but it wasn't a complete solution since some 30x
do have response bodies.

RE: 404 codes, I believe that cache_control.py can't simply say: "we
don't care about them". Some 404 pages do have some private
information (at least the email address of the user?)

Does this make sense? Do you have the time to send me that small PR?

[0] 
https://github.com/andresriancho/w3af/blob/master/w3af/plugins/grep/cache_control.py#L58

> ------------------------------------------------------------------------------
> Open source business process management suite built on Java and Eclipse
> Turn processes into business applications with Bonita BPM Community Edition
> Quickly connect people, data, and systems into organized workflows
> Winner of BOSSIE, CODIE, OW2 and Gartner awards
> http://p.sf.net/sfu/Bonitasoft
> _______________________________________________
> W3af-users mailing list
> W3af-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/w3af-users
>



-- 
Andrés Riancho
Project Leader at w3af - http://w3af.org/
Web Application Attack and Audit Framework
Twitter: @w3af
GPG: 0x93C344F3

------------------------------------------------------------------------------
Open source business process management suite built on Java and Eclipse
Turn processes into business applications with Bonita BPM Community Edition
Quickly connect people, data, and systems into organized workflows
Winner of BOSSIE, CODIE, OW2 and Gartner awards
http://p.sf.net/sfu/Bonitasoft
_______________________________________________
W3af-users mailing list
W3af-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to