Hans,

That's perfect man! The only improvement that I would suggest is based
on the fact that (as you may already know) there can be more than one
request/response associated with a vulnerability, so instead of:

                details = self._history.read(i.getId()[0])
                <store details to XML>

You should have something like:

                for request_id in i.getId():
                    details = self._history.read( request_id )
                    <store details to XML>

Also, the XSD file should be updated. Do you think you could do that? Thanks!

Regards,

On Fri, Jul 1, 2011 at 2:25 PM, Hans-Martin Münch
<hansmartin.mue...@googlemail.com> wrote:
> Hi
>
> I did the "request/response" thing just yesterday night. Please see the
> attached file (needs some additional testing, and I'm definitely no python
> pro ;-) )
>
> Regards
>
> Hans-Martin
>
> 2011/7/1 Adrien de Beaupre <adrie...@gmail.com>
>>
>> Hi,
>>
>> I would like to suggest the following enhancements to the XML output
>> report.
>>
>> 1- In the w3afrun element add an attribute with the current w3af
>> version as follows:
>> <w3afrun start="1302267277" startstr="Fri Apr 08 08:54:37 2011"
>> xmloutputversion="1.00" version" 1.1 (from SVN server)" build"r4349">
>>
>> 2 - In the vulnerability element add the HTTP request and response for
>> each discovered issue as follows:
>>    <vulnerability id="[15006]" method="POST" name="SQL injection
>> vulnerability" plugin="sqli" severity="High"
>> url="http://crackme.cenzic.com/Kelev/view/updateloanrequest.php";
>> var="txtAnnualIncome">
>>        SQL injection in a MySQL database was found at: ,
>>
>> &quot;http://crackme.cenzic.com/Kelev/view/updateloanrequest.php&quot;using
>> HTTP method POST. The sent post-data was:
>> &quot;...txtAnnualIncome=d'z&quot;0...&quot;. This vulnerability was
>> found in the request with id 15006.
>>           <httprequest>...
>>           </httprequest>
>>           <httpresponse>...
>>           </httpresponse>
>>    </vulnerability>
>>
>> Cheers,
>> Adrien
>>
>>
>> ------------------------------------------------------------------------------
>> All of the data generated in your IT infrastructure is seriously valuable.
>> Why? It contains a definitive record of application performance, security
>> threats, fraudulent activity, and more. Splunk takes this data and makes
>> sense of it. IT sense. And common sense.
>> http://p.sf.net/sfu/splunk-d2d-c2
>> _______________________________________________
>> W3af-develop mailing list
>> W3af-develop@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/w3af-develop
>
>
> ------------------------------------------------------------------------------
> All of the data generated in your IT infrastructure is seriously valuable.
> Why? It contains a definitive record of application performance, security
> threats, fraudulent activity, and more. Splunk takes this data and makes
> sense of it. IT sense. And common sense.
> http://p.sf.net/sfu/splunk-d2d-c2
> _______________________________________________
> W3af-develop mailing list
> W3af-develop@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/w3af-develop
>
>



-- 
Andrés Riancho
Director of Web Security at Rapid7 LLC
Founder at Bonsai Information Security
Project Leader at w3af

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to