+w3af-dev

Hi and thanks for interesting idea!

Andres, what do you think? Can we add appending payload to value 
*optionally*? The main problem, imho, is we in this case we need this 
opportunity to all audit plugins. Not only XSS.


P.S. Achim, nice User-Agent ;)

10.03.2012 02:36, Achim Hoffmann пишет:
> Hi Andrés, Taras,
>
> found a case where w3af failed to detect any XSS payload, even the
> application is vulnerable to (all) most.
> The reason seems to be that w3af replaces the value in a key=value
> parameter completely. But the application is only vulnerable if the
> value contains at least something useful.
>
> Example original parameter:
>       key=value
>
> w3af then builds payloads like:
>       key=d'kc"z'gj'"**5*(((;-*`)
>       key=d'z"0
>       key=<!--
>
> none of them triggerd XSS, it should be at least:
>       key=valued'kc"z'gj'"**5*(((;-*`)
>       key=valued'z"0
>       key=value<!--
>
> In my test case even above would not detect XSS 'cause i.e.:
>       key=value'><u>xss
>       key=value"><u>xss
>       key=value"onmouseover=alert(5);
>
> is not tested.
>
> This issue is interrresting 'cause we discussed it in the mailinglist
>     Subject: [W3af-develop] XSS ideas
> (see for example my mail on 16 feb 2012)
>
>
> IIRC the reason why w3af does not use more payloads is to reduce the
> amount of requests.
> I guess my examples prove that this approach results in false negatives.
>
>
> Hope this helps to improve w3af.
> Achim


-- 
Taras
http://oxdef.info

------------------------------------------------------------------------------
Virtualization & Cloud Management Using Capacity Planning
Cloud computing makes use of virtualization - but cloud computing 
also focuses on allowing computing to be delivered as a service.
http://www.accelacomm.com/jaw/sfnl/114/51521223/
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to