Taras, On Mon, Apr 23, 2012 at 8:21 AM, Taras <ox...@oxdef.info> wrote: > Andres, > > >>>> If we analyze 5 (self._vuln_limit = 5) and those 5 don't have >>>> protection, that doesn't mean that all don't implement it. >>> >>> >>> Agree, but please re-read this piece of code. There is no >>> self._vuln_limit >>> checks here. >> >> >> Yes, but self._vuln_count size strictly depends on self._vuln_limit > > > No, that I'm trying to prove you! Please re-read logic of grep method. :)
OHHHH! Now I get it! self._vulns is strictly related, not self._vuln_count! 55 if len(self._vulns) <= self._vuln_limit\ 56 and response.getURL() not in self._vulns: 57 self._vulns.append(response.getURL()) All right, now it all makes more sense. With this new information, I still think that we should give the user the complete knowledge of which URLs are vulnerable. Lets think about a use case: - User runs w3af and finds that some URLs in his site (a,b,c,d,e) are vulnerable to clickJacking - User sends email to developers to fix the vuln in (a,b,c,d,e) - User runs w3af to verify the fix and now finds that his site is vulnerable to clickJacking but now in URLs (x,y,z,w,j) - User sends email to developers to fix the vuln in (x,y,z,w,j) - User runs w3af to verify the fix and now finds that his site is vulnerable to clickJacking but now in URLs (k,l,m,n,o) - User hates w3af :) > >>>> I would completely remove "self._vuln_limit" as it doesn't make >>>> logical sense to only analyze "a section of the application" if we can >>>> analyze all of it. Also, by removing "self._vuln_limit" you'll see >>>> that the memory usage of "self._vulns = []" will grow linearly with >>>> the application's size (if there is no protection) which is no good, >>>> so I recommend using a temp_shelve. >>> >>> >>> Hmm, the aim of self._vuln_limit is mostly to make report easy to read. >>> If >>> 15 or more requests are vulnerable do we need to store and show all these >>> 15 >>> requests to the user? >> >> >> We're reporting two vulnerabilities: >> * All are vulnerable, in which case we don't even need to add URLs >> since *all* are vulnerable >> * Some are vulnerable, in which case we should print all URLs in >> the vulnerability description (annoying in some cases... but needed in >> my opinion). > > All or not all - it is discussable. Let's for the first make single > conclusion about self._vuln_count and self._vuln_limit. > > > > > > -- > Taras > http://oxdef.info -- Andrés Riancho Project Leader at w3af - http://w3af.org/ Web Application Attack and Audit Framework ------------------------------------------------------------------------------ For Developers, A Lot Can Happen In A Second. Boundary is the first to Know...and Tell You. Monitor Your Applications in Ultra-Fine Resolution. Try it FREE! http://p.sf.net/sfu/Boundary-d2dvs2 _______________________________________________ W3af-develop mailing list W3af-develop@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/w3af-develop