Taras,

On Mon, Apr 23, 2012 at 8:21 AM, Taras <ox...@oxdef.info> wrote:
> Andres,
>
>
>>>>     If we analyze 5 (self._vuln_limit = 5) and those 5 don't have
>>>> protection, that doesn't mean that all don't implement it.
>>>
>>>
>>> Agree, but please re-read this piece of code. There is no
>>> self._vuln_limit
>>> checks here.
>>
>>
>> Yes, but self._vuln_count size strictly depends on self._vuln_limit
>
>
> No, that I'm trying to prove you! Please re-read logic of grep method. :)

OHHHH! Now I get it! self._vulns is strictly related, not self._vuln_count!

55              if len(self._vulns) <= self._vuln_limit\
56                      and response.getURL() not in self._vulns:
57                  self._vulns.append(response.getURL())

All right, now it all makes more sense. With this new information, I
still think that we should give the user the complete knowledge of
which URLs are vulnerable. Lets think about a use case:

- User runs w3af and finds that some URLs in his site (a,b,c,d,e) are
vulnerable to clickJacking
- User sends email to developers to fix the vuln in (a,b,c,d,e)
- User runs w3af to verify the fix and now finds that his site is
vulnerable to clickJacking but now in URLs (x,y,z,w,j)
- User sends email to developers to fix the vuln in (x,y,z,w,j)
- User runs w3af to verify the fix and now finds that his site is
vulnerable to clickJacking but now in URLs (k,l,m,n,o)
- User hates w3af :)

>
>>>>     I would completely remove "self._vuln_limit" as it doesn't make
>>>> logical sense to only analyze "a section of the application" if we can
>>>> analyze all of it. Also, by removing "self._vuln_limit" you'll see
>>>> that the memory usage of "self._vulns = []" will grow linearly with
>>>> the application's size (if there is no protection) which is no good,
>>>> so I recommend using a temp_shelve.
>>>
>>>
>>> Hmm, the aim of self._vuln_limit is mostly to make report easy to read.
>>> If
>>> 15 or more requests are vulnerable do we need to store and show all these
>>> 15
>>> requests to the user?
>>
>>
>> We're reporting two vulnerabilities:
>>     * All are vulnerable, in which case we don't even need to add URLs
>> since *all* are vulnerable
>>     * Some are vulnerable, in which case we should print all URLs in
>> the vulnerability description (annoying in some cases... but needed in
>> my opinion).
>
> All or not all - it is discussable. Let's for the first make single
> conclusion about self._vuln_count and self._vuln_limit.
>
>
>
>
>
> --
> Taras
> http://oxdef.info



-- 
Andrés Riancho
Project Leader at w3af - http://w3af.org/
Web Application Attack and Audit Framework

------------------------------------------------------------------------------
For Developers, A Lot Can Happen In A Second.
Boundary is the first to Know...and Tell You.
Monitor Your Applications in Ultra-Fine Resolution. Try it FREE!
http://p.sf.net/sfu/Boundary-d2dvs2
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to