Ok, you win :) We will show all requests to the user. On 04/23/2012 03:31 PM, Andres Riancho wrote: > Taras, > > On Mon, Apr 23, 2012 at 8:21 AM, Taras<ox...@oxdef.info> wrote: >> Andres, >> >> >>>>> If we analyze 5 (self._vuln_limit = 5) and those 5 don't have >>>>> protection, that doesn't mean that all don't implement it. >>>> >>>> >>>> Agree, but please re-read this piece of code. There is no >>>> self._vuln_limit >>>> checks here. >>> >>> >>> Yes, but self._vuln_count size strictly depends on self._vuln_limit >> >> >> No, that I'm trying to prove you! Please re-read logic of grep method. :) > > OHHHH! Now I get it! self._vulns is strictly related, not self._vuln_count! > > 55 if len(self._vulns)<= self._vuln_limit\ > 56 and response.getURL() not in self._vulns: > 57 self._vulns.append(response.getURL()) > > All right, now it all makes more sense. With this new information, I > still think that we should give the user the complete knowledge of > which URLs are vulnerable. Lets think about a use case: > > - User runs w3af and finds that some URLs in his site (a,b,c,d,e) are > vulnerable to clickJacking > - User sends email to developers to fix the vuln in (a,b,c,d,e) > - User runs w3af to verify the fix and now finds that his site is > vulnerable to clickJacking but now in URLs (x,y,z,w,j) > - User sends email to developers to fix the vuln in (x,y,z,w,j) > - User runs w3af to verify the fix and now finds that his site is > vulnerable to clickJacking but now in URLs (k,l,m,n,o) > - User hates w3af :) > >> >>>>> I would completely remove "self._vuln_limit" as it doesn't make >>>>> logical sense to only analyze "a section of the application" if we can >>>>> analyze all of it. Also, by removing "self._vuln_limit" you'll see >>>>> that the memory usage of "self._vulns = []" will grow linearly with >>>>> the application's size (if there is no protection) which is no good, >>>>> so I recommend using a temp_shelve. >>>> >>>> >>>> Hmm, the aim of self._vuln_limit is mostly to make report easy to read. >>>> If >>>> 15 or more requests are vulnerable do we need to store and show all these >>>> 15 >>>> requests to the user? >>> >>> >>> We're reporting two vulnerabilities: >>> * All are vulnerable, in which case we don't even need to add URLs >>> since *all* are vulnerable >>> * Some are vulnerable, in which case we should print all URLs in >>> the vulnerability description (annoying in some cases... but needed in >>> my opinion). >> >> All or not all - it is discussable. Let's for the first make single >> conclusion about self._vuln_count and self._vuln_limit. >> >> >> >> >> >> -- >> Taras >> http://oxdef.info > > >
-- Taras http://oxdef.info ------------------------------------------------------------------------------ For Developers, A Lot Can Happen In A Second. Boundary is the first to Know...and Tell You. Monitor Your Applications in Ultra-Fine Resolution. Try it FREE! http://p.sf.net/sfu/Boundary-d2dvs2 _______________________________________________ W3af-develop mailing list W3af-develop@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/w3af-develop