Ok, you win :)
We will show all requests to the user.

On 04/23/2012 03:31 PM, Andres Riancho wrote:
> Taras,
>
> On Mon, Apr 23, 2012 at 8:21 AM, Taras<ox...@oxdef.info>  wrote:
>> Andres,
>>
>>
>>>>>      If we analyze 5 (self._vuln_limit = 5) and those 5 don't have
>>>>> protection, that doesn't mean that all don't implement it.
>>>>
>>>>
>>>> Agree, but please re-read this piece of code. There is no
>>>> self._vuln_limit
>>>> checks here.
>>>
>>>
>>> Yes, but self._vuln_count size strictly depends on self._vuln_limit
>>
>>
>> No, that I'm trying to prove you! Please re-read logic of grep method. :)
>
> OHHHH! Now I get it! self._vulns is strictly related, not self._vuln_count!
>
> 55            if len(self._vulns)<= self._vuln_limit\
> 56                    and response.getURL() not in self._vulns:
> 57                self._vulns.append(response.getURL())
>
> All right, now it all makes more sense. With this new information, I
> still think that we should give the user the complete knowledge of
> which URLs are vulnerable. Lets think about a use case:
>
> - User runs w3af and finds that some URLs in his site (a,b,c,d,e) are
> vulnerable to clickJacking
> - User sends email to developers to fix the vuln in (a,b,c,d,e)
> - User runs w3af to verify the fix and now finds that his site is
> vulnerable to clickJacking but now in URLs (x,y,z,w,j)
> - User sends email to developers to fix the vuln in (x,y,z,w,j)
> - User runs w3af to verify the fix and now finds that his site is
> vulnerable to clickJacking but now in URLs (k,l,m,n,o)
> - User hates w3af :)
>
>>
>>>>>      I would completely remove "self._vuln_limit" as it doesn't make
>>>>> logical sense to only analyze "a section of the application" if we can
>>>>> analyze all of it. Also, by removing "self._vuln_limit" you'll see
>>>>> that the memory usage of "self._vulns = []" will grow linearly with
>>>>> the application's size (if there is no protection) which is no good,
>>>>> so I recommend using a temp_shelve.
>>>>
>>>>
>>>> Hmm, the aim of self._vuln_limit is mostly to make report easy to read.
>>>> If
>>>> 15 or more requests are vulnerable do we need to store and show all these
>>>> 15
>>>> requests to the user?
>>>
>>>
>>> We're reporting two vulnerabilities:
>>>      * All are vulnerable, in which case we don't even need to add URLs
>>> since *all* are vulnerable
>>>      * Some are vulnerable, in which case we should print all URLs in
>>> the vulnerability description (annoying in some cases... but needed in
>>> my opinion).
>>
>> All or not all - it is discussable. Let's for the first make single
>> conclusion about self._vuln_count and self._vuln_limit.
>>
>>
>>
>>
>>
>> --
>> Taras
>> http://oxdef.info
>
>
>


-- 
Taras
http://oxdef.info

------------------------------------------------------------------------------
For Developers, A Lot Can Happen In A Second.
Boundary is the first to Know...and Tell You.
Monitor Your Applications in Ultra-Fine Resolution. Try it FREE!
http://p.sf.net/sfu/Boundary-d2dvs2
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to