The results for OWASP ZAP were very helpful in removing the vulnerable parts of my website.
However, I found many results that I simply cannot fix. For example, one of the get parameters, which it places javascript:alert(1); into a variable. This variable is then output by PHP in the attribute of the hidden value element. So the last HTML looks like this:
<input type="hidden" name="someName" id="someID" value="javascript:alert(1);"/>
This value is typically used to populate the JavaScript drop-down list. If it 1 shows additional search filters, if 0 does not show anything. Thus, it is only used in string comparisons, which fails.
I do not see that this could be used, the warning does not start, like other attacks that ZAP showed me. The result is encoded, so they cannot enter HTML, ending quotes or an element earlier with "/> , like previously detected attacks, since these characters become their equivalents of HTML objects.
Is this just a false positive ZAP result matching the input string in the page source, since javascript:alert(1); encoding javascript:alert(1); still equal exactly as javascript:alert(1); ?
source share