Skip to content

Commit a2d6a2a

Browse files
committed
Address references issues
Resolve redirects. Skip validating example refs, they are not real references and could fail for several reasons (e.g. 404s, timeouts). Signed-off-by: thc202 <[email protected]>
1 parent 500dfd0 commit a2d6a2a

File tree

7 files changed

+11
-15
lines changed

7 files changed

+11
-15
lines changed

addOns/ascanrulesAlpha/CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ All notable changes to this add-on will be documented in this file.
44
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
55

66
## Unreleased
7-
7+
### Changed
8+
- Address redirections in references.
89

910
## [53] - 2025-11-04
1011
### Added

addOns/ascanrulesAlpha/src/main/resources/org/zaproxy/zap/extension/ascanrulesAlpha/resources/Messages.properties

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,5 +33,5 @@ ascanalpha.scripts.warn.couldNotAddScripts = Could not add alpha active scan rul
3333
ascanalpha.webCacheDeception.desc = Web cache deception may be possible. It may be possible for unauthorised user to view sensitive data on this page.
3434
ascanalpha.webCacheDeception.name = Web Cache Deception
3535
ascanalpha.webCacheDeception.otherinfo = Cached Authorised Response and Unauthorised Response are similar.
36-
ascanalpha.webCacheDeception.refs = https://blog.cloudflare.com/understanding-our-cache-and-the-web-cache-deception-attack/\nhttps://www.invicti.com/web-vulnerability-scanner/vulnerabilities/web-cache-deception/
36+
ascanalpha.webCacheDeception.refs = https://blog.cloudflare.com/understanding-our-cache-and-the-web-cache-deception-attack/\nhttps://www.invicti.com/web-vulnerability-scanner/vulnerabilities/web-cache-deception
3737
ascanalpha.webCacheDeception.soln = It is strongly advised to refrain from classifying file types, such as images or stylesheets solely by their URL and file extension. Instead you should make sure that files are cached based on their Content-Type header.

addOns/ascanrulesAlpha/src/main/zapHomeFiles/scripts/scripts/active/SuspiciousInputTransformation.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ alertRefOverrides:
5252
${SCAN_RULE_ID}-6:
5353
name: Suspicious Input Transformation - Unicode Normalisation
5454
references:
55-
- https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi
55+
- https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi/
5656
${SCAN_RULE_ID}-7:
5757
name: Suspicious Input Transformation - URL Decoding Error
5858
references:

addOns/graaljs/src/test/java/org/zaproxy/zap/extension/graaljs/ActiveDefaultTemplateGraalJsScriptTest.java

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -47,11 +47,8 @@ protected boolean isIgnoreAlertsRaisedInSendReasonableNumberOfMessages() {
4747
@Override
4848
public boolean isAllowedReferenceError(
4949
AlertReferenceError.Cause cause, String reference, Object detail) {
50-
if (cause == AlertReferenceError.Cause.UNEXPECTED_STATUS_CODE && ((int) detail) == 404) {
51-
// These are example.org references.
52-
return true;
53-
}
54-
return false;
50+
// These are example.org references.
51+
return true;
5552
}
5653

5754
@Test

addOns/graaljs/src/test/java/org/zaproxy/zap/extension/graaljs/PassiveDefaultTemplateGraalJsScriptTest.java

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,8 @@ public Path getScriptPath() throws Exception {
4545
@Override
4646
public boolean isAllowedReferenceError(
4747
AlertReferenceError.Cause cause, String reference, Object detail) {
48-
if (cause == AlertReferenceError.Cause.UNEXPECTED_STATUS_CODE && ((int) detail) == 404) {
49-
// These are example.org references.
50-
return true;
51-
}
52-
return false;
48+
// These are example.org references.
49+
return true;
5350
}
5451

5552
@Test

addOns/pscanrules/CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ All notable changes to this add-on will be documented in this file.
44
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
55

66
## Unreleased
7-
7+
### Changed
8+
- Address redirection in a reference.
89

910
## [69] - 2025-11-04
1011
### Changed

addOns/pscanrules/src/main/resources/org/zaproxy/zap/extension/pscanrules/resources/Messages.properties

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ pscanrules.charsetmismatch.name = Charset Mismatch
5050
pscanrules.charsetmismatch.name.header_metacharset_mismatch = Charset Mismatch (Header Versus Meta Charset)
5151
pscanrules.charsetmismatch.name.header_metacontentype_mismatch = Charset Mismatch (Header Versus Meta Content-Type Charset)
5252
pscanrules.charsetmismatch.name.metacontenttype_metacharset_mismatch = Charset Mismatch (Meta Charset Versus Meta Content-Type Charset)
53-
pscanrules.charsetmismatch.refs = https://code.google.com/p/browsersec/wiki/Part2#Character_set_handling_and_detection
53+
pscanrules.charsetmismatch.refs = https://code.google.com/archive/p/browsersec/wikis/Part2.wiki#Character_set_handling_and_detection
5454
pscanrules.charsetmismatch.soln = Force UTF-8 for all text content in both the HTTP header and meta tags in HTML or encoding declarations in XML.
5555
5656
pscanrules.contentsecuritypolicymissing.desc = Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.

0 commit comments

Comments
 (0)