You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Need to develop a test suite, as part of current functional tests, to emulate WAF bypassing requests and Web attacks.
Analyzer + backend
One of the way, probably the simplest and featureful is to use ready vulnerability scanner/analyzer with vulnerable backend. Following analyzers, working as a malicious clients could be emplyed:
If the above don't test some of the security issues, then appropriate functional tests, complementing the ready analyzer/backend setup, shall be implemented.
http://1.1.1.1 &@2.2.2.2# @3.3.3.3/
http://127.0.0.1:11211:80/
http://google.com#@evil.com/
... and others
HTTP filtering proxy evasions (evade HTTP adjustment code by mangling HTTP headers in assumption that a prixy and target HTTP server process them in different way), such as insertion of extra spaces, tabs, 0x00–0x20, and so on, e.g. GET / HTTP/1.1\r\n\sHost\x4:\tfoo \r\n. The main point is if we do not block some of such manglings (i.e. it's allowed by RFC), then we must correctly perform HTTP message modifications for such headers.
The text was updated successfully, but these errors were encountered:
Need to develop a test suite, as part of current functional tests, to emulate WAF bypassing requests and Web attacks.
Analyzer + backend
One of the way, probably the simplest and featureful is to use ready vulnerability scanner/analyzer with vulnerable backend. Following analyzers, working as a malicious clients could be emplyed:
Also consider the WAF bypass collection
Backends:
Homebred tests
If the above don't test some of the security issues, then appropriate functional tests, complementing the ready analyzer/backend setup, shall be implemented.
Content-Type: invalid
(Imperva's vulnerability) and emptyContent-Type
must be blocked.User-Agent
http://www.site.com/page.php?var=<script>alert('xss');</script>
Host
header injections are blocked in default configuration:Host: mysite:”><xss>
,Host: mysite “><xss>
GET / HTTP/1.1\r\n\sHost\x4:\tfoo \r\n
. The main point is if we do not block some of such manglings (i.e. it's allowed by RFC), then we must correctly perform HTTP message modifications for such headers.The text was updated successfully, but these errors were encountered: