Export to GitHub

zaproxy - issue #1652

Blind SQL numeric injection false positive results


Posted on May 28, 2015 by Massive Lion

It appears that zap scans for blind SQL inj in numeric fields using this method:

  1. Do a baseline request for the url: ...?param=2
  2. Injects SQL query: ...?param=2 AND 1=1

If the two responses are identical then it concludes that SQL inj is possible. But sometimes a validator will strip out non-numeric content, leading to a false positive.
This can be improved by making an additional request:

  1. ...?param=2 AND 1=2
    If this returns the same response as 1 and 2, then it's likely a false positive.

Comment #1

Posted on May 29, 2015 by Grumpy Rhino

(No comment was entered for this change.)

Comment #2

Posted on Jun 5, 2015 by Grumpy Rhino

ZAP has been migrated to github

This issue will be on github issues with the same ID: https://github.com/zaproxy/zaproxy/issues

Status: Done

Labels:
Type-Defect Priority-Medium