Skip to content

DAST reports do not split out parameter, parameter location, and values

Everyone can contribute. Help move this issue forward while earning points, leveling up and collecting rewards.

Problem

Our DAST reports do not properly extract the vulnerability location data into it's necessary atomic fields, but instead put them in the param field as a description.

"location": {
   "hostname": "http://vulnapp:3000",
   "method": "POST",
   "param": "application/x-www-form-urlencoded form field search with injection '\"",
   "path": "/sql-injection"
},

Instead we should add new fields to separate this information:

"location": {
   "hostname": "http://vulnapp:3000",
   "method": "POST",
   "param_type": "application/x-www-form-urlencoded"
   "param": "search"
   "value": "'\"",
   "path": "/sql-injection"
}

This will make it easier for external tooling (such as benchmarking) to identify where the vulnerability exists without having to resort to parsing text based descriptions.

Edited by 🤖 GitLab Bot 🤖