Skip to content

Disable second target probe for Browserker

What does this MR do?

The Browserker scan expects all requests to include the dast_scan=browserker cookie, however the second target probe made by DAST creates a request that does not include the cookie. This is problematic because aggregated vulnerabilities takes the evidence from the first alert, which in some cases is from the request made by the probe. This means the Browserker evidence is lost.

Since the second probe is to be removed in %14.0 it's not required for the Browserker scan, this MR removes the second probe for Browserker scans.

What are the relevant issue numbers?

gitlab-org/gitlab#254043 (closed)

Does this MR meet the acceptance criteria?

Edited by Craig Smith

Merge request reports