Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

xss扫描规则 #17

Closed
yinhui1150 opened this issue Jul 4, 2024 · 7 comments
Closed

xss扫描规则 #17

yinhui1150 opened this issue Jul 4, 2024 · 7 comments
Labels
提问 ask a question

Comments

@yinhui1150
Copy link

请问下,是不是爬虫爬取到的所有URL都会扫描xss插件,如果不是,是根据什么标准来判断要跑xss插件的呢,在框架代码中没有看到这部分的逻辑

@chushuai
Copy link
Owner

chushuai commented Jul 4, 2024

XSS只会扫描响应类型为text/html的请求,对于那些与参数名相同的URL,会进行去重扫描。

@yinhui1150
Copy link
Author

XSS只会扫描响应类型为text/html的请求,对于那些与参数名相同的URL,会进行去重扫描。

您好,再继续问一下哈,除了根据content-type进行xss插件的判断,是否还有其他条件,如get请求带有参数或者post请求?如果页面存在注入点,wscan会扫描那些类型的的漏洞插件?整体的插件扫描匹配规则是怎样的呢?

@chushuai
Copy link
Owner

chushuai commented Jul 5, 2024

举个列子呢

@chushuai
Copy link
Owner

chushuai commented Jul 6, 2024

不同的插件扫描目标是不一样的
有些每个站点只扫描一次
有些是针对目录,如
image

有些是针对所有请求,如
image

@yinhui1150
Copy link
Author

不同的插件扫描目标是不一样的 有些每个站点只扫描一次 有些是针对目录,如 image

有些是针对所有请求,如 image

我看了wscan的代码,里面有一个placeholder的参数,此参数的含义好像是表明了什么样的URL会调用此插件,在对应漏洞的yml文件中,如path-traversal.yml中
image
,按照此参数的理解,要想调用路径遍历的漏洞,当HTTP的请求是以/目录结尾的,或者存在URL参数,或者请求是表达,文件上传类的请求也会调用此插件,这样理解对吗?

@chushuai
Copy link
Owner

chushuai commented Jul 9, 2024

自定义的web通用漏洞扫描插件,适用于所有路径

@chushuai chushuai added the 提问 ask a question label Jul 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
提问 ask a question
Projects
None yet
Development

No branches or pull requests

2 participants