diff --git a/docker-compose.owaspzap.yml b/docker-compose.owaspzap.yml index 220d7802c6b..cffdac55dba 100644 --- a/docker-compose.owaspzap.yml +++ b/docker-compose.owaspzap.yml @@ -7,6 +7,7 @@ services: command: bash -c "zap.sh -cmd -addonupdate -addoninstall help_ja_JP -addoninstall wappalyzer -addoninstall sequence -addonuninstall hud -configfile /zap/wrk/options.properties -certpubdump /zap/wrk/owasp_zap_root_ca.cer && zap-webswing.sh" # 詳細スキャンしたい場合はこちらを使用する command: bash -c "zap.sh -cmd -addonupdate -addoninstall help_ja_JP -addoninstall wappalyzer -addoninstall ascanrulesAlpha -addoninstall ascanrulesBeta -addoninstall sqliplugin -addoninstall sequence -addonuninstall hud -configfile /zap/wrk/options.properties -certpubdump /zap/wrk/owasp_zap_root_ca.cer && zap-webswing.sh" volumes: + - ./zap/policies:/home/zap/.ZAP/policies/ - ./zap:/zap/wrk/ ports: - "8081:8080" diff --git a/zap/options.properties b/zap/options.properties index 2001e1b0c4c..388803dd54f 100644 --- a/zap/options.properties +++ b/zap/options.properties @@ -111,6 +111,10 @@ anticsrf.tokens.token\(53\).name=admin_change_password[_token] anticsrf.tokens.token\(53\).enabled=true anticsrf.tokens.token\(54\).name=calendar[_token] anticsrf.tokens.token\(54\).enabled=true +anticsrf.tokens.token\(55\).name=nonmember[_token] +anticsrf.tokens.token\(55\).enabled=true +anticsrf.tokens.token\(56\).name=admin_customer[_token] +anticsrf.tokens.token\(56\).enabled=true scanner.antiCSFR=true httpsessions.tokens.token\(0\).name=eccube httpsessions.tokens.token\(0\).enabled=true @@ -118,7 +122,7 @@ httpsessions.tokens.token\(1\).name=ecsessid httpsessions.tokens.token\(1\).enabled=true httpsessions.tokens.token\(2\).name=phpsessid httpsessions.tokens.token\(2\).enabled=true -## Filtering out false positives in PATH Traversal +## Filtering out false positives in PATH Traversal to add_cart globalalertfilter.filters.filter\(0\).ruleid=6 globalalertfilter.filters.filter\(0\).newrisk=-1 globalalertfilter.filters.filter\(0\).url=https://ec-cube/products/add_cart/[0-9]+ @@ -142,3 +146,291 @@ globalalertfilter.filters.filter\(1\).attackregex=false globalalertfilter.filters.filter\(1\).evidence= globalalertfilter.filters.filter\(1\).evidenceregex=false globalalertfilter.filters.filter\(1\).enabled=true +## Filtering out false positives in anti CSRF token to searchForm +globalalertfilter.filters.filter\(2\).ruleid=10202 +globalalertfilter.filters.filter\(2\).newrisk=-1 +globalalertfilter.filters.filter\(2\).url=https://ec-cube/.* +globalalertfilter.filters.filter\(2\).urlregex=true +globalalertfilter.filters.filter\(2\).param= +globalalertfilter.filters.filter\(2\).paramregex=false +globalalertfilter.filters.filter\(2\).attack=