ZAP Scanning Report

Site: http://web:9000

Generated on 木, 30 3月 2023 18:41:27

Summary of Alerts

Risk Level Number of Alerts
0
0
2
情報
4
False Positives:
4

アラート

名前 Risk Level Number of Instances
Cross-Domain JavaScript Source File Inclusion 15
X-Content-Type-Options Header Missing 12
Content Security Policy (CSP) Header Not Set 情報 11
Information Disclosure - Suspicious Comments 情報 5
Missing Anti-clickjacking Header 情報 11
User Agent Fuzzer 情報 84
Application Error Disclosure False Positives: 2
Cloud Metadata Potentially Exposed False Positives: 1
Information Disclosure - Debug Error Messages False Positives: 2
Private IP Disclosure False Positives: 1

Alert Detail

Cross-Domain JavaScript Source File Inclusion
説明
The page includes one or more script files from a third-party domain.
URL http://web:9000
メソッド GET
Parameter https://embed.redditmedia.com/widgets/platform.js
攻撃
Evidence <script src="https://embed.redditmedia.com/widgets/platform.js"></script>
URL http://web:9000
メソッド GET
Parameter https://embedr.flickr.com/assets/client-code.js
攻撃
Evidence <script src="https://embedr.flickr.com/assets/client-code.js"></script>
URL http://web:9000
メソッド GET
Parameter https://js.ad-stir.com/js/adstir.js
攻撃
Evidence <script src="https://js.ad-stir.com/js/adstir.js"></script>
URL http://web:9000
メソッド GET
Parameter https://platform.twitter.com/widgets.js
攻撃
Evidence <script src="https://platform.twitter.com/widgets.js"></script>
URL http://web:9000
メソッド GET
Parameter https://www.instagram.com/embed.js
攻撃
Evidence <script src="https://www.instagram.com/embed.js"></script>
URL http://web:9000/
メソッド GET
Parameter https://embed.redditmedia.com/widgets/platform.js
攻撃
Evidence <script src="https://embed.redditmedia.com/widgets/platform.js"></script>
URL http://web:9000/
メソッド GET
Parameter https://embedr.flickr.com/assets/client-code.js
攻撃
Evidence <script src="https://embedr.flickr.com/assets/client-code.js"></script>
URL http://web:9000/
メソッド GET
Parameter https://js.ad-stir.com/js/adstir.js
攻撃
Evidence <script src="https://js.ad-stir.com/js/adstir.js"></script>
URL http://web:9000/
メソッド GET
Parameter https://platform.twitter.com/widgets.js
攻撃
Evidence <script src="https://platform.twitter.com/widgets.js"></script>
URL http://web:9000/
メソッド GET
Parameter https://www.instagram.com/embed.js
攻撃
Evidence <script src="https://www.instagram.com/embed.js"></script>
URL http://web:9000/sitemap.xml
メソッド GET
Parameter https://embed.redditmedia.com/widgets/platform.js
攻撃
Evidence <script src="https://embed.redditmedia.com/widgets/platform.js"></script>
URL http://web:9000/sitemap.xml
メソッド GET
Parameter https://embedr.flickr.com/assets/client-code.js
攻撃
Evidence <script src="https://embedr.flickr.com/assets/client-code.js"></script>
URL http://web:9000/sitemap.xml
メソッド GET
Parameter https://js.ad-stir.com/js/adstir.js
攻撃
Evidence <script src="https://js.ad-stir.com/js/adstir.js"></script>
URL http://web:9000/sitemap.xml
メソッド GET
Parameter https://platform.twitter.com/widgets.js
攻撃
Evidence <script src="https://platform.twitter.com/widgets.js"></script>
URL http://web:9000/sitemap.xml
メソッド GET
Parameter https://www.instagram.com/embed.js
攻撃
Evidence <script src="https://www.instagram.com/embed.js"></script>
Instances 15
Solution
Ensure JavaScript source files are loaded from only trusted sources, and the sources can't be controlled by end users of the application.
Reference
CWE Id 829
WASC Id 15
Plugin Id 10017
X-Content-Type-Options Header Missing
説明
The Anti-MIME-Sniffing header X-Content-Type-Options was not set to 'nosniff'. This allows older versions of Internet Explorer and Chrome to perform MIME-sniffing on the response body, potentially causing the response body to be interpreted and displayed as a content type other than the declared content type. Current (early 2014) and legacy versions of Firefox will use the declared content type (if one is set), rather than performing MIME-sniffing.
URL http://web:9000
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/2022/01/03/owaspzap
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/2022/12/31/suicide-linux
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/2023-01-15/2023%E5%B9%B4%E3%80%81%E4%BB%8A%E5%B9%B4%E3%81%AE%E7%9B%AE%E6%A8%99
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/2023/
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/2023/01/18/reboot-linux
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/2023/01/18/sentry-replay
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/about/
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/robots.txt
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/sitemap.xml
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
URL http://web:9000/tags/
メソッド GET
Parameter X-Content-Type-Options
攻撃
Evidence
Instances 12
Solution
Ensure that the application/web server sets the Content-Type header appropriately, and that it sets the X-Content-Type-Options header to 'nosniff' for all web pages.

If possible, ensure that the end user uses a standards-compliant and modern web browser that does not perform MIME-sniffing at all, or that can be directed by the web application/web server to not perform MIME-sniffing.
Reference http://msdn.microsoft.com/en-us/library/ie/gg622941%28v=vs.85%29.aspx
https://owasp.org/www-community/Security_Headers
CWE Id 693
WASC Id 15
Plugin Id 10021
情報
Content Security Policy (CSP) Header Not Set
説明
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
URL http://web:9000
メソッド GET
Parameter
攻撃
Evidence
URL http://web:9000/
メソッド GET
Parameter
攻撃
Evidence
URL http://web:9000/2022/01/03/owaspzap
メソッド GET
Parameter
攻撃
Evidence
URL http://web:9000/2022/12/31/suicide-linux
メソッド GET
Parameter
攻撃
Evidence
URL http://web:9000/2023-01-15/2023%E5%B9%B4%E3%80%81%E4%BB%8A%E5%B9%B4%E3%81%AE%E7%9B%AE%E6%A8%99
メソッド GET
Parameter
攻撃
Evidence
URL http://web:9000/2023/
メソッド GET
Parameter
攻撃
Evidence
URL http://web:9000/2023/01/18/reboot-linux
メソッド GET
Parameter
攻撃
Evidence
URL http://web:9000/2023/01/18/sentry-replay
メソッド GET
Parameter
攻撃
Evidence
URL http://web:9000/about/
メソッド GET
Parameter
攻撃
Evidence
URL http://web:9000/sitemap.xml
メソッド GET
Parameter
攻撃
Evidence
URL http://web:9000/tags/
メソッド GET
Parameter
攻撃
Evidence
Instances 11
Solution
Ensure that your web server, application server, load balancer, etc. is configured to set the Content-Security-Policy header, to achieve optimal browser support: "Content-Security-Policy" for Chrome 25+, Firefox 23+ and Safari 7+, "X-Content-Security-Policy" for Firefox 4.0+ and Internet Explorer 10+, and "X-WebKit-CSP" for Chrome 14+ and Safari 6+.
Reference https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy
https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html
http://www.w3.org/TR/CSP/
http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html
http://www.html5rocks.com/en/tutorials/security/content-security-policy/
http://caniuse.com/#feat=contentsecuritypolicy
http://content-security-policy.com/
CWE Id 693
WASC Id 15
Plugin Id 10038
情報
Information Disclosure - Suspicious Comments
説明
The response appears to contain suspicious comments which may help an attacker. Note: Matches made within script blocks or files are against the entire content not only comments.
URL http://web:9000/3cf1fa16-6310ec21cdf79f5ca409.js
メソッド GET
Parameter
攻撃
Evidence query
URL http://web:9000/6177e270-20243e0b0a11bbb9d7eb.js
メソッド GET
Parameter
攻撃
Evidence select
URL http://web:9000/app-ac7dfc3de4b57ce96549.js
メソッド GET
Parameter
攻撃
Evidence bug
URL http://web:9000/framework-7afb4bba2e8708955766.js
メソッド GET
Parameter
攻撃
Evidence select
URL http://web:9000/polyfill-0f0db516db61ec85f1c7.js
メソッド GET
Parameter
攻撃
Evidence username
Instances 5
Solution
Remove all comments that return information that may help an attacker and fix any underlying problems they refer to.
Reference
CWE Id 200
WASC Id 13
Plugin Id 10027
情報
Missing Anti-clickjacking Header
説明
The response does not include either Content-Security-Policy with 'frame-ancestors' directive or X-Frame-Options to protect against 'ClickJacking' attacks.
URL http://web:9000
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
URL http://web:9000/
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
URL http://web:9000/2022/01/03/owaspzap
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
URL http://web:9000/2022/12/31/suicide-linux
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
URL http://web:9000/2023-01-15/2023%E5%B9%B4%E3%80%81%E4%BB%8A%E5%B9%B4%E3%81%AE%E7%9B%AE%E6%A8%99
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
URL http://web:9000/2023/
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
URL http://web:9000/2023/01/18/reboot-linux
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
URL http://web:9000/2023/01/18/sentry-replay
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
URL http://web:9000/about/
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
URL http://web:9000/sitemap.xml
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
URL http://web:9000/tags/
メソッド GET
Parameter X-Frame-Options
攻撃
Evidence
Instances 11
Solution
Modern Web browsers support the Content-Security-Policy and X-Frame-Options HTTP headers. Ensure one of them is set on all web pages returned by your site/app.

If you expect the page to be framed only by pages on your server (e.g. it's part of a FRAMESET) then you'll want to use SAMEORIGIN, otherwise if you never expect the page to be framed, you should use DENY. Alternatively consider implementing Content Security Policy's "frame-ancestors" directive.
Reference https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
CWE Id 1021
WASC Id 15
Plugin Id 10020
情報
User Agent Fuzzer
説明
Check for differences in response based on fuzzed User Agent (eg. mobile sites, access as a Search Engine Crawler). Compares the response statuscode and the hashcode of the response body with the original response.
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Evidence
URL http://web:9000/page-data/index
メソッド GET
Parameter Header User-Agent
攻撃 msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Evidence
URL http://web:9000/tag/Gatsby.js/index
メソッド GET
Parameter Header User-Agent
攻撃 msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Evidence
URL http://web:9000/tag/Gatsby.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Evidence
URL http://web:9000/tag/Nuxt.js/index
メソッド GET
Parameter Header User-Agent
攻撃 msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Evidence
URL http://web:9000/tag/Nuxt.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Evidence
URL http://web:9000/tag/Vue.js/index
メソッド GET
Parameter Header User-Agent
攻撃 msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Evidence
URL http://web:9000/tag/Vue.js/index.html
メソッド GET
Parameter Header User-Agent
攻撃 msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Evidence
Instances 84
Solution
Reference https://owasp.org/wstg
CWE Id
WASC Id
Plugin Id 10104
False Positives:
Application Error Disclosure
説明
This page contains an error/warning message that may disclose sensitive information like the location of the file that produced the unhandled exception. This information can be used to launch further attacks against the web application. The alert could be a false positive if the error message is found inside a documentation page.
URL http://web:9000/page-data/2022/01/03/owaspzap/page-data.json
メソッド GET
Parameter
攻撃
Evidence Internal Server Error
URL http://web:9000/page-data/index/page-data.json
メソッド GET
Parameter
攻撃
Evidence Internal Server Error
Instances 2
Solution
Review the source code of this page. Implement custom error pages. Consider implementing a mechanism to provide a unique error reference/identifier to the client (browser) while logging the details on the server side and not exposing them to the user.
Reference
CWE Id 200
WASC Id 13
Plugin Id 90022
False Positives:
Cloud Metadata Potentially Exposed
説明
The Cloud Metadata Attack attempts to abuse a misconfigured NGINX server in order to access the instance metadata maintained by cloud service providers such as AWS, GCP and Azure.

All of these providers provide metadata via an internal unroutable IP address '169.254.169.254' - this can be exposed by incorrectly configured NGINX servers and accessed by using this IP address in the Host header field.
URL http://web:9000/latest/meta-data/
メソッド GET
Parameter
攻撃 169.154.169.254
Evidence
Instances 1
Solution
Do not trust any user data in NGINX configs. In this case it is probably the use of the $host variable which is set from the 'Host' header and can be controlled by an attacker.
Reference https://www.nginx.com/blog/trust-no-one-perils-of-trusting-user-input/
CWE Id
WASC Id
Plugin Id 90034
False Positives:
Information Disclosure - Debug Error Messages
説明
The response appeared to contain common error messages returned by platforms such as ASP.NET, and Web-servers such as IIS and Apache. You can configure the list of common debug messages.
URL http://web:9000/page-data/2022/01/03/owaspzap/page-data.json
メソッド GET
Parameter
攻撃
Evidence Internal Server Error
URL http://web:9000/page-data/index/page-data.json
メソッド GET
Parameter
攻撃
Evidence Internal Server Error
Instances 2
Solution
Disable debugging messages before pushing to production.
Reference
CWE Id 200
WASC Id 13
Plugin Id 10023
False Positives:
Private IP Disclosure
説明
A private IP (such as 10.x.x.x, 172.x.x.x, 192.168.x.x) or an Amazon EC2 private hostname (for example, ip-10-0-56-78) has been found in the HTTP response body. This information might be helpful for further attacks targeting internal systems.
URL http://web:9000/assets/logo3.svg
メソッド GET
Parameter
攻撃
Evidence 10.37.52.13
Instances 1
Solution
Remove the private IP address from the HTTP response body. For comments, use JSP/ASP/PHP comment instead of HTML/JavaScript comment which can be seen by client browsers.
Reference https://tools.ietf.org/html/rfc1918
CWE Id 200
WASC Id 13
Plugin Id 2