dast
Passed Started
by
@rpereira2
Reuben Pereira
This job is archived. Only the complete pipeline can be retried.
1Running with gitlab-runner 13.2.0-rc2 (45f2b4ec)2 on docker-auto-scale fa6cab464Using Docker executor with image registry.gitlab.com/gitlab-org/security-products/analyzers/dast:1 ...5Pulling docker image registry.gitlab.com/gitlab-org/security-products/analyzers/dast:1 ...6Using docker image sha256:dbbffd8b47a4aac7904655916ed1daa4db85a03224ffa8e404ea33cc7f73ddfb for registry.gitlab.com/gitlab-org/security-products/analyzers/dast:1 ...8Running on runner-fa6cab46-project-4422333-concurrent-0 via runner-fa6cab46-stg-srm-1596123329-02c37763...10Skipping Git repository setup11Skipping Git checkout12Skipping Git submodules setup14Downloading artifacts for dast_environment_deploy (37593833)...15Downloading artifacts from coordinator... ok id=37593833 responseStatus=200 OK token=x9_apUgJ17$ export DAST_WEBSITE=${DAST_WEBSITE:-$(cat environment_url.txt)}18$ if [ -z "$DAST_WEBSITE$DAST_API_SPECIFICATION" ]; then echo "Either DAST_WEBSITE or DAST_API_SPECIFICATION must be set. See https://docs.gitlab.com/ee/user/application_security/dast/#configuration for more details." && exit 1; fi19$ /analyze202020-07-30 15:37:31,972 using Python 3.8.2 (default, Apr 27 2020, 15:53:34) [GCC 9.3.0]212020-07-30 15:37:31,972 waiting for http://dast-4422333-dast-default.34.67.11.220.nip.io to be available222020-07-30 15:37:31,973 requesting access to http://dast-4422333-dast-default.34.67.11.220.nip.io232020-07-30 15:37:32,357 starting scan242020-07-30 15:37:32,358 Script params: [('-t', 'http://dast-4422333-dast-default.34.67.11.220.nip.io'), ('-m', 1), ('-z', '-config selenium.firefoxDriver=/usr/bin/geckodriver -silent')]252020-07-30 15:37:32,359 Params: ['zap-x.sh', '-daemon', '-port', '35141', '-host', '0.0.0.0', '-config', 'api.disablekey=true', '-config', 'api.addrs.addr.name=.*', '-config', 'api.addrs.addr.regex=true', '-config', 'spider.maxDuration=1', '-config', 'selenium.firefoxDriver=/usr/bin/geckodriver', '-silent']26Jul 30, 2020 3:37:40 PM java.util.prefs.FileSystemPreferences$1 run27INFO: Created user preferences directory.28[zap.out] Found Java version 11.0.729[zap.out] Available memory: 3693 MB30[zap.out] Using JVM args: -Xmx923m31[zap.out] 640 [main] INFO org.zaproxy.zap.DaemonBootstrap - OWASP ZAP D-2020-06-30 started 30/07/2020, 15:37:34 with home /home/zap/.ZAP_D/32[zap.out] 707 [main] INFO org.parosproxy.paros.common.AbstractParam - Setting config api.disablekey = true was null33[zap.out] 713 [main] INFO org.parosproxy.paros.common.AbstractParam - Setting config api.addrs.addr.name = .* was null34[zap.out] 713 [main] INFO org.parosproxy.paros.common.AbstractParam - Setting config api.addrs.addr.regex = true was null35[zap.out] 713 [main] INFO org.parosproxy.paros.common.AbstractParam - Setting config spider.maxDuration = 1 was null36[zap.out] 716 [main] INFO org.parosproxy.paros.common.AbstractParam - Setting config selenium.firefoxDriver = /usr/bin/geckodriver was null37[zap.out] 743 [main] INFO org.parosproxy.paros.network.SSLConnector - Reading supported SSL/TLS protocols...38[zap.out] 743 [main] INFO org.parosproxy.paros.network.SSLConnector - Using a SSLEngine...39[zap.out] 929 [main] INFO org.parosproxy.paros.network.SSLConnector - Done reading supported SSL/TLS protocols: [SSLv2Hello, SSLv3, TLSv1, TLSv1.1, TLSv1.2, TLSv1.3]40[zap.out] 971 [main] INFO org.parosproxy.paros.extension.option.OptionsParamCertificate - Unsafe SSL renegotiation disabled.41[zap.out] 2083 [ZAP-daemon] INFO org.zaproxy.zap.control.ExtensionFactory - Loading extensions42[zap.out] 5711 [ZAP-daemon] INFO org.zaproxy.zap.control.ExtensionFactory - Installed add-ons: [[id=accessControl, version=6.0.0], [id=alertFilters, version=10.0.0], [id=ascanrules, version=35.0.0], [id=ascanrulesBeta, version=28.0.0], [id=bruteforce, version=9.0.0], [id=commonlib, version=1.0.0], [id=coreLang, version=14.0.0], [id=diff, version=10.0.0], [id=directorylistv1, version=4.0.0], [id=encoder, version=0.3.0], [id=formhandler, version=3.0.0], [id=fuzz, version=12.0.0], [id=fuzzdb, version=7.0.0], [id=gettingStarted, version=11.0.0], [id=help, version=10.0.0], [id=hud, version=0.10.0], [id=importurls, version=7.0.0], [id=invoke, version=10.0.0], [id=onlineMenu, version=7.0.0], [id=openapi, version=16.0.0], [id=plugnhack, version=12.0.0], [id=portscan, version=9.0.0], [id=pscanrules, version=29.0.0], [id=pscanrulesBeta, version=22.0.0], [id=quickstart, version=28.0.0], [id=replacer, version=8.0.0], [id=retire, version=0.4.0], [id=reveal, version=3.0.0], [id=saverawmessage, version=5.0.0], [id=savexmlmessage, version=0.1.0], [id=scripts, version=26.0.0], [id=selenium, version=15.2.0], [id=sequence, version=6.0.0], [id=spiderAjax, version=23.1.0], [id=tips, version=7.0.0], [id=webdriverlinux, version=18.0.0], [id=webdrivermacos, version=17.0.0], [id=webdriverwindows, version=18.0.0], [id=websocket, version=21.0.0], [id=zest, version=32.0.0]]43[zap.out] 6741 [ZAP-daemon] INFO org.zaproxy.zap.control.ExtensionFactory - Extensions loaded44[zap.out] 7093 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Allows ZAP to check for updates45[zap.out] 7101 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Options Extension46[zap.out] 7102 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Edit Menu Extension47[zap.out] 7102 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Provides a rest based API for controlling and accessing ZAP48[zap.out] 7119 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Session State Extension49[zap.out] 7119 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Report Extension50[zap.out] 7119 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing History Extension51[zap.out] 7121 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Show hidden fields and enable disabled fields52[zap.out] 7126 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Search messages for strings and regular expressions53[zap.out] 7127 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Allows you to intercept and modify requests and responses54[zap.out] 7129 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Passive scanner55[zap.out] 7348 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Script Passive Scan Rules56[zap.out] 7349 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Stats Passive Scan Rule57[zap.out] 7350 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Vulnerable JS Library58[zap.out] 7353 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Big Redirect Detected (Potential Sensitive Information Leak)59[zap.out] 7354 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Content Security Policy (CSP) Header Not Set60[zap.out] 7355 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Directory Browsing61[zap.out] 7355 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Hash Disclosure62[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Heartbleed OpenSSL Vulnerability (Indicative)63[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: HTTP to HTTPS Insecure Transition in Form Post64[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: HTTPS to HTTP Insecure Transition in Form Post65[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Reverse Tabnabbing66[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Modern Web Application67[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: PII Disclosure68[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Retrieved from Cache69[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: HTTP Server Response Header Scanner70[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: HTTP Parameter Override71[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Strict-Transport-Security Header Scanner72[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: User Controllable Charset73[zap.out] 7356 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Cookie Poisoning74[zap.out] 7357 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: User Controllable HTML Element Attribute (Potential XSS)75[zap.out] 7357 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: User Controllable JavaScript Event (XSS)76[zap.out] 7357 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Open Redirect77[zap.out] 7357 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: X-Backend-Server Header Information Leak78[zap.out] 7357 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: X-ChromeLogger-Data (XCOLD) Header Information Leak79[zap.out] 7357 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Application Error Disclosure80[zap.out] 7357 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Absence of Anti-CSRF Tokens81[zap.out] 7357 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Incomplete or No Cache-control and Pragma HTTP Header Set82[zap.out] 7358 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Charset Mismatch83[zap.out] 7358 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: CSP Scanner84[zap.out] 7358 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Content-Type Header Missing85[zap.out] 7358 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Cookie No HttpOnly Flag86[zap.out] 7358 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Loosely Scoped Cookie87[zap.out] 7358 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Cookie Without SameSite Attribute88[zap.out] 7358 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Cookie Without Secure Flag89[zap.out] 7358 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Cross-Domain Misconfiguration90[zap.out] 7359 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Cross-Domain JavaScript Source File Inclusion91[zap.out] 7361 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Information Disclosure - Debug Error Messages92[zap.out] 7361 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Information Disclosure - Sensitive Information in URL93[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Information Disclosure - Sensitive Information in HTTP Referrer Header94[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Information Disclosure - Suspicious Comments95[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Weak Authentication Method96[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Insecure JSF ViewState97[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Secure Pages Include Mixed Content98[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Private IP Disclosure99[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Session ID in URL Rewrite100[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Timestamp Disclosure101[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Username Hash Found102[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Viewstate Scanner103[zap.out] 7362 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: X-AspNet-Version Response Header Scanner104[zap.out] 7363 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: X-Content-Type-Options Header Missing105[zap.out] 7363 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: X-Debug-Token Information Leak106[zap.out] 7363 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: X-Frame-Options Header Scanner107[zap.out] 7363 [ZAP-daemon] INFO org.zaproxy.zap.extension.pscan.ExtensionPassiveScan - loaded passive scan rule: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s)108[zap.out] 7389 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Allows you to view and manage alerts109[zap.out] 7397 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Active scanner, heavily based on the original Paros active scanner, but with additional tests added110[zap.out] 7411 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing ExtensionSequence111[zap.out] 7412 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Spider used for automatically finding URIs on a site112[zap.out] 7425 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing A set of common popup menus for miscellaneous tasks113[zap.out] 7425 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Forced browsing of files and directories using code from the OWASP DirBuster tool114[zap.out] 7429 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Simple but effective port scanner115[zap.out] 7430 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Manual Request Editor Extension116[zap.out] 7430 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Compares 2 sessions and generates an HTML file showing the differences117[zap.out] 7430 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Invoke external applications passing context related information such as URLs and parameters118[zap.out] 7436 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Handles anti cross site request forgery (CSRF) tokens119[zap.out] 7445 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Authentication Extension120[zap.out] 7469 [ZAP-daemon] INFO org.zaproxy.zap.extension.authentication.ExtensionAuthentication - Loaded authentication method types: [Form-based Authentication, HTTP/NTLM Authentication, Manual Authentication, Script-based Authentication, JSON-based Authentication]121[zap.out] 7470 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Creates a dynamic SSL certificate to allow SSL communications to be intercepted without warnings being generated by the browser122[zap.out] 7471 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Logs errors to the Output tab in development mode only123[zap.out] 7474 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Users Extension124[zap.out] 7477 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Summarise and analyse FORM and URL parameters as well as cookies125[zap.out] 7478 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Script integration126[zap.out] 7515 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Scripting console, supports all JSR 223 scripting languages127[zap.out] 7788 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Forced User Extension128[zap.out] 7789 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Extension handling HTTP sessions129[zap.out] 7790 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Zest is a specialized scripting language from Mozilla specifically designed to be used in security tools130[zap.out] 8137 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing ExtensionDiff131[zap.out] 8137 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing HTTP Panel Post Table View Extension132[zap.out] 8138 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Adds support for scriptable encoders to ZAP.133[zap.out] 8138 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Simple browser configuration134[zap.out] 8138 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Session Management Extension135[zap.out] 8149 [ZAP-daemon] INFO org.zaproxy.zap.extension.sessions.ExtensionSessionManagement - Loaded session management method types: [Cookie-based Session Management, HTTP Authentication Session Management, Script-based Session Management]136[zap.out] 8150 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing HTTP Panel Form Table View Extension137[zap.out] 8153 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Capture messages from WebSockets with the ability to set breakpoints.138[zap.out] 8258 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Allows you to import a file containing URLs which ZAP will access, adding them to the Sites tree139[zap.out] 8258 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Core UI related functionality.140[zap.out] 8259 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Authorization Extension141[zap.out] 8259 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing AJAX Spider, uses Crawljax142[zap.out] 8267 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Provides WebDrivers to control several browsers using Selenium and includes HtmlUnit browser.143[zap.out] 8284 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Manages the local proxy configurations144[zap.out] 8284 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Add-on that adds a set of tools for testing access control in web applications.145[zap.out] 8289 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Handles adding Global Excluded URLs146[zap.out] 8291 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Adds menu item to refresh the Sites tree147[zap.out] 8291 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing OWASP ZAP User Guide148[zap.out] 8291 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Provides a URL suitable for calling from target sites149[zap.out] 8294 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Allows you to configure which extensions are loaded when ZAP starts150[zap.out] 8296 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Combined HTTP Panels Extension151[zap.out] 8296 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing HTTP Panel Hex View Extension152[zap.out] 8296 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing HTTP Panel Image View Extension153[zap.out] 8297 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing HTTP Panel Large Request View Extension154[zap.out] 8298 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing HTTP Panel Large Response View Extension155[zap.out] 8298 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing HTTP Panel Query Table View Extension156[zap.out] 8300 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing HTTP Panel Syntax Highlighter View Extension157[zap.out] 8303 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Adds support for configurable keyboard shortcuts for all of the ZAP menus.158[zap.out] 8304 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Active and passive rule configuration159[zap.out] 8313 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Statistics160[zap.out] 8315 [ZAP-daemon] INFO org.zaproxy.zap.extension.stats.ExtensionStats - Start recording in memory stats161[zap.out] 8319 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing This extension allows a user to change the default values used by ZAP Spiders.162[zap.out] 8324 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Translations of the core language files163[zap.out] 8325 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Provides the foundation for concrete message types (for example, HTTP, WebSockets) expose fuzzer implementations.164[zap.out] 8330 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Allows to fuzz HTTP messages.165[zap.out] 8331 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Tips and Tricks166[zap.out] 8332 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Passive Scan Rules - beta167[zap.out] 8333 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing ExtensionSaveRawHttpMessage168[zap.out] 8333 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Context alert rules filter169[zap.out] 8338 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Allows to fuzz WebSocket messages.170[zap.out] 8338 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Allows you to spider and import OpenAPI (Swagger) definitions 171[zap.out] 8384 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing The ZAP Getting Started Guide172[zap.out] 8389 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Easy way to replace strings in requests and responses173[zap.out] 8400 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing The Online menu links174[zap.out] 8404 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing ExtensionSaveXMLHttpMessage175[zap.out] 8404 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Passive Scan Rules176[zap.out] 8404 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Active Scan Rules177[zap.out] 8404 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Adds the Quick Start panel for scanning and exploring applications178[zap.out] 8407 [ZAP-daemon] INFO org.zaproxy.zap.extension.quickstart.ExtensionQuickStart - Shh! No check-for-news - silent mode enabled179[zap.out] 8407 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Add the option to use the Ajax Spider in the Quick Start scan180[zap.out] 8407 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Launch browsers proxying through ZAP181[zap.out] 8407 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Launch browsers proxying through ZAP182[zap.out] 8408 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Heads Up Display183[zap.out] 8587 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing ExtensionHUDlaunch184[zap.out] 8588 [ZAP-daemon] INFO org.parosproxy.paros.extension.ExtensionLoader - Initializing Active Scan Rules - beta185[zap.out] 8981 [ZAP-daemon] INFO org.zaproxy.zap.extension.callback.ExtensionCallback - Started callback server on 0.0.0.0:35303186[zap.out] 8982 [ZAP-daemon] INFO org.zaproxy.zap.extension.dynssl.ExtensionDynSSL - Creating new root CA certificate187[zap.out] 11099 [ZAP-daemon] INFO org.zaproxy.zap.extension.dynssl.ExtensionDynSSL - New root CA certificate created188[zap.out] 11101 [ZAP-daemon] INFO org.zaproxy.zap.DaemonBootstrap - ZAP is now listening on 0.0.0.0:35141189[zap.out] 11102 [ZAP-daemon] INFO org.zaproxy.zap.extension.autoupdate.ExtensionAutoUpdate - Shh! No check-for-update - silent mode enabled190[zap.out] 11923 [ZAP-ProxyThread-2] INFO org.parosproxy.paros.control.Control - Discard Session191[zap.out] 11967 [ZAP-ProxyThread-2] INFO org.parosproxy.paros.control.Control - New Session192[zap.out] 11967 [ZAP-ProxyThread-2] INFO org.parosproxy.paros.control.Control - Create and Open Untitled Db193[zap.out] 15853 [ZAP-SpiderInitThread-0] INFO org.zaproxy.zap.extension.spider.SpiderThread - Starting spidering scan on Context: Target Context at Thu Jul 30 15:37:49 UTC 2020194[zap.out] 15856 [ZAP-SpiderInitThread-0] INFO org.zaproxy.zap.spider.Spider - Spider initializing...195[zap.out] 15899 [ZAP-SpiderInitThread-0] INFO org.zaproxy.zap.spider.Spider - Starting spider...196[zap.out] 160612020-07-30 15:37:55,211 The following 4 URLs were scanned:201PASS: Script Passive Scan Rules [50001]202PASS: Stats Passive Scan Rule [50003]203PASS: Vulnerable JS Library [10003]204PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044]205WARN: Content Security Policy (CSP) Header Not Set [10038] x 1207PASS: Directory Browsing [10033]208PASS: Hash Disclosure [10097]209PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034]210PASS: HTTP to HTTPS Insecure Transition in Form Post [10041]211PASS: HTTPS to HTTP Insecure Transition in Form Post [10042]212PASS: Reverse Tabnabbing [10108]213PASS: Modern Web Application [10109]214PASS: PII Disclosure [10062]215PASS: Retrieved from Cache [10050]216WARN: HTTP Server Response Header Scanner [10036] x 5222PASS: HTTP Parameter Override [10026]223PASS: Strict-Transport-Security Header Scanner [10035]224PASS: User Controllable Charset [10030]225PASS: Cookie Poisoning [10029]226PASS: User Controllable HTML Element Attribute (Potential XSS) [10031]227PASS: User Controllable JavaScript Event (XSS) [10043]228PASS: Open Redirect [10028]229PASS: X-Backend-Server Header Information Leak [10039]230PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052]231PASS: Application Error Disclosure [90022]232PASS: Absence of Anti-CSRF Tokens [10202]233WARN: Incomplete or No Cache-control and Pragma HTTP Header Set [10015] x 1235PASS: Charset Mismatch [90011]236PASS: CSP Scanner [10055]237PASS: Content-Type Header Missing [10019]238PASS: Cookie No HttpOnly Flag [10010]239PASS: Loosely Scoped Cookie [90033]240PASS: Cookie Without SameSite Attribute [10054]241PASS: Cookie Without Secure Flag [10011]242PASS: Cross-Domain Misconfiguration [10098]243PASS: Cross-Domain JavaScript Source File Inclusion [10017]244PASS: Information Disclosure - Debug Error Messages [10023]245PASS: Information Disclosure - Sensitive Information in URL [10024]246PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025]247PASS: Information Disclosure - Suspicious Comments [10027]248PASS: Weak Authentication Method [10105]249PASS: Insecure JSF ViewState [90001]250PASS: Secure Pages Include Mixed Content [10040]251PASS: Private IP Disclosure [2]252PASS: Session ID in URL Rewrite [3]253PASS: Timestamp Disclosure [10096]254PASS: Username Hash Found [10057]255PASS: Viewstate Scanner [10032]256PASS: X-AspNet-Version Response Header Scanner [10061]257WARN: X-Content-Type-Options Header Missing [10021] x 1259PASS: X-Debug-Token Information Leak [10056]260WARN: X-Frame-Options Header Scanner [10020] x 1262WARN: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037] x 1264PASS: Path Traversal [6]265PASS: Remote File Inclusion [7]266PASS: Source Code Disclosure - /WEB-INF folder [10045]267PASS: External Redirect [20019]268PASS: Server Side Include [40009]269PASS: Cross Site Scripting (Reflected) [40012]270PASS: Cross Site Scripting (Persistent) [40014]271PASS: SQL Injection [40018]272PASS: Server Side Code Injection [90019]273PASS: Remote OS Command Injection [90020]274PASS: Directory Browsing [0]275PASS: Buffer Overflow [30001]276PASS: Format String Error [30002]277PASS: CRLF Injection [40003]278PASS: Parameter Tampering [40008]279PASS: Cross Site Scripting (Persistent) - Prime [40016]280PASS: Cross Site Scripting (Persistent) - Spider [40017]281PASS: Script Active Scan Rules [50000]282PASS: Source Code Disclosure - Git [41]283PASS: Source Code Disclosure - File Inclusion [43]284PASS: Remote Code Execution - Shell Shock [10048]285PASS: Httpoxy - Proxy Header Misuse [10107]286PASS: Anti CSRF Tokens Scanner [20012]287PASS: Heartbleed OpenSSL Vulnerability [20015]288PASS: Cross-Domain Misconfiguration [20016]289PASS: Source Code Disclosure - CVE-2012-1823 [20017]290PASS: Remote Code Execution - CVE-2012-1823 [20018]291PASS: Session Fixation [40013]292PASS: SQL Injection - MySQL [40019]293PASS: SQL Injection - Hypersonic SQL [40020]294PASS: SQL Injection - Oracle [40021]295PASS: SQL Injection - PostgreSQL [40022]296PASS: SQL Injection - SQLite [40024]297PASS: SQL Injection - MsSQL [40027]298PASS: XPath Injection [90021]299PASS: XML External Entity Attack [90023]300PASS: Generic Padding Oracle [90024]301PASS: Expression Language Injection [90025]302PASS: Source Code Disclosure - SVN [42]303PASS: Relative Path Confusion [10051]304PASS: Apache Range Header DoS (CVE-2011-3192) [10053]305PASS: Backup File Disclosure [10095]306PASS: HTTP Only Site [10106]307PASS: Integer Overflow Error [30003]308PASS: Proxy Disclosure [40025]309PASS: ELMAH Information Leak [40028]310PASS: Trace.axd Information Leak [40029]311PASS: .htaccess Information Leak [40032]312PASS: Insecure HTTP Method [90028]313PASS: HTTPS Content Available via HTTP [10047]314PASS: GET for POST [10058]315PASS: User Agent Fuzzer [10104]316PASS: HTTP Parameter Pollution scanner [20014]317PASS: Possible Username Enumeration [40023]318PASS: Cookie Slack Detector [90027]319SUMMARY - PASS: 102 | WARN: 6320cat: /tmp/.X1-lock: No such file or directory321/zap/zap-x.sh: 10: kill: Usage: kill [-s sigspec | -signum | -sigspec] [pid | job]... or322kill -l [exitstatus]324Uploading artifacts...325gl-dast-report.json: found 1 matching files and directories 326Uploading artifacts as "dast" to coordinator... ok id=37593834 responseStatus=201 Created token=qZwWyNF1327Job succeeded