-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create OWASPTop25VulnerableParameters.bambda #21
Conversation
This `.bambda` file serves as a filter for the Burp Suite tool, identifying HTTP requests with parameters listed in the OWASP Top 25 vulnerabilities. It's designed to help security professionals quickly pinpoint potentially risky parameters.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey BugBountyzip, this looks like a great submission - thanks!
My main suggestion is that the logic can be simplified using the hasParameter
method on the HttpRequest
object, this should avoid having to manually parse out elements from the URL / body.
For example:
var parameterNames = Set.of("dest", "redirect", "uri"); // ...
var request = requestResponse.request();
for (String param : parameterNames) {
if (request.hasParameter(param, HttpParameterType.URL) || request.hasParameter(param, HttpParameterType.BODY)) {
return true;
}
}
return false;
Hello, Thank you for your valuable feedback on my previous submission. Based on your suggestions, I have made the following updates to the Bambda:
I believe these changes have significantly improved the functionality and efficiency of the Bambda. I look forward to any further suggestions or feedback you might have. Thank you once again for your guidance and support.
|
I have utilized a Set to store the list of vulnerable parameters. This approach helps to efficiently manage the parameters and ensures that there are no duplicates, which aligns with the best practices for handling collections in Java. I have carefully reviewed the list of parameters and removed any duplicates that were previously present. This step was necessary to resolve the IllegalArgumentException caused by duplicate elements in the Set. I have implemented the hasParameter method as per your guidance. This method enhances the code by streamlining the process of checking for the presence of vulnerable parameters in both the URL and the body of the HTTP request.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Many thanks for your submission and making the suggested changes.
Looks good 👍
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍 Thanks for making the changes!
Thank you. @PortSwiggerWiener , @ps-porpoise. |
This
.bambda
file serves as a filter for the Burp Suite tool, identifying HTTP requests with parameters listed in the OWASP Top 25 vulnerabilities. It's designed to help security professionals quickly pinpoint potentially risky parameters.Bambda Contributions
@author
annotation and suitable description