False Positives for Timestamp Disclosure
See original GitHub issueDescribe the bug Getting false positives for Rule 10096 Timestamp Disclosure with values that could never be timestamps - eg, those beginning/ending in the following:
- ending in
%
, eg.33333333%
- ending in
em
, eg.33333333em
- ending in
rem
, eg.33333333rem
- beginning with a
.
, eg1.1592500000000001
- beginning with other numbers, eg
000000000000000000000000000000001
To Reproduce Steps to reproduce the behavior:
- Run an active scan on a website containing the semantic offline stylesheet (sorry don’t have an example site)
- See false positives
Expected behavior Scan excludes false positives that are identifiable by regex rules and prefixes/suffixes
Screenshots
Software versions
- ZAP: 2.11.1
- OS: Windows 10
- Java Version: Oracle Corporation 1.8.0_311
- Browser: N/A
Would you like to help fix this issue? No experience with Java, but could probably help.
Issue Analytics
- State:
- Created 2 years ago
- Comments:6 (3 by maintainers)
Top Results From Across the Web
False Positives: Timestamp Disclosure - Unix · Issue #5837
Describe the bug. These are almost always false positives for me. For example, here is my current set of timestamps being reported:.
Read more >Highest False Positives Last Month - OWASP ZAP
Position Alert Status Rule Type
1 Loosely Scoped Cookie release Passive
2 Information Disclosure ‑ Suspicious Comments release Passive
3 Cross‑Domain Misconfiguration release Passive
Read more >Disable the DAST Unix Timestamp Vulnerability Check - GitLab
The Unix Timestamp Disclosure vulnerability should be disabled by default because it often causes False Positive results.
Read more >Managing False Positives in OWASP Zed Attack Proxy (ZAP)
The false positives were supposed to be easy to remove according to their documentation on the Baseline Scan.
Read more >ICMP Timestamp Response and Request Vulnerability Fix
The Vulnerabilities in ICMP Timestamp Request is prone to false positive reports by most vulnerability assessment solutions. AVDS is alone in using behavior ......
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
After the updated rule is released please let us know if you see further occurrences. Also remember to check the response(s) for multiple occurrences of the evidence string.
I put together a UnitTest for the specific cases you mentioned, the only one that currently makes it through is the first one. Alerts are not raised for the rest.
Handling the first case is as simple as changing the regex from
\\b[0-9]{8,10}\\b
to\\b[0-9]{8,10}\\b(?!%)
.Would you be able to provide full responses that you got alerts on? The evidence highlighting in ZAP’s alerts is based on first match (so you might be being mislead).