Sha256: 6645055580028c3f43c301436ef46dc30bb416efa0522c8707dec35c8d9e039e

Contents?: true

Size: 921 Bytes

Versions: 2

Compression:

Stored size: 921 Bytes

Contents

require 'spec_helper'

describe 'WAVSEP false-positive SQL injection' do
    include_examples 'wavsep'

    def self.methods
        ['GET']
    end

    def self.test_cases( http_method )
        {
            'SQL Injection' => {
                url:        "SInjection-FalsePositives-#{http_method}/",
                modules:    'sqli*',

                # I maintain that these should be logged **but** be flagged as
                # untrusted.
                vulnerable: [
                    'Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp',
                    'Case08-FalsePositiveInjectionInLogin-PsAndIv-200ErrorOnUnrelatedSyntaxError.jsp'
                ]
            }
        }
    end

    easy_test do
        @framework.modules.issues.each do |issue|
            issue.trusted?.should be_false
            issue.remarks.should include :auditor
        end
    end
end

Version data entries

2 entries across 2 versions & 1 rubygems

Version Path
arachni-0.4.7 spec/external/wavsep/false_positives/sqli_spec.rb
arachni-0.4.6 spec/external/wavsep/false_positives/sqli_spec.rb