From d2942a73dd23974b2f74a868bb388d26e7f0f5c3 Mon Sep 17 00:00:00 2001 From: AmirHossein Raeisi <96957814+Ahsraeisi@users.noreply.github.com> Date: Sun, 1 Sep 2024 10:58:28 +0330 Subject: [PATCH] Update 5.5.2.yaml Signed-off-by: AmirHossein Raeisi <96957814+Ahsraeisi@users.noreply.github.com> --- templates/dast/5.5.2.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/templates/dast/5.5.2.yaml b/templates/dast/5.5.2.yaml index 353012c..13f7fe5 100644 --- a/templates/dast/5.5.2.yaml +++ b/templates/dast/5.5.2.yaml @@ -9,7 +9,7 @@ info: reference: - https://github.com/andresriancho/w3af/blob/master/w3af/plugins/audit/xxe.py - https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/vulnerabilities/xxe/generic-xxe.yaml - - https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/07-Input_Validation_Testing/07-Testing_for_XML_Injection + - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/07-Testing_for_XML_Injection tags: asvs,5.5.2 description: | Verify that the application correctly restricts XML parsers to only use the most restrictive configuration possible and to ensure that unsafe features such as resolving external entities are disabled to prevent XML eXternal Entity (XXE) attacks. @@ -59,4 +59,4 @@ http: - type: word part: interactsh_protocol words: - - "http" \ No newline at end of file + - "http"