Active scanner rules (beta) Add-on Changelog


Changelog

All notable changes to this add-on will be documented in this file.

The format is based on Keep a Changelog.

65 - 2026-04-14

Changed

  • Dependency update.
  • Maintenance changes.
  • The scan rules now have new tags for the OWASP Top 10 2025, and API Top 10 2023.
  • Depends on an updated version of the Common Library add-on.
  • The Possible Username Enumeration scan rule now includes example alert functionality for documentation generation purposes (Issue 6119).

64 - 2025-12-15

Added

  • The following scan rules were added, having been promoted from Alpha:
    • NoSQL Injection - MongoDB
    • NoSQL Injection - MongoDB (Time Based)

Changed

  • Update minimum ZAP version to 2.17.0.

Removed

  • The following scan rules were removed, having been promoted to Release:
    • Exponential Entity Expansion (Billion Laughs Attack)
    • HTTP Only Site
    • HTTPS Content Available via HTTP
    • ShellShock - CVE-2014-6271

63 - 2025-11-04

Added

  • SYSTEMIC tag to selected rules.

Changed

  • Depends on an updated version of the Common Library add-on.
  • Reduced usage of error level logging.

62 - 2025-09-18

Added

  • QA CICD policy tag to selected rules.

Changed

  • Update alert references to latest locations to fix 404s and resolve redirections.

61 - 2025-09-10

Changed

  • Add alert references to CORS Header scan rule alerts (Issue 7100).

60 - 2025-09-02

Changed

  • Depends on an updated version of the Common Library add-on.
  • Add help details about behavior of scan rules which leverage OAST (Issue 8682)

Fixed

  • Error logs to always include stack trace.

Added

  • Rules (as applicable) have been tagged in relation to HIPAA and PCI DSS.
  • The 403 Bypass scan rule now has a CWE reference.
  • The Shell Shock scan rule now has the TEST_TIMING alert tag.

59 - 2025-06-20

Changed

  • The extension now has a user friendly name for use in the GUI.
  • Depends on an updated version of the Common Library add-on.

Added

  • All rules have been tagged of interest to Penetration Testers.

58 - 2025-03-04

Changed

  • Replace usage of CWE-200 for the Insecure HTTP Method scan rule (Issue 8714).
  • Include exception message of failed attacks in the Server Side Request Forgery scan rule.

Fixed

  • Address potential/theoretical reDoS issue in the Insecure HTTP Method scan rule.

57 - 2025-01-15

Changed

  • Update minimum ZAP version to 2.16.0.
  • The following scan rules now use more specific CWE IDs:
    • Proxy Disclosure (Issue 8713)
    • Possible Username Enumeration (Issue 8715)
  • Remove double dot in skipped message of scan rules that use the Active Scan OAST service.

Fixed

  • Address exception when scanning a message without path with Possible Username Enumeration scan rule.
  • The WSTG alert tags on the HTTP Only Site scan rule.

Added

  • Standardized Scan Policy related alert tags on various rules.

56 - 2024-09-24

Changed

  • Log exception details in Out of Band XSS scan rule.
  • Maintenance changes.
  • The Anti-CSRF Tokens Check scan rule now only considers GET requests at Low Threshold (Issue 7741).

Fixed

  • Address time-based false positives in Remote Code Execution - Shell Shock scan rule (Issue 8516).

55 - 2024-09-02

Changed

  • The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119):
    • Expression Language Injection
    • Cookie Slack Detector

Fixed

  • Potential false positives in the Source Code Disclosure - File Inclusion scan rule when responses are empty or the original message resulted in an error to start with (Issue 8517).
  • A spacing/punctuation issue in the Cookie Slack Detector scan rule, whereby the Other Info field would not have a space after colons and before lists of cookie names.

54 - 2024-07-22

Changed

  • Update minimum ZAP version to 2.15.0.
  • Maintenance changes.

Fixed

  • Fixed regex for Relative Path Confusion, which detected absolute URL as relative.
  • Alert text for various rules has been updated to more consistently use periods and spaces in a uniform manner.

53 - 2024-03-28

Changed

  • Change links to use HTTPS in other info of Insecure HTTP Method (Issue 8262).

52 - 2024-03-25

Changed

  • Updated reference for scan rule: Possible Username Enumeration (Issue 8262)
  • Cookie Slack Detector scan rule now has a more specific CWE.
  • Possible Username Enumeration scan rule now includes CWE-204 as a reference link.
  • The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119):
    • Relative Path Confusion
    • Integer Overflow Error

Removed

  • Removed HTTP only reference for scan rule: Integer Overflow Error (Issue 8262)

51 - 2024-02-16

Changed

  • The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119):
    • Backup File Disclosure
    • Httpoxy - Proxy Header Misuse
    • Anti-CSRF Tokens Check
    • HTTP Parameter Pollution
    • Cross-Domain Misconfiguration
  • Alerts from the HTTP Parameter Pollution scan rule are now raised with Low confidence.
  • Updated reference for scan rules (Issue 8262):
    • Session Fixation
    • Cross-Domain Misconfiguration
  • Add website alert links to the help page (Issue 8189).

50 - 2024-01-26

Changed

  • References for the following scan rules were updated (Issue 8262):
    • Exponential Entity Expansion (Billion Laughs Attack)
    • Relative Path Confusion
    • HTTPS Content Available via HTTP
    • Remote Code Execution - Shell Shock
  • The following scan rules now include example alert functionality for documentation generation purposes (Issue 6119):
    • HTTPS Content Available via HTTP
    • Remote Code Execution - Shell Shock (it now also uses Alert Refs (Issue 7100))

49 - 2024-01-16

Changed

  • Update minimum ZAP version to 2.14.0.
  • Update references for Expression Language Injection and HTTP Parameter Pollution (Issue 8262).
  • The Source Code Disclosure - SVN scan rule includes example alert functionality for documentation generation purposes (Issue 6119).

Removed

  • Help entry for the Spring Actuators scan rule (missed during previous removal/promotion).

48 - 2023-09-08

Added

  • The HTTP Only Site scan rule now includes example alert functionality for documentation generation purposes (Issue 6119).

Changed

  • Maintenance changes.
  • Depend on newer version of Common Library add-on.
  • Use vulnerability data directly from Common Library add-on.

Fixed

  • The Source Code Disclosure - File Inclusion alerts now consistently leverage the description and solution from the associated vulnerability details.

47 - 2023-07-20

Added

  • The Source Code Disclosure - File Inclusion now includes example alert functionality for documentation generation purposes (Issue 6119).
  • The following scan rules were added, having been promoted from Alpha:
    • Server Side Request Forgery
    • Text4shell (CVE-2022-42889)

Changed

  • Update minimum ZAP version to 2.13.0.

Removed

  • The following scan rules were removed, having been promoted to Release:
    • Log4Shell
    • Spring Actuator Information Leak
    • Spring4Shell
    • Server Side Template Injection
    • Server Side Template Injection (Blind)
    • XPath Injection

46 - 2023-05-03

Changed

  • Maintenance changes.
  • The Insecure HTTP Method Scan rule now allows PUT/PATCH methods, if they return JSON or XML data in response (Issue 7772).
  • The Source Code Disclosure - Git scan rule now includes example alert functionality for documentation generation purposes (Issue 6119).

45 - 2023-03-03

Changed

  • Maintenance changes.
  • The Log4Shell scan rule alerts now include Alert References and Tags.
  • The Spring4Shell scan rule now includes a CVE Alert Tag and reference link.

Fixed

  • Use same non-default port in the HTTP Only Site scan rule.

44 - 2022-12-13

Changed

  • Use lower case HTTP field names for compatibility with HTTP/2.

Fixed

  • Preserve the HTTP version in the scan rules:
    • Backup File Disclosure
    • Bypassing 403
    • Cross-Domain Misconfiguration
    • Relative Path Confusion
    • Source Code Disclosure - Git
    • Source Code Disclosure - SVN
    • Possible Username Enumeration

43 - 2022-10-27

Changed

  • Update minimum ZAP version to 2.12.0.
  • Depend on database add-on.
  • Maintenance changes.
  • Rely on Network add-on to obtain more information about socket timeouts.

Added

  • The following scan rules were added, having been promoted to Beta:
    • CORS
    • Exponential Entity Expansion
    • Forbidden Bypass
    • Log4Shell
    • Out-of-Band XSS
    • Spring4Shell
    • Spring Actuator
    • Blind SSTI
    • SSTI

Fixed

  • NPE in Source Code Disclosure File Inclusion Scan Rule

Removed

  • The following scan rules were removed, having been promoted to Release:
    • .env Information Leak
    • Cloud Metadata Attack
    • GET for POST
    • Heartbleed OpenSSL Vulnerability
    • Hidden File Finder
    • Padding Oracle
    • Remote Code Execution - CVE-2012-1823
    • Source Code Disclosure - CVE-2012-1823
    • SQL Injection - Hypersonic (Time Based)
    • SQL Injection - MsSQL (Time Based)
    • SQL Injection - MySQL (Time Based)
    • SQL Injection - Oracle (Time Based)
    • SQL Injection - PostgreSQL (Time Based)
    • SQL Injection - SQLite
    • Trace.axd Information Leak
    • User Agent Fuzzer
    • XSLT Injection
    • XXE

42 - 2022-09-22

Changed

  • Maintenance changes.
  • Improved description, solution, and references for the Integer Overflow scan rule.
  • Added new Custom Payloads alert tag to the example alerts of the Hidden File Finder and User Agent scan rules.

Added

  • New User Agent strings to the User Agent fuzz scan rule.
  • Additional source control paths for the Hidden Files finder scan rule.

41 - 2022-06-08

Changed

  • Maintenance changes.
  • Adding more checks to Hidden File Finder scan rule.
  • The Cloud Metadata scan rule will now be attempted with additional payloads (using DNS not just IPs), and supporting Alibaba.

Fixed

  • False Positive in XSLT Injection where “Microsoft-Azure-Application-Gateway” can be returned in a 403 if the gateway detects an attack.

40 - 2022-03-15

Changed

  • Hidden File Finder scan rule, content checking has been added for .svn/entries as well as detection for wc.db.
  • Use Network add-on to detect/serve HttPoxy scan rule requests.
  • Maintenance changes.
  • The CSRF Token scan rule will now raise alerts as Medium risk (Issue 7021).

Fixed

  • Adapted Cloud Metadata Attack scan rule to use Custom Pages and active scan analyzer to help reduce false positives in certain cases (Issue 7033).
  • Generic Padding Oracle scan rule will no longer raise an alert for validation fields when the error response contains expected error patterns (Issue 6183).
  • Hidden File Finder no longer follows redirects when sending requests for potential hidden files which should make it less false positive prone (Issue 7036).

39 - 2021-12-13

Changed

  • Update minimum ZAP version to 2.11.1.
  • Maintenance changes.

38 - 2021-12-06

Changed

  • Dependency updates.
  • XxeScanRule: Use Out-of-band payloads in addition to existing attacks.

Added

  • OWASP Web Security Testing Guide v4.2 mappings where applicable.

37 - 2021-10-07

Added

  • OWASP Top Ten 2021/2017 mappings.

Changed

  • Now targeting ZAP 2.11.
  • Maintenance changes.
  • Use OAST Callbacks for the XXE Scan Rule.
  • Backup File Disclosure Scan Rule: When checkout a parent folder for 404 behavior assume a minimum folder name length of four to further eliminate chance of collision on short folder names (Issue 5330).

36 - 2021-09-17

Removed

  • Apache Range Header DoS (CVE-2011-3192) scan rule has been retired (Issue 6516)

35 - 2021-07-06

Fixed

  • Correct dependency requirements.

34 - 2021-06-17

Changed

  • Now using 2.10 logging infrastructure (Log4j 2.x).
  • The .env file scan rule now performs even better checks to reduce false positives (Issue 6099, 6629).
  • The trace.axd file scan rule now performs a content check to reduce false positives (Issue 6517).
  • XML External Entity Attack scan rule changed to detect a possible XML File Reflection Attack when XML validation is present. (Issue 6204)
  • Added/updated the details of some alerts (some changes might break Alert Filters)
    • Backup File Disclosure
      • The attack, evidence, and other info will use URIs in encoded form.
    • Insecure HTTP Method
      • The URI field will be in encoded form.
    • Integer Overflow
      • Added evidence
    • Relative Path Confusion
      • The attack and URI field will use URIs in encoded form.
    • Source Code Disclosure - File Inclusion
      • The URI field will be in encoded form.
    • Source Code Disclosure - Git
      • The URI field will be in encoded form.
    • Source Code Disclosure - SVN
      • The URI field will be in encoded form.
    • SQL Injection - Hypersonic SQL
      • The URI field will be in encoded form.
    • SQL Injection - MySQL
      • The URI field will be in encoded form.
    • SQL Injection - Oracle
      • The URI field will be in encoded form.
    • SQL Injection - PostgreSQL
      • The URI field will be in encoded form.
    • SQL Injection - SQLite
      • Evidence is now the string that was matched in the response
      • The URI field will be in encoded form.
    • XPath Injection
      • Added evidence
  • The Source Code Disclosure - File Inclusion scan rule was modified to make use of the Dice algorithm for calculating the match percentage, thus improving its performance.
  • Update links to repository.
  • Maintenance changes.

Fixed

  • Add missing file, used by Hidden File Finder scan rule.
  • Correct Context check in scan rules:
    • Session Fixation
    • Possible Username Enumeration

33 - 2020-12-15

Changed

  • Now targeting ZAP 2.10.
  • The following scan rules now support Custom Page definitions:
    • Hidden Files
    • HTTPS as HTTP
    • Insecure HTTP Methods
    • Integer Overflow
    • Padding Oracle
    • Remove Code Execution CVE-2012-1823
    • Session Fixation
    • Source Code Disclosure CVE-2012-1823
    • Source Code Disclosure Git
    • Source Code Disclosure SVN

32 - 2020-11-26

Changed

  • XML External Entity Attack scan rule changed to parse response body irrespective of the HTTP response status code. (Issue 6203)
  • XML External Entity Attack scan rule changed to skip only Remote File Inclusion Attack when Callback extension is not available.
  • Maintenance changes.
  • The Relative Path Confusion scan rule no longer treats ‘href="#"’ as a problematic use.

Fixed

  • Terminology.
  • Correct reason shown when the XML External Entity Attack scan rule is skipped.
  • SocketTimeoutException in the Proxy Disclosure scan rule.

Added

  • The following scan rules were promoted to Beta: Cloud Meta Data, .env File, Hidden Files, XSLT Injection (Issue 6211).

Removed

  • The following scan rules were removed and promoted to Release: ELMAH Information Leak, .htaccess Information Leak (Issue 6211).

31 - 2020-09-02

Changed

  • ELMAH Information Leak ensure that test requests are appropriately rebuilt for this scan rule (Issue 6129).
  • SQL rules changed to double check timing attacks
  • Significantly reduced the number of attacks made by the SQLite rule

30 - 2020-07-23

Changed

  • Anti-CSRF Tokens Check address potential false positives by only analyzing HTML responses (Issue 6089).

29 - 2020-07-22

Changed

  • Maintenance Changes.
  • Backup File Disclosure: don’t raise issues for non-success codes unless at LOW threshold (Issue 6059).
  • ELMAH Information Leak: don’t raise issues unless content looks good unless at LOW threshold (Issue 6076).
  • Session Fixation scan rule fix potential false positive on session cookie HttpOnly, and Secure flags (Issue 6082).

28 - 2020-06-01

Added

  • Add info and repo URLs.
  • Add links to the code in the help.

Changed

  • Update minimum ZAP version to 2.9.0.
  • Backup File Disclosure scan rule - updated CWE to 530, added reference links to alerts, made sure WASC and CWE identifiers are included in alerts.
  • Maintenance changes.
  • Updated owasp.org references (Issue 5962).

Fixed

  • Use correct risk (INFO) in User Agent Fuzzer, to run later in the scan.

27 - 2019-12-16

Added

  • The following scan rules were promoted from Alpha to Beta:
    • Apache Range Header DoS
    • Cookie Slack Detector
    • ELMAH Information Leak
    • GET for POST
    • .htaccess Information Leak
    • HTTP Only Site
    • Httpoxy - Proxy Header Misuse
    • HTTPS Content Available via HTTP
    • Proxy Disclosure
    • Relative Path Confusion
    • Source Code Disclosure - File Inclusion
    • Source Code Disclosure - Git
    • SQL Injection - MsSQL
    • SQL Injection - SQLite
    • Trace.axd Information Leak
    • User Agent Fuzzer

Changed

  • Add dependency on Custom Payloads add-on.
  • Fixed ArrayIndexOutOfBoundsException issue in XML External Entity Attack scan rule.
    • Now removes original XML header in “Local File Reflection Attack”.
  • Maintenance changes.
  • Update minimum ZAP version to 2.8.0.
  • Elmah scan rule updated to include a response content check, and vary alert confidence values accordingly.

26 - 2019-07-11

  • Fix FP in “Source Code Disclosure SVN” where the contents exactly matches, and only report issues with less evidence at a LOW threshold.
  • Fix NPE in “Session Fixation” scan rule when the path of the request URI is null.
  • Changed “Source Code Disclosure CVE20121823” to only analyze JS responses when a LOW alert threshold is used.

25 - 2019-06-07

  • Correct HTTP message usage in Insecure HTTP Method scanner.
  • Fix missing resource messages with Cross-Domain Misconfiguration scanner.
  • Remove Source Code Disclosure WEB-INF Scanner (promoted to release Issue 4448).
  • Report source code disclosure alerts at Medium instead of High
  • Bundle Diff Utils library instead of relying on core.

24 - 2018-07-31

  • Maintenance changes.
  • Issue 1142: Logic and alert risk ratings modified.
  • Correct timeout per attack strength in Heartbleed OpenSSL Vulnerability scanner.
  • Issue 174: Added further method checks to the Insecure HTTP Methods Scanner.
  • Skip “Source Code Disclosure - /WEB-INF folder” on Java 9+ (Issue 4038).
  • BackupFileDisclosure - Handle empty “backup” responses.

23 - 2018-01-19

  • At HIGH threshold only perform CSRF checks for inScope messages (Issue 1354).

22 - 2017-11-24

  • Fix FP in “Source Code Disclosure - /WEB-INF folder” on successful responses (Issue 3048).
  • Fix FP in “Integer Overflow Error” on 500 error responses (Issue 3064).
  • Support security annotations for forms that dont need anti-CSRF tokens.
  • Changed XXE rule to use new callback extension.
  • Notify of messages sent during Heartbleed scanning (Issue 2425).
  • Fix false positive in Code Disclosure - CVE-2012-1823 on image content (Issue 3846).
  • Fix false positive in Backup File Disclosure scanner on 403 responses (Issue 3911).
  • CsrfTokenScan : Keep session cookies instead of deleting all of them

21 - 2016-10-24

  • Support changing the length of time used in timing attacks via config options.
  • Support ignoring specified forms when checking for CSRF vulnerabilities.
  • Do not attempt to parse empty cross domain policy files.
  • Correct creation of attack URL in Source Code Disclosure - CVE-2012-1823.
  • Correct creation of attack URL in Remote Code Execution - CVE-2012-1823.
  • Respect OS techs included when scanning with Remote Code Execution - CVE-2012-1823.
  • Adjust log levels of some scanners, from INFO to DEBUG.

20 - 2016-06-02

  • Prevent XXE vulnerability.
  • Issue 2174: Adjust logging, catch specific exceptions.
  • Issue 2178: SQLInjectionMySQL - adjust logging, catch specific exceptions.
  • Issue 2179: SQLInjectionPostgresql - adjust logging, catch specific exceptions.
  • Issue 2272: SQLInjectionHypersonic - adjust logging, catch specific exceptions.
  • Issue 2177: SourceCodeDisclosureSVN - adjust logging.

19 - 2016-02-05

  • Adding Integer Overflow Scanner.
  • Issue 823: i18n (internationalise) beta active scan rules.
  • Issue 1713: Source Code Disclosure SVN Throws False Positive - Fixed.
  • Add CWE and WASC IDs to active scanners which may have been lacking those details.
  • Create help for scanners which were missing entries.
  • Issue 2180: Adjust logging, and implement plugin skip if runtime requirements not met.
  • Security fixes, to be detailed later.

18 - 2015-12-04

  • Removing Format String.
  • Fix unloading issue (Issue 1972).
  • Slightly improve performance of “LDAP Injection” and “Username Enumeration”.
  • Demoted LDAP rule due to performance issues

17 - 2015-09-07

  • Moved Format String scanner from alpha to beta.
  • Removing Buffer Overflow.

16 - 2015-08-24

  • Minor code changes.
  • Change scanners to honour the technologies enabled (Issue 1618).
  • Added Buffer Overflow scanner to beta (Issue 1605).

15 - 2015-04-13

  • Solved Comparison operator in XpathInjectionPlugin (Issue 1189).
  • Promoted Backup File Disclosure to beta
  • Promoted Cross Domain Scanner to beta
  • Promoted HeartBleed to beta
  • Promoted Insecure HTTP Method to beta
  • Promoted Remote Code Execution - CVE2012-1823 to beta
  • Promoted Shell shock to beta
  • Promoted Source Code Disclosure - CVE2012-1823 to beta
  • Promoted Source Code Disclosure - SVN to beta
  • Promoted Source Code Disclosure - WEB-INF to beta
  • Fixed minor regex escaping issue with Source Code Disclosure - SVN (Issue 1377)
  • Updated for ZAP 2.4

14 - 2014-10-20

  • Solved Comparison operator in XpathInjectionPlugin (Issue 1189).
  • Promoted Backup File Disclosure to beta
  • Promoted Cross Domain Scanner to beta
  • Promoted HeartBleed to beta
  • Promoted Insecure HTTP Method to beta
  • Promoted Remote Code Execution - CVE2012-1823 to beta
  • Promoted Shell shock to beta
  • Promoted Source Code Disclosure - CVE2012-1823 to beta
  • Promoted Source Code Disclosure - SVN to beta
  • Promoted Source Code Disclosure - WEB-INF to beta

13 - 2014-04-10

  • Promoted new XXE Plugin to test for remote and local XML External Entity Vulnerability.
  • Promoted new PaddingOracle plugin to test for possible encryption padding errors.
  • Promoted PXSS tests to beta.
  • Promoted Command Injection release.
  • Promoted new Expression Language Plugin to test JSP EL Injection.
  • Changed help file structure to support internationalisation (Issue 981).
  • Added content-type to help pages (Issue 1080).
  • Updated add-on dir structure (Issue 1113).

12 - 2014-02-15

  • Fixed a ClassNotFoundException while installing the add-on.
  • Removed the scanner “Server Side Code Injection Plugin” (promoted to “Active scanner rules” add-on).
  • Changed the “LDAP Injection” scanner to scan the parameters defined in the “Active Scan” options.
  • Updated the “LDAP Injection” scanner to perform logic-based LDAP injection vulnerability detection

11 - 2013-10-14

  • Corrected IDs to prevent clash

10 - 2013-09-27

  • Fixed various errors logged

9 - 2013-09-11

  • Updated to be compatible with 2.2.0

5 - 2013-06-18

  • Fixed NullPointerExceptions when scanning with “Anti CSRF tokens scanner”

4 - 2013-05-13

  • Fixed a MissingResourceException when scanning with “Anti CSRF tokens scanner”

3 - 2013-01-25

  • Moved SQL Injection to release, tweaked SQL timing rules names

2 - 2013-01-17

  • Updated to support new addon format