Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provide possibility to define custom scan identiier in SecHub configuration file #3644

Closed
de-jcup opened this issue Nov 25, 2024 · 1 comment
Labels

Comments

@de-jcup
Copy link
Member

de-jcup commented Nov 25, 2024

Situation

Currently when a web scan is running, SecHub sends an header X-SECHUB-DAST with the job uuid inside.

It is also possible to define a custom header with an explicit value.

Why is this interesting? Because this is a good way to identify if the web site is really under attack or it is a web scan by SecHub...

Problem

When it comes to triage (is this from SecHub or a real attack) it is currently not easy to automate this. An attacker could generate some random uuids and it could look like a valid SecHub scan.

Wanted

As a SecHub project I want to be able to define my own (internal known) identifier for X-SECHUB-DAST which can be used for automated triage

Solution

Inside the SecHub configuration file the users are able to define their own sechub-identifier

{
   "apiVersion" : "1.0",
   "identifier" : "this-is-my-internal-identifier",
   // ...
}

If the identifier is defined inside the configuration file, at a web scan the header X-SECHUB-DAST will be set with the custom scan identifier. If it is not set, X-SECHUB-DAST will contain as a fallback the SecHub jobuuid (as before)

@de-jcup
Copy link
Member Author

de-jcup commented Nov 26, 2024

Will be closed in favor of

@de-jcup de-jcup closed this as completed Nov 26, 2024
@de-jcup de-jcup added the wontfix This will not be worked on label Nov 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant