Skip to content

Commit bcb5799

Browse files
authored
Merge pull request #3568 from zapbot/update-alerts
Update alert pages
2 parents 061d9e0 + 753a826 commit bcb5799

File tree

5 files changed

+36
-2
lines changed

5 files changed

+36
-2
lines changed

site/content/docs/alerts/50007-1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "GraphQL Endpoint Supports Introspection"
33
alertid: 50007-1
44
alertindex: 5000701
55
alerttype: "Tool"
6-
alertcount: 2
6+
alertcount: 3
77
status: alpha
88
type: alert
99
risk: Informational

site/content/docs/alerts/50007-2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "GraphQL Server Implementation Identified"
33
alertid: 50007-2
44
alertindex: 5000702
55
alerttype: "Tool"
6-
alertcount: 2
6+
alertcount: 3
77
status: alpha
88
type: alert
99
risk: Informational
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
title: "GraphQL Circular Type Reference"
3+
alertid: 50007-3
4+
alertindex: 5000703
5+
alerttype: "Tool"
6+
alertcount: 3
7+
status: alpha
8+
type: alert
9+
risk: Informational
10+
solution: "Consider restructuring the schema to avoid circular references. Use IDs or foreign keys instead of direct object references. Enforce query depth limits and use pagination to control deep nested queries."
11+
references:
12+
- https://cheatsheetseries.owasp.org/cheatsheets/GraphQL_Cheat_Sheet.html#dos-prevention
13+
other: "Query -> (Organization -> Repository -> PullRequest -> Commit -> Organization)"
14+
cwe: 16
15+
wasc: 15
16+
alerttags:
17+
- CWE-16
18+
- OWASP_2021_A04
19+
- OWASP_2023_API4
20+
- WSTG-v42-APIT-01
21+
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/graphql/src/main/java/org/zaproxy/addon/graphql/ExtensionGraphQl.java
22+
linktext: "org/zaproxy/addon/graphql/ExtensionGraphQl.java"
23+
help: https://www.zaproxy.org/docs/desktop/addons/graphql-support/alerts/#id-50007
24+
---
25+
A circular reference was detected in the GraphQL schema, where object types reference each other in a cycle. This can be exploited by attackers to craft deeply recursive queries, potentially leading to Denial of Service (DoS) conditions.

site/content/docs/alerts/50007.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,9 @@ alerts:
1212
50007-2:
1313
alertid: 50007-2
1414
name: "GraphQL Server Implementation Identified"
15+
50007-3:
16+
alertid: 50007-3
17+
name: "GraphQL Circular Type Reference"
1518
code: https://github.com/zaproxy/zap-extensions/blob/main/addOns/graphql/src/main/java/org/zaproxy/addon/graphql/ExtensionGraphQl.java
1619
linktext: "org/zaproxy/addon/graphql/ExtensionGraphQl.java"
1720
---

site/data/alerttags.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -319,6 +319,9 @@ OWASP_2021_A08:
319319
OWASP_2021_A10:
320320
link: https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/
321321

322+
OWASP_2023_API4:
323+
link: https://owasp.org/API-Security/editions/2023/en/0xa4-unrestricted-resource-consumption/
324+
322325
PCI_DSS:
323326
link: https://www.zaproxy.org/docs/desktop/addons/common-library/alerttags/#compliance
324327

@@ -355,6 +358,9 @@ SYSTEMIC:
355358
TEST_TIMING:
356359
link:
357360

361+
WSTG-v42-APIT-01:
362+
link: https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/12-API_Testing/01-Testing_GraphQL
363+
358364
WSTG-v42-ATHN-01:
359365
link: https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/04-Authentication_Testing/01-Testing_for_Credentials_Transported_over_an_Encrypted_Channel
360366

0 commit comments

Comments
 (0)