Examples of hybrid analysis

Here are some examples of hybrid analysis.

In this report screen capture, both DAST and SAST discovered a Cross-Site Scripting vulnerability.



If we look at the About this Issue report for DAST, the issue was discovered in a parameter 'uid' by removing the ASP.NET_SessionID cookie and injecting '1234"/>alert(1558)</script>' into the value of parameter 'uid'. Appscan marked the test as vulnerable, because it has successfully embedded a script in the response, and it will be executed once the page is loaded in the user's browser. This means the application is vulnerable to Cross-Site Scripting on this URL: http://demo.testfire.net/bank/login.aspx.

If we look at the About this Issue report for SAST, the code scan discovered the same vulnerability on C:\WebTest\Default.aspx.cs, the source code page for http://demo.testfire.net/bank/login.aspx.

Because the URL, entity and issue type match, it is considered a direct correlation.