How to mark vulnerability as false-positive?

I conducted the scan and, during the analysis, I discovered that there are numerous false positives. These include:

  1. Vulnerabilities are not applicable to the specific Ubuntu version.

  2. The PHP version is the latest, but the scanner detected that it is outdated.

How can I mark these as false positives to avoid seeing them in future scans?

Based on the description it sounds more like you want to adjust your result filter to only show results with a higher QoD (because PHP VTs on Linux usually have a low QoD):

By default, only results that were detected by VTs with a QoD of 70 % or higher are displayed. Results detected by a test with a lower QoD are prone to false positives. The filter can be adjusted to show results with a lower QoD (see Chapter 7.3.1).

Manual: 10.2.6 Quality of Detection Concept

If you still want to go the route of creating overrides having a look at the existing documentation should yield the required info:

Manual: 10.8 Using Overrides and False Positives

2 Likes

@test_qweqwe It is very typical that version-based checks fail, because fixes are often backported (i.e., applied without updating the version number). A common method is to disable version information on the server (for example, expose_php=off)

Eero

This topic was automatically closed after 90 days. New replies are no longer allowed.