Our customer requires us to run the OWASP ZAP tool against our web application (ASP.NET 4.5.2, Webforms) and we cannot have any high priority findings in the report.
We've done the analysis, and OWASP ZAP reports two vulnerabilities which both are most likely "false positives":
- Remote OS command execution
- SQL injection
The Remote OS command execution seems bogus, because we're not executing any OS commands anywhere - so how could any attackers get our code to execute his command on a remote machine?
And the SQL injection seems extremely bogus since we're using Entity Framework everywhere which uses properly parametrized queries which are the gold standard against any SQL injection ....
Have other folks had these kinds of "false positives" with OWASP ZAP? Are there any "known issues" documented anywhere that we could use to prove that the tool is wrong - not our code?