Skip to content

Commit 92d4a0b

Browse files
Burp Enterprise renamed to Burp DAST (#12604)
* Burp Enterprise renamed to Burp DAST * Burp Enterprise renamed to Burp DAST * Burp Enterprise renamed to Burp DAST
1 parent 6fa0813 commit 92d4a0b

File tree

11 files changed

+31
-27
lines changed

11 files changed

+31
-27
lines changed

docs/content/en/connecting_your_tools/parsers/file/burp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ toc_hide: true
44
---
55
### File Types
66
DefectDojo parser accepts Burp Issue data as an .xml file.
7-
To parse an HTML file instead, use this method: https://documentation.defectdojo.com/integrations/parsers/file/burp_enterprise/
7+
To parse an HTML file instead, use this method: https://documentation.defectdojo.com/integrations/parsers/file/burp_suite_dast/
88

99
When the Burp report is generated, **the recommended option is Base64
1010
encoding both the request and response fields** - e.g. check the box

docs/content/en/connecting_your_tools/parsers/file/burp_graphql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
2-
title: "Burp GraphQL"
2+
title: "Burp Suite DAST GraphQL"
33
toc_hide: true
44
---
5-
Import the JSON data returned from the BurpSuite Enterprise GraphQL API. Append all the
5+
Import the JSON data returned from the BurpSuite DAST GraphQL API. Append all the
66
issues returned to a list and save it as the value for the key "Issues". There is no need
77
to filter duplicates, the parser will automatically combine issues with the same name.
88

docs/content/en/connecting_your_tools/parsers/file/burp_enterprise.md renamed to docs/content/en/connecting_your_tools/parsers/file/burp_suite_dast.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,26 @@
11
---
2-
title: "Burp Enterprise Scan"
2+
title: "Burp Suite DAST Scan (formerly known as Burp Enterprise)"
33
toc_hide: true
44
---
55

66
## Overview
7-
The Burp Enterprise Scan parser processes HTML reports from Burp Enterprise Edition and imports the findings into DefectDojo. The parser extracts vulnerability details, severity ratings, descriptions, remediation steps, and other metadata from the HTML report.
7+
The Burp Suite DAST Scan parser processes HTML reports from Burp Suite DAST and imports the findings into DefectDojo. The parser extracts vulnerability details, severity ratings, descriptions, remediation steps, and other metadata from the HTML report.
88

99
## Supported File Types
1010
The parser accepts a Standard Report as an HTML file. To parse an XML file instead, use the [Burp XML parser](https://docs.defectdojo.com/en/connecting_your_tools/parsers/file/burp/).
1111

12-
See the Burp documentation for information on how to export a Standard Report: [PortSwigger Enterprise Edition Downloading reports](https://portswigger.net/burp/documentation/enterprise/work-with-scan-results/generate-reports)
12+
See the Burp documentation for information on how to export a Standard Report: [Burp Suite DAST Downloading reports](https://portswigger.net/burp/documentation/dast/user-guide/work-with-scan-results/generate-reports)
1313

1414
## Standard Format HTML (Main Format)
1515

1616
### Total Fields in HTML
17-
- Total data fields in Burp Enterprise Scan HTML output: 15
17+
- Total data fields in Burp Suite DAST Scan HTML output: 15
1818
- Total data fields parsed into DefectDojo finding: 13
1919
- Total data fields NOT parsed: 2
2020

2121
### Standard Format Field Mapping Details
2222

23-
| Data Field # | Burp Enterprise Scan Data Field | DefectDojo Finding Field | Parser Line # | Notes |
23+
| Data Field # | Burp Suite DAST Scan Data Field | DefectDojo Finding Field | Parser Line # | Notes |
2424
|-------------|--------------------------------|--------------------------|--------------|-------|
2525
| 1 | Title | title | 101, 165 | Extracted from issue container h2 element and table rows with "issue-type-row" class |
2626
| 2 | Severity | severity | 101, 168 | Extracted from table rows, mapped directly (High/Medium/Low/Info) |
@@ -39,7 +39,7 @@ See the Burp documentation for information on how to export a Standard Report: [
3939
| 15 | Issue ID/Anchor | Not Parsed | - | HTML anchor tags like "#7459896704422157312" are not extracted |
4040

4141
### Field Mapping Details
42-
The parser has different handling logic for various sections of the Burp Enterprise report:
42+
The parser has different handling logic for various sections of the Burp Suite DAST report:
4343

4444
- For table content sections (using `table_contents_xpath`), the parser extracts:
4545
- Base endpoint from h1 elements (e.g., "https://instance.example.com")
@@ -101,7 +101,7 @@ This parser has special handling for different section types within the HTML rep
101101
- It extracts CWE numbers and vulnerability classifications from reference sections
102102

103103
### Sample Scan Data
104-
Sample Burp Enterprise Scan scans can be found [here](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/burp_enterprise).
104+
Sample Burp Suite DAST Scan scans can be found [here](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/burp_suite_dast).
105105

106106
### Link to Tool
107-
[Burp Enterprise Edition](https://portswigger.net/burp/enterprise)
107+
[Burp Suite DAST](https://portswigger.net/burp/dast)

dojo/settings/settings.dist.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1249,6 +1249,7 @@ def saml2_attrib_map_format(din):
12491249
"Aqua Scan": ["severity", "vulnerability_ids", "component_name", "component_version"],
12501250
"Bandit Scan": ["file_path", "line", "vuln_id_from_tool"],
12511251
"Burp Enterprise Scan": ["title", "severity", "cwe"],
1252+
"Burp Suite DAST": ["title", "severity", "cwe"],
12521253
"Burp Scan": ["title", "severity", "vuln_id_from_tool"],
12531254
"CargoAudit Scan": ["vulnerability_ids", "severity", "component_name", "component_version", "vuln_id_from_tool"],
12541255
"Checkmarx Scan": ["cwe", "severity", "file_path"],
@@ -1474,9 +1475,10 @@ def saml2_attrib_map_format(din):
14741475
"AWS Prowler Scan": DEDUPE_ALGO_HASH_CODE,
14751476
"AWS Prowler V3": DEDUPE_ALGO_UNIQUE_ID_FROM_TOOL,
14761477
"AWS Security Finding Format (ASFF) Scan": DEDUPE_ALGO_UNIQUE_ID_FROM_TOOL,
1477-
"Burp REST API": DEDUPE_ALGO_UNIQUE_ID_FROM_TOOL,
14781478
"Bandit Scan": DEDUPE_ALGO_HASH_CODE,
1479+
"Burp REST API": DEDUPE_ALGO_UNIQUE_ID_FROM_TOOL,
14791480
"Burp Enterprise Scan": DEDUPE_ALGO_HASH_CODE,
1481+
"Burp Suite DAST Scan": DEDUPE_ALGO_HASH_CODE,
14801482
"Burp Scan": DEDUPE_ALGO_HASH_CODE,
14811483
"CargoAudit Scan": DEDUPE_ALGO_HASH_CODE,
14821484
"Checkmarx Scan detailed": DEDUPE_ALGO_UNIQUE_ID_FROM_TOOL,

dojo/tools/burp_graphql/parser.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ def get_scan_types(self):
1414
return ["Burp GraphQL API"]
1515

1616
def get_label_for_scan_types(self, scan_type):
17-
return scan_type # no custom label for now
17+
return "Burp Suite DAST GraphQL API"
1818

1919
def get_description_for_scan_types(self, scan_type):
20-
return "Import Burp Enterprise Edition findings from the GraphQL API"
20+
return "Import Burp Suite DAST findings from the GraphQL API"
2121

2222
def get_findings(self, filename, test):
2323
data = json.load(filename)

dojo/tools/burp_enterprise/parser.py renamed to dojo/tools/burp_suite_dast/parser.py

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
logger = logging.getLogger(__name__)
99

1010

11-
class BurpEnterpriseParser:
11+
class BurpSuiteDASTParser:
1212
vulnerability_list_xpath = (
1313
"/html/body/div/div[contains(@class, 'section details')]/div[contains(@class, 'issue-container')]"
1414
)
@@ -20,13 +20,15 @@ class BurpEnterpriseParser:
2020
references_headers = ["vulnerability classifications", "references"]
2121

2222
def get_scan_types(self):
23-
return ["Burp Enterprise Scan"]
23+
return ["Burp Suite DAST Scan", "Burp Enterprise Scan"]
2424

2525
def get_label_for_scan_types(self, scan_type):
26-
return scan_type # no custom label for now
26+
return scan_type if scan_type == "Burp Suite DAST Scan" else "Burp Enterprise Scan (RENAMED to Burp Suite DAST Scan)"
2727

2828
def get_description_for_scan_types(self, scan_type):
29-
return "Import Burp Enterprise Edition findings in HTML format"
29+
if scan_type == "Burp Suite DAST Scan":
30+
return "Import Burp Suite DAST findings in HTML format"
31+
return "Import Burp Enterprise Edition findings in HTML format (RENAMED to Burp Suite DAST Scan)"
3032

3133
def get_findings(self, filename, test):
3234
tree = html.parse(filename)

dojo/tools/factory.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ def get_scan_types_sorted():
6464

6565
def get_choices_sorted():
6666
inactive_test_types = get_inactive_test_types()
67-
res = [(key, key) for key in PARSERS if key not in inactive_test_types]
67+
res = [(key, PARSERS[key].get_label_for_scan_types(key)) for key in PARSERS if key not in inactive_test_types]
6868
return sorted(res, key=lambda x: x[1].lower())
6969

7070

0 commit comments

Comments
 (0)