From c3fd0249f50aa8f2bcb1e4da165c9509172b9abf Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ond=C5=99ej=20Sur=C3=BD?= Date: Tue, 25 Apr 2017 16:32:06 +0200 Subject: [PATCH] Revert "Downgrade BREACH attack to MEDIUM severity (as it depends on many things)" This reverts commit 3d2666ab7903cb5a5ebaf107aa39ccd9c131cbef. --- testssl.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/testssl.sh b/testssl.sh index 92a9106..ed5bad5 100755 --- a/testssl.sh +++ b/testssl.sh @@ -9548,7 +9548,7 @@ run_breach() { pr_svrty_high "potentially NOT ok, uses $result HTTP compression." outln "$disclaimer" outln "$spaces$when_makesense" - fileout "breach" "MEDIUM" "BREACH: potentially VULNERABLE, uses $result HTTP compression. $disclaimer ($when_makesense)" "$cve" "$cwe" "$hint" + fileout "breach" "HIGH" "BREACH: potentially VULNERABLE, uses $result HTTP compression. $disclaimer ($when_makesense)" "$cve" "$cwe" "$hint" ret=1 fi # Any URL can be vulnerable. I am testing now only the given URL!