A penetration test using OWASP Zap is finding a number of Path Traversal 'vulnerabilities' but either the report isn't telling me the whole story, or they seem perfectly safe to me. Eg:
URL: http://[xxxx]/News/GetContactsList/2
Parameter: Id
Attack: 2
"2" is the id of the calling entity, so required by our system. The same kind of thing is obviously used in lots of places, but this is the only time Zap complains. It finds a few examples, generally by replacing the 2 with another integer, or passing a perfectly valid string in another parameter "PressContacts".
In MVC, these are bound to ints and a list of ints, so sanitised as far as I can tell.
How can I either find out exactly what the issue is, or tell Zap it's barking up the wrong tree? We have different MVC actions that respond to GET and POST, and the report isn't clear which one it's hitting.
Apologies in advance if I'm missing something really obvious. This is my first time using Zap so maybe I've just completely misunderstood something.