Forum Discussion
Bypass the character for Evasion technique Detected violation
Hi,
I need help to bypass or allow %", character which has triggered the Detection violation(Bad unescape) in JSON POST Data. This is legitimate request and i don't see this request on learning suggestion. I am able to find with the help support ID provided by user under the event logs.
- helenioNimbostratus
Hi,
I have the same issue.
I have to allow % that is Body of a POST request, did someone solved the issue ?
- youssef1Cumulonimbus
Hi,
I think you can solve easly your problem by specifying the type of parameter.
In your case it's json, did you do it?
More, can you see the entire blocage page logs?
regards
- youssef1Cumulonimbus
Hi,
Easy was, create an URL where the violation is trigged:
Security ›› Application Security : URLs : Allowed URLs : Allowed HTTP URLs ›› New Allowed HTTP URL... (explicit).
Then create parameter needed where the violation is trigged (In the URL created before):
Then allow % in this parameter.
Don't forget to apply policies.
Let me know if it's clear for you.
regards
- RahulveNimbostratus
This error appeared for JSON Content not on the uRL . we already have wildcard parameter with % allowed in user-input.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com