Forum Discussion
Mitigating Stored XSS Attacks with F5 Big-IP ASM: Insights Needed
Hi Daniel & Amine,
Actually, I've been testing stored XSS payloads on DVWA, bypassing F5 ASM, and requesting via F5 AWAF. Like trying to create a scenario when the client is unaware that there application has been affected by the stored xss payload.
Wondering if F5 ASM can detect and block responses containing these payloads from affected servers. Any insights?
- Amine_KadimiFeb 27, 2024MVP
I suggest you enable signature enforcement for server responses. In a lab environment it should be OK but in production it might impact the performance of the app
- Daniel_WolfFeb 28, 2024MVP
Yes, that's what I said. Signatures can be enforced also on responses.
- Nishal_RaiMar 06, 2024Cirrocumulus
Amine_KadimiDaniel_Wolf
Sorry for the late response.
Regarding signature enforcement on the responses, I selected the following signature set.The log events of the application:
On the file types specification of the response signatures:What would be the appropriate file types, since the script is stored on a message box.
Since the above mentioned signature was unable to detect the stored XSS payload in the response.
- Daniel_WolfMar 01, 2024MVP
Just had the time to look into this. Only found one signature that is tagged XSS and is applied to responses.
You might miss a stored XSS.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com