Forum Discussion
XSS script tag end (Parameter) (2) 200001475 , False positive
Greeting you All,
I would ask for the rule ID: 200001475, generating a lot of noise, is it accurate about it, or am missing something,
example of triggered Request Url : /index.php/jec/$$$call$$$/plugins/generic/custom-block-manager/controllers/grid/custom-block-grid/update-custom-block?existingBlockName=map , so the detection based on what , and what the suggestion to fine-tune it
thank you in advance
Hi ,
the name of the Attack Signature says it pretty much. In one of the parameters, the WAF has detected an XSS script tag.
XXS or cross site scripting is an attack, where an attacker would supply a malicious link via a hyperlink. A user would then click on the link and the attacker would try to steal information from the user.
If you think this violation is a false positive you could disable this signature for the parameter in question.
KR
Daniel
- Mohammed00
Nimbostratus
thank you for answering,
i know what XSS is but I see no XSS tags in the URL how so the WAF says its XSS
Good, I am not always sure, so I thought a short explanation of XXS will do no harm.
Is that the complete URL? Usually in the logs it is highlighted in red where the violation was seen. For example:
- Yuv_saha
Nimbostratus
Thanks for the awesome information.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com