14-Dec-2021 00:24
Greeting you All,
I would ask for the rule ID: 200001475, generating a lot of noise, is it accurate about it, or am missing something,
example of triggered Request Url : /index.php/jec/$$$call$$$/plugins/generic/custom-block-manager/controllers/grid/custom-block-grid/update-custom-block?existingBlockName=map , so the detection based on what , and what the suggestion to fine-tune it
thank you in advance
14-Dec-2021
02:12
- last edited on
24-Mar-2022
01:25
by
li-migration
Hi ,
the name of the Attack Signature says it pretty much. In one of the parameters, the WAF has detected an XSS script tag.
XXS or cross site scripting is an attack, where an attacker would supply a malicious link via a hyperlink. A user would then click on the link and the attacker would try to steal information from the user.
If you think this violation is a false positive you could disable this signature for the parameter in question.
KR
Daniel
14-Dec-2021 22:14
thank you for answering,
i know what XSS is but I see no XSS tags in the URL how so the WAF says its XSS
14-Dec-2021 23:48
Good, I am not always sure, so I thought a short explanation of XXS will do no harm.
Is that the complete URL? Usually in the logs it is highlighted in red where the violation was seen. For example:
15-Dec-2021 03:53
thank you for replying again ,
yes, its the complete URL,
15-Dec-2021 10:36
When I expand the dropdown next to Attack signature detected, I can see where the pattern was matched.
15-Mar-2022 05:07