cancel
Showing results for 
Search instead for 
Did you mean: 
Login & Join the DevCentral Connects Group to watch the Recorded LiveStream (May 12) on Basic iControl Security - show notes included.

XSS script tag end (Parameter) (2) 200001475 , False positive

Mohammed00
Nimbostratus
Nimbostratus

Greeting you All,

I would ask for the rule ID: 200001475, generating a lot of noise, is it accurate about it, or am missing something,

example of triggered Request Url : /index.php/jec/$$$call$$$/plugins/generic/custom-block-manager/controllers/grid/custom-block-grid/update-custom-block?existingBlockName=map , so the detection based on what , and what the suggestion to fine-tune it

 

thank you in advance

 

 

7 REPLIES 7

Hi ,

 

the name of the Attack Signature says it pretty much. In one of the parameters, the WAF has detected an XSS script tag.

 

XXS or cross site scripting is an attack, where an attacker would supply a malicious link via a hyperlink. A user would then click on the link and the attacker would try to steal information from the user.

 

If you think this violation is a false positive you could disable this signature for the parameter in question.

 

KR

Daniel 

thank you for answering,

i know what XSS is but I see no XSS tags in the URL how so the WAF says its XSS

Good, I am not always sure, so I thought a short explanation of XXS will do no harm.

 

Is that the complete URL? Usually in the logs it is highlighted in red where the violation was seen. For example:

0691T00000F879BQAR.png

thank you for replying again ,

yes, its the complete URL,

When I expand the dropdown next to Attack signature detected, I can see where the pattern was matched.

 

0691T00000F88vBQAR.png

Yuv_saha
Nimbostratus
Nimbostratus

Thanks for the awesome information.