Greeting you All,
I would ask for the rule ID: 200001475, generating a lot of noise, is it accurate about it, or am missing something,
example of triggered Request Url : /index.php/jec/$$$call$$$/plugins/generic/custom-block-manager/controllers/grid/custom-block-grid/update-custom-block?existingBlockName=map , so the detection based on what , and what the suggestion to fine-tune it
thank you in advance
the name of the Attack Signature says it pretty much. In one of the parameters, the WAF has detected an XSS script tag.
XXS or cross site scripting is an attack, where an attacker would supply a malicious link via a hyperlink. A user would then click on the link and the attacker would try to steal information from the user.
If you think this violation is a false positive you could disable this signature for the parameter in question.
Good, I am not always sure, so I thought a short explanation of XXS will do no harm.
Is that the complete URL? Usually in the logs it is highlighted in red where the violation was seen. For example: