Hi,
We are in middle of production setup and held up with security scans in the test environment.
We are using Confluence 5.10.6 Commercial edition. During the dynamic scans, the Qualys tool found the following vulnerabilities.
1) 150001 Reflected Cross-Site Scripting (XSS) Vulnerabilities
a) XSS vulnerabilities occur when the Web application echoes user-supplied data in an HTML response sent to the Web browser.......
|
comment: A significant portion of the XSS test payload appeared in the web page, but the response content type is non-HTML.
Response content-type: application/json
Access path: https://xx.xx.com/plugins/servlet/Wallboard/?dashboardId=10000
2) 150022 Syntax Error Occurred
https://xx.xx.com/plugins/servlet/gadgets/dashboard-diagnostics
The reflected string on the response webpage indicates that the vulnerability test was successful
|
Hi Anand,
I remember passing these vulnerabilities scans for the internal network and for a custom web-application to comply with some security standard.
For vulnerabilities concerning 3-rd party webapplication like JIRA for you, we closed the holes by adding rules to proxy apache server. Please be aware that by doing this you can break JIRA functionality that relies on URL you closed.
These reports are totally unclear on what the attack vectors are. What form would an attack on the server take using them?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.