<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Header Cookies Manipulation in Splunk AppDynamics</title>
    <link>https://community.splunk.com/t5/Splunk-AppDynamics/Header-Cookies-Manipulation/m-p/739447#M11424</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;

&lt;P&gt;We are using AppDynamics EUM in our project and recently did a sonar security scan and we got a critical flag in adrum.js (latest version) where cookies are manupilated directly without any check (eg '\r' or '\n') which could result in sercurity vulnerabilities like "Response splitting", "Cache poisoning", "Cross Site Scripting" etc. Do we have a fix for this.&lt;/P&gt;

&lt;P&gt;The security scan is &lt;STRONG&gt;HP Fortify Scan&amp;nbsp;&lt;/STRONG&gt;and this issue has severity as &lt;STRONG&gt;High &lt;/STRONG&gt;from the scan.&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;

&lt;P&gt;^ Edited by&amp;nbsp;&lt;A href="https://community.appdynamics.com/t5/user/viewprofilepage/user-id/142051"&gt;@Ryan.Paredez&lt;/A&gt;&amp;nbsp;AppD Community Manager&lt;/P&gt;</description>
    <pubDate>Wed, 16 Oct 2019 15:08:44 GMT</pubDate>
    <dc:creator>CommunityUser</dc:creator>
    <dc:date>2019-10-16T15:08:44Z</dc:date>
    <item>
      <title>Header Cookies Manipulation</title>
      <link>https://community.splunk.com/t5/Splunk-AppDynamics/Header-Cookies-Manipulation/m-p/739447#M11424</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;

&lt;P&gt;We are using AppDynamics EUM in our project and recently did a sonar security scan and we got a critical flag in adrum.js (latest version) where cookies are manupilated directly without any check (eg '\r' or '\n') which could result in sercurity vulnerabilities like "Response splitting", "Cache poisoning", "Cross Site Scripting" etc. Do we have a fix for this.&lt;/P&gt;

&lt;P&gt;The security scan is &lt;STRONG&gt;HP Fortify Scan&amp;nbsp;&lt;/STRONG&gt;and this issue has severity as &lt;STRONG&gt;High &lt;/STRONG&gt;from the scan.&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;

&lt;P&gt;^ Edited by&amp;nbsp;&lt;A href="https://community.appdynamics.com/t5/user/viewprofilepage/user-id/142051"&gt;@Ryan.Paredez&lt;/A&gt;&amp;nbsp;AppD Community Manager&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 15:08:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-AppDynamics/Header-Cookies-Manipulation/m-p/739447#M11424</guid>
      <dc:creator>CommunityUser</dc:creator>
      <dc:date>2019-10-16T15:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: Header Cookies Manipulation</title>
      <link>https://community.splunk.com/t5/Splunk-AppDynamics/Header-Cookies-Manipulation/m-p/739448#M11425</link>
      <description>&lt;P&gt;Hi&amp;nbsp;@Anonymous&amp;nbsp;&lt;/P&gt;

&lt;P&gt;I recommend reporting this to &lt;A href="https://www.appdynamics.com/support/" target="_blank" rel="noopener nofollow noreferrer"&gt;support&lt;/A&gt;. Let me know if you have any trouble with this.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2019 17:46:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-AppDynamics/Header-Cookies-Manipulation/m-p/739448#M11425</guid>
      <dc:creator>iamryan</dc:creator>
      <dc:date>2019-10-18T17:46:33Z</dc:date>
    </item>
  </channel>
</rss>

