<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic XSS Vulnerability in 6.2.5 build 272645? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/XSS-Vulnerability-in-6-2-5-build-272645/m-p/217764#M10130</link>
    <description>&lt;P&gt;Our vulnerability scanner found the following "XSS vulnerability" - Can someone speak to the validity of this or why it might be a false positive?  Any assistance would be greatly appreciated.&lt;/P&gt;

&lt;P&gt;Injected into the "CiHiliteType" URL parameter (Using method GET) in https://[splunk_server_ip]/null.htw?CiWebHitsFile=/&amp;lt;script&amp;gt;xss&amp;lt;/script&amp;gt;.aspx&amp;amp;CiRestriction=none&amp;amp;CiHiliteType=Full by changing the URL to https://[splunk_server_ip]/null.htw?CiWebHitsFile=/&amp;lt;script&amp;gt;xss&amp;lt;/script&amp;gt;.aspx&amp;amp;CiRestriction=none&amp;amp;CiHiliteType=\"&amp;gt;&amp;lt;script&amp;gt;248484113&lt;/P&gt;

&lt;P&gt;1: &amp;lt;!doctype html&amp;gt;&amp;lt;html&amp;gt;&amp;lt;head&amp;gt;&amp;lt;meta http-equiv="content-type" content=...&lt;BR /&gt;
2: var hashTag = '', hashPos = document.location.href.indexOf('#');&lt;BR /&gt;
3: if (hashPos &amp;gt; -1) { hashTag = document.location.href.substr(hashPos...&lt;BR /&gt;
4: ...iHiliteType=\\"&amp;gt;&amp;lt;script&amp;gt;248484113" + hashTag;&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 07:48:30 GMT</pubDate>
    <dc:creator>ddavenpo</dc:creator>
    <dc:date>2020-09-29T07:48:30Z</dc:date>
    <item>
      <title>XSS Vulnerability in 6.2.5 build 272645?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/XSS-Vulnerability-in-6-2-5-build-272645/m-p/217764#M10130</link>
      <description>&lt;P&gt;Our vulnerability scanner found the following "XSS vulnerability" - Can someone speak to the validity of this or why it might be a false positive?  Any assistance would be greatly appreciated.&lt;/P&gt;

&lt;P&gt;Injected into the "CiHiliteType" URL parameter (Using method GET) in https://[splunk_server_ip]/null.htw?CiWebHitsFile=/&amp;lt;script&amp;gt;xss&amp;lt;/script&amp;gt;.aspx&amp;amp;CiRestriction=none&amp;amp;CiHiliteType=Full by changing the URL to https://[splunk_server_ip]/null.htw?CiWebHitsFile=/&amp;lt;script&amp;gt;xss&amp;lt;/script&amp;gt;.aspx&amp;amp;CiRestriction=none&amp;amp;CiHiliteType=\"&amp;gt;&amp;lt;script&amp;gt;248484113&lt;/P&gt;

&lt;P&gt;1: &amp;lt;!doctype html&amp;gt;&amp;lt;html&amp;gt;&amp;lt;head&amp;gt;&amp;lt;meta http-equiv="content-type" content=...&lt;BR /&gt;
2: var hashTag = '', hashPos = document.location.href.indexOf('#');&lt;BR /&gt;
3: if (hashPos &amp;gt; -1) { hashTag = document.location.href.substr(hashPos...&lt;BR /&gt;
4: ...iHiliteType=\\"&amp;gt;&amp;lt;script&amp;gt;248484113" + hashTag;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:48:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/XSS-Vulnerability-in-6-2-5-build-272645/m-p/217764#M10130</guid>
      <dc:creator>ddavenpo</dc:creator>
      <dc:date>2020-09-29T07:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: XSS Vulnerability in 6.2.5 build 272645?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/XSS-Vulnerability-in-6-2-5-build-272645/m-p/217765#M10131</link>
      <description>&lt;P&gt;Good day!&lt;/P&gt;

&lt;P&gt;In the future, please report security concerns via support if you have a support agreement or via the Splunk Product Security Portal &lt;A href="http://www.splunk.com/page/securityportal"&gt;http://www.splunk.com/page/securityportal&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;This is a false positive for 2 reasons:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;  This request is generating a 303 redirection page and there are no supported browsers that we are aware of that interpret Javascript in this context.&lt;/LI&gt;
&lt;LI&gt;  The context that the issue is a Javascript string parsing context.  The input string cannot escape the context due to the presence of other encoding rules. &lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Thanks for the report and please use the portal in the future in case this isn't a false positive issue and we need to deliver a fix to you and other customers!&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 22:00:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/XSS-Vulnerability-in-6-2-5-build-272645/m-p/217765#M10131</guid>
      <dc:creator>chrisg_splunk</dc:creator>
      <dc:date>2015-11-03T22:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: XSS Vulnerability in 6.2.5 build 272645?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/XSS-Vulnerability-in-6-2-5-build-272645/m-p/217766#M10132</link>
      <description>&lt;P&gt;Thanks for the answer and pointing me to the right place! &lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2015 13:37:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/XSS-Vulnerability-in-6-2-5-build-272645/m-p/217766#M10132</guid>
      <dc:creator>ddavenpo</dc:creator>
      <dc:date>2015-11-04T13:37:45Z</dc:date>
    </item>
  </channel>
</rss>

