We're doing DAST using Burp Suite in our ARIS and we've got some medium severity vulnerability with the issue name: Information Disclosure. And the details are below:

Issue Description
Some browsers, including Internet Explorer, contain built-in filters designed to protect against cross-site scripting (XSS) attacks. Applications can instruct browsers to disable this filter by setting the following response header:

This behavior does not in itself constitute a vulnerability; in some cases XSS filters may themselves be leveraged to perform attacks against application users. However, in typical situations XSS filters do provide basic protection for application users against some XSS vulnerabilities in applications. The presence of this header should be reviewed to establish whether it affects the application's security posture.

Proof Of Concept

Request

Response

Validation Manual

Affected URL

http://172.18*.***.**/abs/GWTAttrEditing/GWTAttrEditingService.rpc

http://172.18*.***.**/abs/GWTDesigner/GWTDesignerService.rpc

 

Is there any configuration that we can use to pass the vulnerability?

 or register to reply.

Notify Moderator