﻿<?xml version="1.0" encoding="utf-8"?><rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0" version="2.0"><channel><title>Intersoft Community - WebCombo - Regarding XSS issue faced in the web combo.</title><link>http://www.intersoftsolutions.com/Community/WebCombo/Regarding-XSS-issue-faced-in-the-web-combo/</link><description /><generator>http://www.intersoftsolutions.com</generator><language>en</language><copyright>Copyright 2002 - 2015 Intersoft Solutions Corp. All rights reserved.</copyright><ttl>60</ttl><item><title>Regarding XSS issue faced in the web combo.</title><link>http://www.intersoftsolutions.com/Community/WebCombo/Regarding-XSS-issue-faced-in-the-web-combo/</link><pubDate>Tue, 01 Aug 2023 08:30:25 GMT</pubDate><dc:creator>sphinxg@usa.net</dc:creator><category>XSS</category><category>cross-site scripting</category><category>Unencoded characters</category><description>&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;b&gt;&lt;span lang="EN"&gt;&lt;br&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;b&gt;&lt;span lang="EN"&gt;Hi&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN"&gt;,&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;We are facing the below mentioned security issue
in one of our client environments.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;A significant portion of the XSS test payload
appeared in the web page, but the page's DOM was not modified as expected for a
successful exploit. This result was manually verified to determine its
accuracy.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:115%;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;Kindly find the attached screenshots for
reference(Request and Response).&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-bottom:10.0pt;line-height:normal;mso-pagination:
none;mso-layout-grid-align:none;text-autospace:none"&gt;&lt;span lang="EN"&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shape
 id="Picture_x0020_2" o:spid="_x0000_i1025" type="#_x0000_t75" style='width:6in;
 height:59.5pt;visibility:visible;mso-wrap-style:square'&gt;
 &lt;v:imagedata src="file:///C:/Users/VELUMA~1.MOO/AppData/Local/Temp/msohtmlclip1/01/clip_image003.png"
  o:title=""/&gt;
&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;span lang="EN"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: 11pt;"&gt;Kindly help us to resolve the same&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: 11pt;"&gt;Thanks in advance.&lt;/span&gt;&lt;/p&gt;</description></item></channel></rss>