Insecure service configuration
Description
No requestValidationMode is assigned in the server configuration files, which would allow XSS attacks.
Impact
Obtain sensitive information through XSS attacks.
Recommendation
Activate the recommended protection mechanisms as Request validation.
Threat
Anonymous attacker from the Internet.
Expected Remediation Time
⌚ 60 minutes.
Score
Default score using CVSS 3.1. It may change depending on the context of the vulnerability.
Base
- Attack vector: N
- Attack complexity: H
- Privileges required: N
- User interaction: R
- Scope: U
- Confidentiality: L
- Integrity: N
- Availability: N
Temporal
- Exploit code madurity: P
- Remediation level: O
- Report confidence: R
Result
- Vector string: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:R
- Score:
- Base: 3.1
- Temporal: 2.7
- Severity:
- Base: Low
- Temporal: Low
Code Examples
Compliant code
The application enables request Validation mode
<system.web>
<compilation debug="true" targetFramework="4.0" />
<httpRuntime requestValidationMode="2.0" />
</system.web>
Non compliant code
The application does not request validation mode
<system.web>
<compilation debug="true" targetFramework="4.0" />
<httpRuntime requestValidationMode=None />
</system.web>