POLICY-OTHER --
POLICY-OTHER script tag in URI - likely cross-site scripting attempt
Cross-site scripting (XSS) vulnerability in the Enterprise Portal component in Microsoft Dynamics AX 2012 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Dynamics AX Enterprise Portal XSS Vulnerability." Impact: CVSS base score 4.3 CVSS impact score 2.9 CVSS exploitability score 8.6 confidentialityImpact NONE integrityImpact PARTIAL availabilityImpact PARTIAL Details: Ease of Attack:
This rule alerts when a script tag is present in a URI.
No public information
No known false positives
Talos research team. This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology. For more information see [nvd].
No rule groups
Cross Site Scripting (XSS)
Cross Site Scripting (XSS) attackers send malicious input to a site that does not validate the input, usually in the form of a script. The application sends the malicious code to the browsers of other users, which will execute the script unknowingly. The malicious code uses the trust of the host website to access cookies, session tokens, or other sensitive information. There are multiple types of XSS, including Stored, Reflected, and DOM based.
CVE-2012-1857 |
Loading description
|
CVE-2015-1653 |
Loading description
|
CVE-2014-4075 |
Loading description
|
CVE-2014-4116 |
Loading description
|
Tactic: Defense Evasion
Technique: Web Service
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org