How about UTF-7 XSS attack?
False positive will be there, you need to reduce it as much as
possible. But just checking for javascript: is not a good idea.
Keeping an eye on no. of occurrence of particular patterns might help.


On 6 Feb 2007 11:44:45 -0000, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
1st is, whether executing javascript on clients browser context in http req. is 
permissible.

>>>>>> we don't have any control to implement policy to restrict developers 
using such feature.

 2nd as yahoo is one of the most visted sit, how can avoid cjances of false 
postive, and is there any way to harden this signature.
>>>>>>IDS detection is most effective only when it is configured properly and 
signatures are specific to attack.

Generic signatures are only good to identify unknown attacks,Provided you have 
good logging capability. but problem is false positives.
My would suggest is to find some vulnerable file path + XXS pattern to be more 
effective.

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------



------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more.
------------------------------------------------------------------------

Reply via email to