Hi,
We are looking to use Imperva as a CDN and in testing, it is flagging up XSS issues with codetemplates.xml
Looking in Codetemplates.XML, there are references sucha as {0}, {1} etc which are triggering the Imperva XSS attack analysis.
Is there anything we can do to circumvent this ? (using 2010 Rad Ajax)
Is there a risk in removing or commenting out the {0} etc?
Regards
Paul
We are looking to use Imperva as a CDN and in testing, it is flagging up XSS issues with codetemplates.xml
Looking in Codetemplates.XML, there are references sucha as {0}, {1} etc which are triggering the Imperva XSS attack analysis.
Is there anything we can do to circumvent this ? (using 2010 Rad Ajax)
Is there a risk in removing or commenting out the {0} etc?
Regards
Paul