PCI 合规性资源/服务?修复“类别参数中的跨站点脚本漏洞”漏洞?

发布于 2024-11-09 15:56:53 字数 247 浏览 0 评论 0原文

一家审计公司表示我们不符合 PCI 标准,但就如何解决问题提供了无用的指示。他们显然希望我们聘请他们的咨询部门。

在收到 PCI 合规性审核警报后,您使用了哪些资源/服务来弥补差距?

是否有网站提供有关解决 PCI 合规性问题的有用资源?

例如,这是我们被标记的神秘故障消息之一:

“描述:URL X 的类别参数中存在跨站点脚本漏洞”,

但没有关于如何关闭此漏洞的明确指导。

谢谢。

An auditing firm said we are not PCI compliant, but provided unhelpful instructions on how to resolve the issues. They are clearly hoping we will engage their consulting unit.

What resources/services have you used to plug gaps after receiving a PCI compliance audit alert?

Are there web sites that provide helpful resources on resolving PCI compliance issues?

For instance, here is one of the cryptic failure messages we were flagged on:

"Description: Cross-site scripting vulnerability in category parameter to URL X"

But there is no clear guidance on how to close this vulnerability.

Thanks.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(1

夜唯美灬不弃 2024-11-16 15:56:53

他们是否说明了哪个 URL 导致了该漏洞,或者它实际上是一个“X”?

检查以确保没有经过适当清理的用户输入或从 URL 抓取的输入显示在页面上的任何位置(或在 JavaScript 中使用)。

如果您发布 URL,我相信这里的人们会很乐意寻找该漏洞。

[发布 URL 后进行编辑:]

以下是显示漏洞的格式错误的请求的链接:

http://www.cengraving.com/s/category?category=Outdoor+signs+'-'alert("Cross%20Site%20Scripting%20Vulnerability%20Here");

一种方法防止这种攻击的方法是验证所有用户输入。

客户端您可以删除任何可疑字符,例如 <>'" -

服务器端您应该使用正则表达式将有效查询列入白名单,然后再将其输入数据库。

Did they say which URL is causing the vulnerability, or was it literally an "X"?

Check to make sure that no user input, or input that is being grabbed from the URL, is being displayed anywhere on the page (or being used in your javascript) without being properly sanitized.

If you post the URL I'm sure people here would be happy to look for the vulnerability.

[Edit after you posted the URL:]

Here is a link to a malformed request displaying the vulnerability:

http://www.cengraving.com/s/category?category=Outdoor+signs+'-'alert("Cross%20Site%20Scripting%20Vulnerability%20Here");

A way to prevent this attack would be to validate all user input.

Client side you can remove any suspicious characters like <>'"-

Server side you should use regex to whitelist valid queries before entering them into your database.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文