Forum Discussion

Jeroen_Steenkam's avatar
Jeroen_Steenkam
Icon for Nimbostratus rankNimbostratus
Feb 06, 2019

v13.1 How to overrule an ASM_RESPONSE_VIOLATION of attack type ATTACK_TYPE_INFORMATION_LEAKAGE

The ASM module first scans the request for violations. Without violations the request is then forwarded to the webserver. Next, the ASM module scans the response for violations. Currently, HTTP Respo...