Unfortunately, Blesta doesn't run as a self-contained app (we're on Windows Server 2012 R2), and requires various 3rd party components, such as ioncube loader.
Is the fail related to a component that ships inside Blesta, or one of the external components?
If it helps, the full text on the PCI report is:
Quote
jQuery is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain
Asynchronous JavaScript and Extensible Markup Language
(AJAX) Request is performed without the dataType option, causing
text/javascript responses to be executed.
This finding indicates that either the root domain url, sub-domain url, or
an imported/sourced version of jQuery is below jQuery version 3.0. All
three scenarios allow an attacker to execute cross site scripting attacks
on the root domain.
This finding is based on version information which may not have been
updated by previously installed patches (e.g., Red Hat "back ports").
All Cross-Site Scripting vulnerabilities are considered non-compliant by PCI.
Evidence:
Match: '2.0.3' is less than '3.0.0'
Remediation:
Upgrade jQuery to version 3.0.0 or higher. This includes versions of
jQuery used on the root domain, subdomain, or imported/sourced
libraries.
Question
rebus9
Blesta 4.2.1 installed. Until now, monthly PCI scans all passed. Today, I woke up to a notification the overnight PCI scan failed:
Unfortunately, Blesta doesn't run as a self-contained app (we're on Windows Server 2012 R2), and requires various 3rd party components, such as ioncube loader.
Is the fail related to a component that ships inside Blesta, or one of the external components?
If it helps, the full text on the PCI report is:
9 answers to this question
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.