
An escalation of eventual product defects to R&D.A reasoned adjustment of severity based on the specifics of the technical environment.A reasoned identification of false positives.Support's reply may include the following: The list of issues reported to OutSystems support should exclude issues that can be fixed by the developers or OutSystems admins by enforcing configurations.In some cases, it will not be possible to run a legitimate program if it is blocked by the security software. A false positive can have very serious consequences. We expect that you do a preliminary analysis of the report, and report the issues that are caused by the platform and/or cloud infrastructure to OutSystems support. False Positives (FPs, also known as False Alarms) are harmless and legitimate programs that are incorrectly identified as malicious by an antivirus program.OutSystems support and security teams are ready to discuss the findings of the penetration tests with you under the following conditions:
AVG FALSE POSITIVE NOT ALLOWING INSTALL CODE
While the jQuery version we ship with OutSystems is based on 1.8.3, the Platform Server doesn't generate code that passes HTML from untrusted sources to the JQuery DOM manipulation methods, for which this is considered a false positive. The jQuery versions 1.0.3 to 3.5.0 are vulnerable to the possible execution of untrusted code ( CVE-2020-11022 and CVE-2020-11023). Issue - Passing HTML from untrusted sources to one of jQuery's DOM manipulation methods. While the jQuery version we ship with OutSystems is based on 1.8.3, it doesn't contain any of the patterns described in the vulnerability description, for which this is considered a false positive. You can find more information on the vulnerability here.

This can let an attacker add or modify an existing property that will then exist on all objects. The extend function can be tricked into modifying the prototype of Object when the attacker controls part of the structure passed to this function.

The jQuery version 1.8.3 is vulnerable to Prototype Pollution, CVE-2019-11358. In particular, as of OutSystems version 9.1.401.0, the fix was backported and the $ operator is no longer vulnerable to this attack. While the jQuery version we ship with OutSystems is based on version 1.8.3, it contains some changes made by OutSystems. OutSystems uses jQuery version 1.8.3 which has the following known vulnerabilities:ĬVE-2012-6708 relates to a potential Cross-Site Scripting vulnerability in jQuery's selector operator ( $ ). Chocolatey is open source software, so the code is open for review.JQuery 1.8.3 flagged as a potentially vulnerable library You need to be selective and choose what you decide to trust. Unfortunately there is not much we can do with respect to anti-virus scanners. Note we run everything through VirusTotal, and you can see one item was found with Avira - Īlso we sign our binaries, but we did switch over to a new certificate for 0.10.4+. Heuristics in Virus Scanners are always changing and adjusting - they tend to trigger more false positives than otherwise.

We've added features, but nothing in general has been added to trigger a false positive. See for a pretty comprehensive post on the subject of Virus Scanners (thanks has changed since v0.10.3 that would trigger a false positive? How do you propose that we do this? We unfortunately have no control of AV scanners and their heuristics. Chocolatey should not trigger a (presumably) false positive.
