NetScaler Virtual IP (VIP) configured for redirect is being labeled as vulnerable by Security Scanners for Cross Site Scripting (XSS) .
To fix the perceived vulnerability, add a “/” (forward slash) to the URL. For example, https://vip.domain.com/ makes an absolute URL.
Run the CLI command to configure HTTP to HTTPS redirect virtual server:
add lb vserver x.x.x.x_https_redirect HTTP x.x.x.x 80 -persistenceType NONE -redirectURL "https://vip.domain.com/" -cltTimeout 180 -downStateFlush DISABLEDFollowing is an example for such request made by security scanner:
GET /null.htw?CiWebHitsFile=/<script>xss</script>.aspx&CiRestriction=none&CiHiliteType=Full HTTP/1.1 User-Agent: curl/7.21.0 (i486-pc-linux-gnu) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3.4 libidn/1.15 libssh2/1.2.6 Host: vip.domain.com Accept: */* HTTP/1.1 302 Object Moved Location: https://vip.domain.com/null.htw?CiWebHitsFile=/%26lt;script%26gt;xss%26lt;/script%26gt;.aspx&CiRestriction=none&CiHiliteType=Full Content-Type: text/html Cache-Control: private Connection: close Date: Fri, 02 Aug 2013 15:47:44 GMT