Skip to main content

TB068 XSS Vulnerability on the Masking Audit Page




Alert Type



FIPS 199 Severity Level: Critical

CVSS Score: 9.6 based on

Attack Vector (AV): N

Attack Complexity (AC): L

Privileges Required (PR): N

User Interaction (UI): R

Scope (S): C

Confidentiality (C): H

Integrity (I): H

Availability (A): H

An attacker could inject active code onto the Masking Engine GUI’s Audit page. When a user views the page, the attacker’s code will execute with the permissions of the user viewing the page and therefore can perform any actions allowed by the user’s role (e.g., create a new Masking user, edit a Masking connector, et cetera).

Contributing Factors

Major Release All Sub Releases


This attack can be detected by viewing the audit logs using the GET /audit-logs Masking API endpoint. Any audit record with a userName field containing code (e.g., HTML <script> tags, JavaScript code, et cetera) instead of an alphanumeric username indicates an attack. 

An attack may also be detected if the Audit GUI is malformatted or contains executable code in the user column. The absence of these anomalies in the GUI is not a guarantee.


  • At the network layer, IP address allowlisting may be used to limit Delphix appliance access to only approved users.  

  • Customers should upgrade to or later


This issue is resolved in the and releases.

Additional Information

See related XSS vulnerability in TB069 XSS Vulnerability on the Masking Rule Set and Inventory Pages.