Skip to main content

TB073 XSS Vulnerability on the Masking Mainframe Inventory UI




Alert Type



FIPS 199 Severity Level: Critical

CVSS Score: 9.0 based on

Attack Vector (AV): N

Attack Complexity (AC): L

Privileges Required (PR): L

User Interaction (UI): R

Scope (S): C

Confidentiality (C): H

Integrity (I): H

Availability (A): H


An attacker could inject active code onto the Masking Engine GUI’s Mainframe Inventory pages. When a user views these pages, the attacker’s code will execute with the permissions of the user viewing the page and therefore can perform any actions allowed by the user’s role (e.g., create a new Masking user, edit a Masking connector, etc.).

Contributing Factors

The issue may occur when using any of the below versions of the Delphix Masking Engine:

Major Release All Sub Releases




This attack may be detected by viewing the table/file/data set name and column/field names using Masking API endpoint: GET /mainframe-dataset-rulesets. Any names containing code (e.g., HTML <script> tags, JavaScript code, etc.) indicate an attack. 


If the API response contains a script tag such as, <script>deleteUser()</script>, then, when accessed through the GUI, this script will execute with the permissions of the logged in user. In this example, engine users would be deleted.


  • At the network layer, IP address allowlisting may be used to limit Delphix appliance access to only approved users.  

  • Customers are strongly recommended to upgrade to or or later.


This issue is resolved in releases and in

Additional Information