Oracle Application Express (MOSC)

MOSC Banner

APEX v23.2 - URL tampering not resolved by enabling SSP

Hi all,

APEX v23.2

Enabling Session State Protection on an application for the first time, and the anti-CSRF test that I've been using is still failing (meaning, I continue to be able to manually update p_json and re-send the request without a failure).

I'm using Burp Suite's repeater tool to re-send the request.

I'm going to - perhaps - be providing more information than needed, but honestly, I don't know what's relevant here and what isn't….

  • The app has SSP enabled
  • The page item is set to "Checksum Required - Session Level"
  • The page item I've been modifying (P1002_LANG) is a checkbox group with a list of static values.

Howdy, Stranger!

Log In

To view full details, sign in to My Oracle Support Community.

Register

Don't have a My Oracle Support Community account? Click here to get started.

Category Leaderboard

Top contributors this month

New to My Oracle Support Community? Visit our Welcome Center

MOSC Help Center