Event 1046 - Cross-Site Scripting Filter
Published: June 11, 2010
Updated: June 11, 2010
Applies To: Windows 7, Windows Vista
Cross-site scripting can enable attacks such as:
- Cookie theft, including the theft of session cookies that can lead to account hijacking.
- Monitoring keystrokes input to the victim Web site or application.
- Performing actions on the victim Web site on behalf of the victim user. For example, an XSS attack on a user's e-mail Web site might enable an attacker to read and forward e-mail messages, set new calendar appointments, and so on.
|For more information and examples, see the Event 1046 - Cross-Site Scripting Filter topic from Internet Explorer Application Compatibility.|
When Is This Event Logged?
You can disable this feature by setting the following HTTP response header:
The user can also control the XSS Filter, by using the Internet Control Panel.
|By default, this filter is turned on for the Restricted, Internet, and Trusted zones.|
What Happens If I Disable This Security Feature?
If you disable this security feature, you will be more prone to cross-site scripting attacks. Disabling this feature should only be used as a temporary measure while your site is redesigned to avoid the reflection behavior being targeted by this security feature. It may also be used during troubleshooting, to compare the behavior of the application when the feature is enabled and when it is disabled. It is not recommended that this feature be left disabled on an ongoing basis.