I have Jsp and Struts 2 based application where we have used jstl to render the output. Now if in any of the get APIs i am giving the request param as jsp expression. For eg :
http://localhost:8090/inputParam.do?searchVal=${pageContext.servletContext.serverInfo}
and the request param searchVal is as it is returned by the controller which is rendered on the JSP as
var gText = '<c:out value="${searchVal != null ? searchVal :''}"/>';
The above line is actually dynamically rendering the searchVal jsp expresion and giving the output as JBoss Web/7.5.28.Final-redhat-1
and the vulnerability scanner is considering the above behavior as vulnerability.
Hi can i fix this?