We have an ASP.NET MVC site that uses UrlHelper.Action
to generate URLs that are sent to the client. We have scanned our application using Veracode security platform. It has identified a problem:
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
The tainted data originated from an earlier call to system_web_mvc_dll.System.Web.Mvc.UrlHelper.Action.
Our URL's do not use values from model state that may have come from the client and be tainted. They're all pretty straight forward.
Are there any vulnerabilities with UrlHelper or best practices in making sure that URLs it generates do not allow XSS injections?