PRIORITY: TEST_TYPE: APPROVED_QE: INPUT: 1. Install Paros browser/tool for intercepting the requests from the device. 2. Configure the proxy of the client Mozilla Firefox browser(Win 7) and paros as "localhost" and port as "8080". FILES: TESTCASE_HEADLINE: Vulnerable_Address Book_Page. TESTCASE_VERSION: FEATURE: copy_auditron APPROVE_SE: SPEC_VERSION: MFF: TESTCASE_PLATFORM: SPEC: No Spec HISTORY: CDATE: 1366122117 TESTCASE_APPROVALS: TESTCASE_STATE: OUTPUT: Device should not allow to induce any alert box FILEDESC: PROCESS: RESOURCE_HW: TC_WEIGHTAGE: MDATE: 1366122117, 1386145267, 1425023548, 1441711010, 1462266936, 1462272753 APPROVED_SPAR: SKILL_SET: TESTCASE_SOURCE: APPROVE_QE: TEST_CASE_TYPE: APPROVED_SE: PLANNEDTIMESTAFF: ATM_OWNER: AUTHOR: USWU53873 LOE: ASSOCIATED_TESTCASES: ATM_REQLINK: TRAINING: MUSER: USWU53873, USWU53873, USWU53968, USWU53968, q3SJKS2P, q3SJKS2P GROUP: SUB_FEATURE: SPEC_TAG: Mapping Not Required PROCEDURE: 1. In Paros Tool Navigate through Tools -> Filter and Configure filter like below 1.Replace HTTP request body using defined pattern_Enabled Under this Enter a regular expression as the pattern. Pattern:Address Book replace with: 2. Click -> OK 3. Open the device CWIS using ip 2. Login (Login name:admin/Password:1111) -> Login 4. Click -> Address Book RESOURCE_CONSUMEABLES: ATM_LOCKED: APPROVE_SPAR: TESTCASE_PRODUCT: QA_TEAM: FILENAME: ATM_ID: 850FBC32-8CF6-1014-AF3A-8B951D728955 ATM_MCOMMENTS: Imported from CSV, Update Requirement Tags., Updated with Spec Details, Imported 'ACTIVE_TEST_SECURITY/ Vulnerability_Testing/ 104508' from suite GDC_DPQA-Secury, Renamed from "DPQA_Security/Vulnerability_Testing/21594"., Renamed from "DPQA_Security/Vulnerability/21594". RESOURCE_MEDIA: ATM_REQCOUNT: 0