ATM_ID: B2A830FB-6ECC-1014-9A75-AA9156619FB6 ID: Security_Ck3.0/Vulnerability_Testing/Vulnerability/18213 TESTCASE_HEADLINE: GROUP: FEATURE: copy_auditron SUB_FEATURE: INPUT: 1. Install Paros browser/tool for intercepting the requests from the device. 2. Configure the proxy of the client Mozilla Firefox browser(Win 7) and paros as "localhost" and port as "8080". PROCEDURE: Process # Test Procedure Expected Results 1. 1. In Paros Tool Navigate through Tools -> Filter and Configure filter like below 1.Replace HTTP request body using defined pattern_Enabled Under this Enter a regular expression as the pattern. Pattern:a replace with: 2. Click -> OK 3.Open the device CWIS using ip Login (Login name:admin/Password:1111) -> Login Device should not allow to induce any alert box OUTPUT: PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC: SPEC_VERSION: SPEC_TAG: ATM_OWNER: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1475651903 MDATE: 1475651903 MUSER: q50yrg15 AUTHOR: q50yrg15 ATM_MCOMMENTS: Imported from CSV HISTORY: ATM_LOCKED: ATM_REQLINK: ATM_REQCOUNT: 0 FILENAME: FILEDESC: FILES: QA_TEAM: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: MFF: PLANNEDTIMESTAFF: IMPLEMENTED: DATA_LOGIC: AUTOMATABLE_NOTAUTOMATABLE: TC_WEIGHTAGE: