Name is required.
Email address is required.
Invalid email address
Answer is required.
Exceeding max length of 5KB

Threat ID 30419 (RFC2397 data URL scheme usage detected)


We have another group that is blocking a site where we embed Jwplayer7 on for the following reason https://live.paloaltonetworks.com/t5/Threat-Articles/Threat-ID-30419-RFC2397-data-URL-scheme-usage-detected/ta-p/71389 - is there anyway to address this issue on our end besides reverting back to jwplayer6?

2 Community Answers

Donni

JW Player Support Agent  
1 rated :

At this point there are no changes on your end that could be performed to prevent that. We advise those that are also affected by this issue to request the firewall provider whitelist our player.

Donni

JW Player Support Agent  
0 rated :

UPDATE 5/10/16

We have a potential fix in place with JW 7.4.1 that removes base 64 encoded fonts from the player. This should remove the false positives that have been flagging our player by Palo Alto’s software, and should enable correct video playback behavior. This new version is currently located on our staging channel, and can be enabled by following the steps detailed here: https://support.jwplayer.com/customer/en/portal/articles/2149561-using-player-release-channels

We want to ensure that this does indeed fix the issue, so please reach us at support@jwplayer.com with any feedback.

This question has received the maximum number of answers.