You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 21, 2022. It is now read-only.
The current implementation of input validation and output sanitization of the application removes tags such as <script>bla</script> but allows dangerous characters such as < > " ' / when there is a leading space: < script>bla< /script>.
A leading space does not result in a valid XSS but it is recommended to strip dangerous characters and escape them properly to decrease the attack vector.
Example request that contains the dangerous characters:
impact:
Not validating the user input could result in issues such as XSS.
recommendation:
Filter all client-provided input parameters, and escape all output
Make use of a whitelist, and prevent certain characters from being inserted if it's not necessary for the working of the application.
The text was updated successfully, but these errors were encountered:
threatLevel="Low" type="User input validation"
The current implementation of input validation and output sanitization of the application removes tags such as
<script>bla</script>
but allows dangerous characters such as< > " ' /
when there is a leading space:< script>bla< /script>
.A leading space does not result in a valid XSS but it is recommended to strip dangerous characters and escape them properly to decrease the attack vector.
Example request that contains the dangerous characters:
Response:
impact:
Not validating the user input could result in issues such as XSS.
recommendation:
Filter all client-provided input parameters, and escape all output
Make use of a whitelist, and prevent certain characters from being inserted if it's not necessary for the working of the application.
The text was updated successfully, but these errors were encountered: