Custodela / NodeGoat

The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
https://www.owasp.org/index.php/Projects/OWASP_Node_js_Goat_Project
Apache License 2.0
0 stars 0 forks source link

CX Reflected_XSS @ app/routes/session.js [master] #1

Open kmcdon83 opened 6 years ago

kmcdon83 commented 6 years ago

Reflected_XSS issue exists @ app/routes/session.js in branch master

Method function at line 189 of app\routes\session.js gets user input for the userName element. This element’s value then flows through the code without being properly sanitized or validated and is eventually displayed to the user in method function at line 189 of app\routes\session.js. This may enable a Cross-Site-Scripting attack.

Severity: High CWE:79 Vulnerability details and guidance Internal Guidance Lines: 192 256 191


Code (Line #192):

        var userName = req.body.userName;

Code (Line #256):

        userId = req.session.userId;

Code (Line #191):

        var email = req.body.email;

kmcdon83 commented 6 years ago

Issue still exists.

kmcdon83 commented 6 years ago

Issue still exists.