The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
Reflected_XSS issue exists @ app/routes/session.js in branch master
Method function at line 189 of app\routes\session.js gets user input for the userName element. This element’s value then flows through the code without being properly sanitized or validated and is eventually displayed to the user in method function at line 189 of app\routes\session.js. This may enable a Cross-Site-Scripting attack.
Reflected_XSS issue exists @ app/routes/session.js in branch master
Method function at line 189 of app\routes\session.js gets user input for the userName element. This element’s value then flows through the code without being properly sanitized or validated and is eventually displayed to the user in method function at line 189 of app\routes\session.js. This may enable a Cross-Site-Scripting attack.
Severity: High CWE:79 Vulnerability details and guidance Internal Guidance Lines: 192 256 191
Code (Line #192):
Code (Line #256):
Code (Line #191):