Custodela / NodeGoat

The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
https://www.owasp.org/index.php/Projects/OWASP_Node_js_Goat_Project
Apache License 2.0
0 stars 0 forks source link

CX Reflected_XSS @ app/routes/contributions.js [master] #5

Open kmcdon83 opened 6 years ago

kmcdon83 commented 6 years ago

Reflected_XSS issue exists @ app/routes/contributions.js in branch master

Method function at line 9 of app\routes\contributions.js gets user input for the userId element. This element’s value then flows through the code without being properly sanitized or validated and is eventually displayed to the user in method contributionsDAO.getByUserId at line 12 of app\routes\contributions.js. This may enable a Cross-Site-Scripting attack.

Severity: High CWE:79 Vulnerability details and guidance Internal Guidance Lines: 34 10


Code (Line #34):

        var userId = req.session.userId;

Code (Line #10):

        var userId = req.session.userId;

kmcdon83 commented 6 years ago

Issue still exists.

kmcdon83 commented 6 years ago

Issue still exists.