The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
Reflected_XSS issue exists @ app/routes/contributions.js in branch master
Method function at line 9 of app\routes\contributions.js gets user input for the userId element. This element’s value then flows through the code without being properly sanitized or validated and is eventually displayed to the user in method contributionsDAO.getByUserId at line 12 of app\routes\contributions.js. This may enable a Cross-Site-Scripting attack.
Reflected_XSS issue exists @ app/routes/contributions.js in branch master
Method function at line 9 of app\routes\contributions.js gets user input for the userId element. This element’s value then flows through the code without being properly sanitized or validated and is eventually displayed to the user in method contributionsDAO.getByUserId at line 12 of app\routes\contributions.js. This may enable a Cross-Site-Scripting attack.
Severity: High CWE:79 Vulnerability details and guidance Internal Guidance Lines: 34 10
Code (Line #34):
Code (Line #10):