Open tsunez opened 4 years ago
Issue still exists.
Issue has 2 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)
Issue still exists.
Issue has 2 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)
Client_Remote_File_Inclusion issue exists @ igoat-swift/igoat-swift/resources/html/splash.html in branch master
The application loads an external library or source code file using "https://platform.twitter.com/widgets.js", at line 16 of igoat-swift\igoat-swift\resources\html\splash.html. An attacker might be able to exploit this and cause the application to load arbitrary code. Note that the client application retrieves the external JavaScript library from a remote 3rd party server. It might be possible to exploit this trust model and cause the user's browser to load and execute arbitrary code.
Severity: Low
CWE:829
Vulnerability details and guidance
Checkmarx
Recommended Fix
Lines: 16 27
Code (Line #16):
Code (Line #27):