Stored_XSS issue exists @ WebGoat/Content/ReadlineDoS.aspx.cs in branch master
Method btnUpload_Click at line 14 of WebGoat\Content\ReadlineDoS.aspx.cs gets data from the database, for the ReadLine element. This element’s value then flows through the code without being properly filtered or encoded and is eventually displayed to the user in method btnUpload_Click at line 14 of WebGoat\Content\ReadlineDoS.aspx.cs. This may enable a Stored Cross-Site-Scripting attack.
Stored_XSS issue exists @ WebGoat/Content/ReadlineDoS.aspx.cs in branch master
Method btnUpload_Click at line 14 of WebGoat\Content\ReadlineDoS.aspx.cs gets data from the database, for the ReadLine element. This element’s value then flows through the code without being properly filtered or encoded and is eventually displayed to the user in method btnUpload_Click at line 14 of WebGoat\Content\ReadlineDoS.aspx.cs. This may enable a Stored Cross-Site-Scripting attack.
Severity: High
CWE:79
Vulnerability details and guidance
Checkmarx
Lines: 23
Code (Line #23):