Stored_XSS issue exists @ WebGoat/Content/PathManipulation.aspx.cs in branch master
Method ResponseFile at line 49 of WebGoat\Content\PathManipulation.aspx.cs gets data from the database, for the ReadBytes element. This element’s value then flows through the code without being properly filtered or encoded and is eventually displayed to the user in method ResponseFile at line 49 of WebGoat\Content\PathManipulation.aspx.cs. This may enable a Stored Cross-Site-Scripting attack.
Stored_XSS issue exists @ WebGoat/Content/PathManipulation.aspx.cs in branch master
Method ResponseFile at line 49 of WebGoat\Content\PathManipulation.aspx.cs gets data from the database, for the ReadBytes element. This element’s value then flows through the code without being properly filtered or encoded and is eventually displayed to the user in method ResponseFile at line 49 of WebGoat\Content\PathManipulation.aspx.cs. This may enable a Stored Cross-Site-Scripting attack.
Severity: High
CWE:79
Vulnerability details and guidance
Checkmarx
Lines: 88
Code (Line #88):