Describe the bug
I think your project allows Stored XSS (in Add User) to bypass the 20-character limit via datax-admin/src/main/java/com/wugui/datax/admin/controller/UserController.java#L27. It shares similarities to a recent CVE disclosure CVE-2020-29204 in thexuxueli/xxl-job.
The source vulnerability information is as follows:
**Requirement or improvement
The corresponding fixes are similar to CVE-2020-29204 to some extent. You can follow the patch of CVE-2020-29204 to fix it.
Describe the bug I think your project allows Stored XSS (in Add User) to bypass the 20-character limit via datax-admin/src/main/java/com/wugui/datax/admin/controller/UserController.java#L27. It shares similarities to a recent CVE disclosure CVE-2020-29204 in thexuxueli/xxl-job.
The source vulnerability information is as follows:
To Reproduce The reproduce step may be similiar to the xxl-job(https://github.com/xuxueli/xxl-job/issues/2083)
Expected behavior Add User
Which version of DataX Web: the newest version
**Requirement or improvement The corresponding fixes are similar to CVE-2020-29204 to some extent. You can follow the patch of CVE-2020-29204 to fix it.