Open veereshsg-git opened 4 years ago
This is not the correct repository for AngularJS issues. Transferring...
Would it be possible for you to provide a test case where AngularJS was vulnerable and send it to security@angularjs.org? See https://docs.angularjs.org/guide/security for more information about reporting security issues.
Sure. Will do it. Thanks.
Hi FYI - I sent a mail to security@angularjs.org with use case details. Thanks.
This report appears incorrect to me. While window.location.href is a source of untrusted data, this data is not ever evaluated by Angular in any way.
So the way we interact with that API does not poseΒ a problem and it's safe to ignore the warning.
We see quite a few scanning tools identify false positives in angular.js and this seems to be just another one.
This report appears incorrect to me. While window.location.href is a source of untrusted data, this data is not ever evaluated by Angular in any way.
So the way we interact with that API does not pose a problem and it's safe to ignore the warning.
We see quite a few scanning tools identify false positives in angular.js and this seems to be just another one.
Thanks for the valuable comment. It will certainly help me to proceed.
πππππππππππππππππππππππππππ
Please read https://angular.io/guide/security#report-issues on how to disclose security related issues.
πππππππππππππππππππππππππππ Hi Team - Request to provide solution to avoid below issue in Coverity scan.
Issue Details are as follows,
The property window.location.href is a source of untrusted data.
DOM-based cross-site scripting (DOM_XSS)2. sink: Calling urlResolve. This call uses window.location.href for sensitive computation. [show details] The untrusted data reaches a sink that can either lead to HTML injection, JavaScript code execution, or the manipulation of a URL starting with the "javascript:" or "data:" schemes. Any of these can lead to a DOM XSS vulnerability.
var originUrl = urlResolve(window.location.href);