cxnleach / Vuln_GO_App

MIT License
0 stars 0 forks source link

CX Client_Hardcoded_Domain @ template/single-blog.html [master] #30

Open github-actions[bot] opened 1 month ago

github-actions[bot] commented 1 month ago

Client_Hardcoded_Domain issue exists @ template/single-blog.html in branch master

*The JavaScript file imported in "https://maps.googleapis.com/maps/api/js?key=AIzaSyCjCGmQ0Uq4exrzdcL6rvxywDDOvfAu6eE" in template\single-blog.html at line 617 is from a remote domain, which may allow attackers to replace its contents with malicious code.Similarity ID: -2127889558

The JavaScript file imported in "https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.11.0/umd/popper.min.js" in template\single-blog.html at line 607 is from a remote domain, which may allow attackers to replace its contents with malicious code.Similarity ID: -189149740*

Severity: Low

CWE:829

Vulnerability details and guidance

Internal Guidance

Checkmarx

Training Recommended Fix

Lines: 617 607


Code (Line #617):

<script src="https://maps.googleapis.com/maps/api/js?key=AIzaSyCjCGmQ0Uq4exrzdcL6rvxywDDOvfAu6eE"></script>

Code (Line #607):

<script src="https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.11.0/umd/popper.min.js" integrity="sha384-b/U6ypiBEHpOf/4+1nzFpr53nxSS+GLCkfwBdFNTxtclqqenISfwAzpKaMNFNmj4"

github-actions[bot] commented 1 month ago

Issue still exists.