kmcdon83 / DVWA

Damn Vulnerable Web Application (DVWA)
http://dvwa.co.uk
GNU General Public License v3.0
0 stars 1 forks source link

CX Reflected_XSS_All_Clients @ vulnerabilities/sqli/session-input.php [master] #8

Open ghost opened 3 years ago

ghost commented 3 years ago

Reflected_XSS_All_Clients issue exists @ vulnerabilities/sqli/session-input.php in branch master

Method <?php at line 1 of vulnerabilities\sqli\session-input.php gets user input for the _POST element. This element’s value then flows through the code without being properly sanitized or validated and is eventually displayed to the user in method dvwaSourceHtmlEcho at line 382 of dvwa\includes\dvwaPage.inc.php. This may enable a Cross-Site-Scripting attack.

Severity: High

CWE:79

Vulnerability details and guidance

Internal Guidance

Checkmarx

Training Recommended Fix

Lines: 12


Code (Line #12):

    $_SESSION[ 'id' ] =  $_POST[ 'id' ];

ghost commented 3 years ago

Issue still exists.

ghost commented 3 years ago

Issue still exists.

ghost commented 3 years ago

Issue still exists.

ghost commented 3 years ago

Issue still exists.