nswbmw / N-blog

《一起学 Node.js》
15.42k stars 4.64k forks source link

Possible Stored XSS Vulnerability in N-blog #484

Open ajinabraham opened 4 years ago

ajinabraham commented 4 years ago

RULE ID: rule.ejs_ect_template DESCRIPTION: The EJS/ECT template has an unescaped variable. Untrusted user input passed to this variable results in Cross Site Scripting (XSS). TYPE: Regex PATTERN: <%-(?![ ]include().%> SEVERITY: ERROR INPUTCASE: exact CWE: CWE-79 OWASP: A1 - Injection

__FILES___

File: /N-blog-master/views/components/comments.ejs Match Position: 712 - 734 Match String: <%- comment.content %> Line: https://github.com/nswbmw/N-blog/blob/master/views/components/comments.ejs#L18

File: N-blog-master/views/components/post-content.ejs Match Position: 567 - 586 Match String: <%- post.content %> Line: https://github.com/nswbmw/N-blog/blob/master/views/components/post-content.ejs#L15

Detected by njsscan: https://github.com/ajinabraham/njsscan