wasptree / verademo

A deliberately insecure Java web application
MIT License
1 stars 1 forks source link

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') [VID:95:WEB-INF/views/login.jsp:33] #585

Closed github-actions[bot] closed 2 years ago

github-actions[bot] commented 2 years ago

https://github.com/wasptree/verademo/blob/c165ee35d17866a3c4b1c1a7071e68ac3e446e5b/src/main/webapp/WEB-INF/views/login.jsp#L28-L38

Filename: WEB-INF/views/login.jsp

Line: 33

CWE: 95 (Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection'))

This call to eval() contains untrusted input or potentially untrusted data. If this input could be modified by an attacker, arbitrary JS code could be executed. Validate all untrusted and untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. In general, avoid executing code derived from untrusted input. References: CWE

github-actions[bot] commented 2 years ago

Veracode issue link to PR: https://github.com/wasptree/verademo/pull/579

github-actions[bot] commented 2 years ago

Veracode issue link to PR: https://github.com/wasptree/verademo/pull/584