You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
thrownewError(`'${k}' is not a valid parameter name.`)
has a potential XSS vulnerability that is easier to exploit than the similar #697 issue, mainly because a forward slash character is easily sent, e.g.,
{"error":"BAD_INPUT","message":"Parameters were invalid","details":[{"msg":"'<script>alert(document.domain)</script>' is not a valid parameter name.","param":"","location":"query"}]}
The code to reflect back any /api/cve parameter name (with an arbitrary payload) was added in 65652b5 on 2022-07-15.
Admittedly, the response comes with HTTP headers that may block exploitation except in older Internet Explorer, etc. (see #697 for details).
cve-services/src/middleware/middleware.js
Lines 222 to 225 in 7f68351
has a potential XSS vulnerability that is easier to exploit than the similar #697 issue, mainly because a forward slash character is easily sent, e.g.,
The code to reflect back any /api/cve parameter name (with an arbitrary payload) was added in 65652b5 on 2022-07-15.
Admittedly, the response comes with HTTP headers that may block exploitation except in older Internet Explorer, etc. (see #697 for details).
The text was updated successfully, but these errors were encountered: