Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CX Reflected_XSS_All_Clients @ XtremelyEvilWebApp/StealCookies.aspx.cs [master] #5

Open
kmcdon83 opened this issue Sep 14, 2018 · 1 comment

Comments

@kmcdon83
Copy link

Reflected_XSS_All_Clients issue exists @ XtremelyEvilWebApp/StealCookies.aspx.cs in branch master

Method Page_Load at line 8 of XtremelyEvilWebApp\StealCookies.aspx.cs gets user input for the QueryString_Cookie element. This element’s value then flows through the code without being properly sanitized or validated and is eventually displayed to the user in method Page_Load at line 8 of XtremelyEvilWebApp\StealCookies.aspx.cs. This may enable a Cross-Site-Scripting attack.

Severity: High
CWE:79
Vulnerability details and guidance
Lines: 10


Code (Line #10):

            var cookie = Request.QueryString["Cookie"];

@kmcdon83
Copy link
Author

Issue still exists.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant