HTML Injection
#3035
Replies: 1 comment
-
|
We are vigilant on XSS attacks and always sanitize user content to make sure malicious content never get executed. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
The application at data.gouv.fr is vulnerable to Persistent HTML Injection, via PUT and POST, in:
The application fails to sanitize the Description parameter, allowing the injection of HTML that will be executed when the user visits the pages:
HTML Injection vulnerabilities arise when data submitted by a user is used in subsequent application responses in an insecure way. An attacker can use this type of vulnerability to build a valid URL (with injected HTML), which could facilitate other attacks, namely Phishing.
Suggestion:
All data submitted by users must be properly sanitized and filtered, on the server side, before being returned to users.
Beta Was this translation helpful? Give feedback.
All reactions