Partial user controllable script source

Description

Kayran has detected that the script source on your site is user controllable.
The “src” parameter for one (or more) script tags from this page can be directly controlled by user inputs.

An attacker who has the options to control the reference location of a JavaScript source file can load any script of their choice into the application, manipulating it for themselves.

Recommendation

To prevent it, properly sanitize user input, and, do not allow any user’s input to control any script source location references.

References

https://cwe.mitre.org/data/definitions/79.html

https://cwe.mitre.org/data/definitions/80.html

https://cwe.mitre.org/data/definitions/94.html

< Return to all Vulnerabilities

HAR Files

In this article, I’ll talk and explain about HAR Files, so if you don’t know what they are, or, what do we use them for,

Read More »

Red Team

You’ve probably heard that there are teams in the Cyber field called Red Team and Blue Team. Let’s talk about the red one, shall we?

Read More »

Using VPN

What is a VPN? Why should someone be using VPN? Which Problems does is solve? and what is the advantages and disadvantages of it? Let’s

Read More »

Passwords 101

Unlike basketballs, “passwords” are things we don’t want to be passed around, especially in a society built around the idea that “mystery” is appealing. We

Read More »

Browser Exploitation

We know that it’s possible to exploit weaknesses (or vulnerabilities) that exist in anything, from a certain code to the entire application, let’s talk about

Read More »