HTML Injection
#3035
Replies: 1 comment
-
We are vigilant on XSS attacks and always sanitize user content to make sure malicious content never get executed. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
The application at data.gouv.fr is vulnerable to Persistent HTML Injection, via PUT and POST, in:
The application fails to sanitize the Description parameter, allowing the injection of HTML that will be executed when the user visits the pages:
HTML Injection vulnerabilities arise when data submitted by a user is used in subsequent application responses in an insecure way. An attacker can use this type of vulnerability to build a valid URL (with injected HTML), which could facilitate other attacks, namely Phishing.
Suggestion:
All data submitted by users must be properly sanitized and filtered, on the server side, before being returned to users.
Beta Was this translation helpful? Give feedback.
All reactions