Lack of data validation - Modify DOM Elements
Description
The application allows the creation of dynamic DOM (Document Object Model) elements from user controlled inputs. In addition to being functionally expensive, this operation can lead to the creation and exploitation of other vulnerabilities such as buffer overflow or memory corruption.
Impact
Cause unexpected behaviors in the application which can lead to system unavailability.
Recommendation
Avoid generating dynamic DOM from user controlled inputs
Threat
Authenticated attacker from the Internet
Expected Remediation Time
⌚ minutes.
Score
Default score using CVSS 3.1. It may change depending on the context of the src.
Base
- Attack vector: N
- Attack complexity: L
- Privileges required: L
- User interaction: N
- Scope: U
- Confidentiality: N
- Integrity: L
- Availability: N
Temporal
- Exploit code madurity: P
- Remediation level: O
- Report confidence: C
Result
- Vector string: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
- Score:
- Base: 4.3
- Temporal: 3.9
- Severity:
- Base: Medium
- Temporal: Low
Requirements
Fixes
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.