Skip to content

Possible Stored XSS Vulnerability in N-blog #484

@ajinabraham

Description

@ajinabraham

RULE ID: rule.ejs_ect_template
DESCRIPTION: The EJS/ECT template has an unescaped variable. Untrusted user input passed to this variable results in Cross Site Scripting (XSS).
TYPE: Regex
PATTERN: <%-(?![ ]include().%>
SEVERITY: ERROR
INPUTCASE: exact
CWE: CWE-79
OWASP: A1 - Injection

FILES_________

File: /N-blog-master/views/components/comments.ejs
Match Position: 712 - 734
Match String: <%- comment.content %>
Line: https://github.com/nswbmw/N-blog/blob/master/views/components/comments.ejs#L18

File: N-blog-master/views/components/post-content.ejs
Match Position: 567 - 586
Match String: <%- post.content %>
Line: https://github.com/nswbmw/N-blog/blob/master/views/components/post-content.ejs#L15

Detected by njsscan: https://github.com/ajinabraham/njsscan

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions