Unsanitized user input in HTTP response (XSS)
- Rule ID: javascript_express_cross_site_scripting
- Languages: javascript
- Source: cross_site_scripting.yml
Description
Including unsanitized user input in HTTP responses exposes your application to cross-site scripting (XSS) attacks. This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users.
Remediations
- Do not include user input directly in a response. This practice can lead to XSS vulnerabilities.
res.send(req.body.data); // unsafe
- Do sanitize user input before including it in a response. Use library functions or frameworks designed for input sanitization to ensure that user data cannot be interpreted as executable code.
References
Associated CWE
OWASP Top 10
Configuration
To skip this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --skip-rule=javascript_express_cross_site_scripting
To run only this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --only-rule=javascript_express_cross_site_scripting