- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
ID: typescript-browser-security/inner-outer-html
Language: TypeScript
Severity: Warning
Category: Security
CWE: 79
Properties like innerHTML
and outerHTML
should not be modified directly unless such modifications are clearly reviewed. Modifying innerHTML
or outerHTML
using user inputs that has not been validated can lead to XSS injection.
function nonCompliant(argument) {
const content = '<div>' + argument + '</div>';
document.write(content);
}
function nonCompliant(myArgument) {
document.body.outerHTML = myArgument;
}
if (typeof(SERVER_DOMAIN) === 'undefined') {
window.location.replace("/unconfigured.html");
}
const RECEIVE_URL = SERVER_DOMAIN + "/challenge_scoreboard.html" + "?origin=" + get_domain();
var window_ref = null;
document.getElementById("username").focus();
function store_username() {
var username;
var username_obj;
username_obj = document.getElementById("username");
username = username_obj.value
var welcome;
welcome = document.getElementById("welcome");
welcome.innerHTML = "Welcome " + html_encode (username);
var set_username;
set_username = document.getElementById("set_username");
set_username.style.display="none";
var game;
game = document.getElementById("game");
game.style.display="inline";
start_game();
// have to do time out so the window can open
setTimeout (function () {send_username(username);}, 1000);
return false;
}
|
|
For more information, please read the Code Analysis documentation
Identify code vulnerabilities directly in yourVS Code editor
Identify code vulnerabilities directly inJetBrains products