-
-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security issue with duplicit-load-prevention example #44
Comments
Hi @Baldinof thank you for letting me know! Anyway, i don't think this is really about
FYI the Please, correct me if I'm wrong and I will reopen this issue... |
It's not just about XSS, even if properly escaped, the example still allows to change server translations :/ I don't think that's what users of this package would expect, by just reading the documentation, and take inspiration from the example you get a vulnerable app (without any warning in the example code). If |
Well, i don't have any stats, but I think that |
Hi!
The duplicit-load-prevention example is subject to XSS injection.
The example add a
/addTranslations
route that seems to modify the translations stored in memory.How to reproduce:
npm run preview
/addTranslations
manually, with a malicious value forhome.text
:Results:
I don't really understand
duplicit-load-prevention
example but, considering the risk of using it, I think it should be removed from this repo (and maybe advertise thataddTranslations()
sould never be called with input from an untrusted source).The text was updated successfully, but these errors were encountered: