188 – Lack of data validation - Modify DOM Elements
Description
The application allows the creation of dynamic DOM (Document Object Model) elements from user controlled inputs. In addition to being functionally expensive, this operation can lead to the creation and exploitation of other vulnerabilities such as buffer overflow or memory corruption.
Impact
Cause unexpected behaviors in the application which can lead to system unavailability.
Recommendation
Avoid generating dynamic DOM from user controlled inputs
Threat
Authenticated attacker from the Internet
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: N
- Attack complexity: L
- Attack Requirements: N
- Privileges required: L
- User interaction: N
- Confidentiality (VC): N
- Integrity (VI): L
- Availability (VA): N
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
- Exploit maturity: P