logo

188 Lack of data validation - Modify DOM Elements


Description

The application allows the creation of dynamic DOM (Document Object Model) elements from user controlled inputs. In addition to being functionally expensive, this operation can lead to the creation and exploitation of other vulnerabilities such as buffer overflow or memory corruption.


Impact

Cause unexpected behaviors in the application which can lead to system unavailability.


Recommendation

Avoid generating dynamic DOM from user controlled inputs


Threat

Authenticated attacker from the Internet


Expected Remediation Time

120 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: L
  • Attack Requirements: N
  • Privileges required: L
  • User interaction: N
  • Confidentiality (VC): N
  • Integrity (VI): L
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: P

Requirements


Fixes


Last updated

2024/02/15