Possible open redirect vulnerability #18
Loading…
Reference in New Issue
No description provided.
Delete Branch "%!s(<nil>)"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
When uploading an html document that includes a
<script>
the attacker can redirect to any website.This isn't so bad, it just allows datatrash to be used as an unchecked link shortener, which should be avoided.
The fix would be to add a strict CSP to datatrash and make sure that no executable content will be served in such a way that the browser runs it.
Possible CSP fix: Only allow styles/scripts/etc from paths that belong to the application and are not uploaded files
Hopefully fixed by setting
Content-Type: application/octet-stream
when theSec-Fetch-Mode
request header is set to something other thannavigate
.