Skip to content

Conversation

@asadeddin
Copy link

🐕 Corgea issued a PR to fix a vulnerability found in frontend/src/app/about/about.component.ts.

It is CWE-116: Improper Encoding or Escaping of Output that has a severity of 🔴 Critical.

🪄 Fix explanation

The fix removes the use of "bypassSecurityTrustHtml", ensuring that user comments are safely bound in the template without bypassing Angular's built-in security mechanisms, thus preventing potential XSS attacks.
- The line "feedbacks[i].comment = this.sanitizer.bypassSecurityTrustHtml(feedbacks[i].comment)" is removed to prevent bypassing Angular's security.
- Comments are now directly bound in the template, leveraging Angular's automatic HTML escaping to prevent XSS.
- The fix ensures that any HTML content in "feedbacks[i].comment" is treated as plain text, preserving the intended structure.

💡 Important Instructions

Ensure that the template where feedbacks[i].comment is used is properly configured to bind the comment safely, using Angular's data binding syntax.

See the issue and fix in Corgea.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants