Skip to content

Conversation

@asadeddin
Copy link

🐕 Corgea issued a PR to fix a vulnerability found in frontend/src/app/last-login-ip/last-login-ip.component.ts.

It is CWE-116: Improper Encoding or Escaping of Output that has a severity of 🔴 Critical.

🪄 Fix explanation

The fix removes the use of "bypassSecurityTrustHtml", which improperly trusted unescaped HTML content, and directly assigns the IP address to "lastLoginIp", preventing potential script injection.
- The original code used "bypassSecurityTrustHtml" to render HTML, which could allow script injection if the input was not sanitized.
- The fix directly assigns "payload.data.lastLoginIp" to "this.lastLoginIp", avoiding the creation of HTML content.
- By removing HTML rendering, the fix ensures that the IP address is treated as plain text, mitigating the risk of executing malicious scripts.

💡 Important Instructions

Ensure that payload.data.lastLoginIp is validated as a legitimate IP address format before assignment to prevent any unexpected input handling.

See the issue and fix in Corgea.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants