CheckMarx scan on dot net application -
checkmarx scan complains "element’s value flows through code without being sanitized or validated , displayed user in method onitemdatabound " in places drop down values passed or selected.example:
strtext = dropdownlist.selectedvalue;
or
return dropdownlist.selectedvalue;
how sanitize these values?can htmlencode , decode apt avoid such vulnerability results?
note dot net application.
assuming referring xss vulnerability finding, resulting string other string, , controllable attacker.
yes, should call htmlencode (or perform other type of sanitization, deoending on context, e.g. antixss) on string before embedding in html - other external data.
Comments
Post a Comment