CheckMarx scan on dot net application -


checkmarx scan complains "element’s value flows through code without being sanitized or validated , displayed user in method onitemdatabound " in places drop down values passed or selected.example:

strtext = dropdownlist.selectedvalue; 

or

return dropdownlist.selectedvalue; 

how sanitize these values?can htmlencode , decode apt avoid such vulnerability results?

note dot net application.

assuming referring xss vulnerability finding, resulting string other string, , controllable attacker.
yes, should call htmlencode (or perform other type of sanitization, deoending on context, e.g. antixss) on string before embedding in html - other external data.


Comments

Popular posts from this blog

amazon web services - S3 Pre-signed POST validate file type? -

c# - Check Keyboard Input Winforms -