Skip to content

Conversation

@LorennaCunha
Copy link

This solution refers to which of the apps?

A3 - Gossip World

What did you do to mitigate the vulnerability?

I mitigated the XSS vulnerability by sanitizing user inputs across the app. I used the bleach library to clean and remove any potentially dangerous HTML tags and scripts from user-generated content, such as comments and posts. This prevents malicious JavaScript from executing in the browser when user content is displayed, thus securing the app from XSS attacks.

Did you test your changes? What commands did you run?

I tested the changes by trying to reproduce the attack narrative in the setup, by injecting JavaScript in comment, post, and search fields. After implementing the sanitization, I confirmed that the injected scripts were no longer executable and displayed as plain text, mitigating the XSS vulnerability.

dbConn, err := OpenDBConnection()
if err != nil {
errOpenDBConnection := fmt.Sprintf("OpenDBConnection error: %s", err)
errOpenDBConnection := ("OpenDBConnection error: %s" + err)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see any need to make any changes at this point. Is this change related to the vulnerability found?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It has nothing to do with the vulnerability, I just understood that it would be a good practice in the code

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants