feat(disclaimers): Split disclaimers #10902
DryRun Security
Details
Cross-Site Scripting Analyzer Findings: 8 detected
⚠️ Potential Cross-Site Scripting dojo/templates/dojo/product_endpoint_pdf_report.html (click for details)
Type | Potential Cross-Site Scripting |
Description | The code is potentially vulnerable to XSS because it uses the safe filter to render the disclaimer variable without escaping. This means any HTML or JavaScript included in the disclaimer will be rendered directly, which could allow an attacker to inject malicious scripts. |
Filename | dojo/templates/dojo/product_endpoint_pdf_report.html |
CodeLink | django-DefectDojo/dojo/templates/dojo/product_endpoint_pdf_report.html Lines 119 to 125 in 564ccdc |
⚠️ Potential Cross-Site Scripting dojo/templates/dojo/endpoint_pdf_report.html (click for details)
Type | Potential Cross-Site Scripting |
Description | The code is potentially vulnerable to XSS because it uses the safe filter to bypass Django's default escaping mechanism. This means that any user-supplied content in the disclaimer variable will be rendered as raw HTML without any sanitization, which could allow an attacker to inject malicious scripts. |
Filename | dojo/templates/dojo/endpoint_pdf_report.html |
CodeLink | django-DefectDojo/dojo/templates/dojo/endpoint_pdf_report.html Lines 81 to 87 in 564ccdc |
⚠️ Potential Cross-Site Scripting dojo/templates/dojo/product_pdf_report.html (click for details)
Type | Potential Cross-Site Scripting |
Description | The code is potentially vulnerable to XSS because it uses the safe filter to bypass Django's default escaping mechanism. This means that any user-supplied content in the disclaimer variable will be rendered as raw HTML without any sanitization, which could allow an attacker to inject malicious scripts. |
Filename | dojo/templates/dojo/product_pdf_report.html |
CodeLink | django-DefectDojo/dojo/templates/dojo/product_pdf_report.html Lines 142 to 148 in 564ccdc |
⚠️ Potential Cross-Site Scripting dojo/templates/dojo/finding_pdf_report.html (click for details)
Type | Potential Cross-Site Scripting |
Description | The code is potentially vulnerable to XSS because it uses the safe filter to bypass Django's default escaping mechanism. This means that any user-supplied content in the disclaimer variable will be rendered as raw HTML without any sanitization, which could allow an attacker to inject malicious scripts. |
Filename | dojo/templates/dojo/finding_pdf_report.html |
CodeLink | django-DefectDojo/dojo/templates/dojo/finding_pdf_report.html Lines 57 to 63 in 564ccdc |
⚠️ Potential Cross-Site Scripting dojo/templates/dojo/product_type_pdf_report.html (click for details)
Type | Potential Cross-Site Scripting |
Description | The code is potentially vulnerable to XSS because it uses the safe filter to bypass Django's default escaping mechanism. This means that any user-supplied content in the disclaimer variable will be rendered as raw HTML without sanitization, which could allow an attacker to inject malicious scripts. |
Filename | dojo/templates/dojo/product_type_pdf_report.html |
CodeLink | django-DefectDojo/dojo/templates/dojo/product_type_pdf_report.html Lines 114 to 120 in 564ccdc |
⚠️ Potential Cross-Site Scripting dojo/templates/dojo/custom_html_report.html (click for details)
Type | Potential Cross-Site Scripting |
Description | The code is potentially vulnerable to XSS because it uses the safe filter on the disclaimer variable, which bypasses Django's default escaping mechanism. If the disclaimer content is not properly sanitized before being passed to the template, it could allow malicious scripts to be injected and executed in the browser. |
Filename | dojo/templates/dojo/custom_html_report.html |
CodeLink | django-DefectDojo/dojo/templates/dojo/custom_html_report.html Lines 3 to 14 in 564ccdc |
⚠️ Potential Cross-Site Scripting dojo/templates/dojo/engagement_pdf_report.html (click for details)
Type | Potential Cross-Site Scripting |
Description | The code is potentially vulnerable to XSS because it uses the safe filter to bypass Django's default escaping mechanism. This means that any user-supplied content in the disclaimer variable will be rendered as raw HTML without any sanitization, which could allow an attacker to inject malicious scripts. |
Filename | dojo/templates/dojo/engagement_pdf_report.html |
CodeLink | django-DefectDojo/dojo/templates/dojo/engagement_pdf_report.html Lines 158 to 164 in 564ccdc |
⚠️ Potential Cross-Site Scripting dojo/templates/dojo/test_pdf_report.html (click for details)
Type | Potential Cross-Site Scripting |
Description | The code is potentially vulnerable to XSS because it uses the safe filter to bypass Django's default escaping mechanism. This means that any user-supplied content in the disclaimer variable will be rendered as raw HTML without any sanitization, which could allow an attacker to inject malicious scripts. |
Filename | dojo/templates/dojo/test_pdf_report.html |
CodeLink | django-DefectDojo/dojo/templates/dojo/test_pdf_report.html Lines 146 to 152 in 564ccdc |