You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A potential vulnerability has been detected, specifically in the initialTasks.js file. The current method of sanitizing URLs by checking if a particular host is a substring of the URL string could lead to bypassing security checks. This could lead to malicious redirections or request forgeries. Detected by CodeQL deployed on forked repository.
Steps to Reproduce
Open up the 'initialTasks.js' file, which you'll find in the app/scripts folder.
Have a look at how we're checking the URL.
Expected Behaviour
When we're making sure a URL is safe, we need to be really thorough. This means looking at the whole URL, breaking it down, and then checking that the host is one we trust.
Actual Behaviour
Right now, we're just checking if 'mifos.io' appears somewhere in the URL. The issue is, someone could hide this in a part of the URL where it doesn't belong, tricking our check into thinking it's a safe URL.
Description
A potential vulnerability has been detected, specifically in the initialTasks.js file. The current method of sanitizing URLs by checking if a particular host is a substring of the URL string could lead to bypassing security checks. This could lead to malicious redirections or request forgeries. Detected by CodeQL deployed on forked repository.
Steps to Reproduce
Expected Behaviour
When we're making sure a URL is safe, we need to be really thorough. This means looking at the whole URL, breaking it down, and then checking that the host is one we trust.
Actual Behaviour
Right now, we're just checking if 'mifos.io' appears somewhere in the URL. The issue is, someone could hide this in a part of the URL where it doesn't belong, tricking our check into thinking it's a safe URL.
Screenshots
Settings
References
Common Weakness Enumeration: CWE-20
The text was updated successfully, but these errors were encountered: