Improper Input Validation Allows Malformed or Malicious Input

XMLWordPrintable

    • Type: Bug
    • Resolution: Unresolved
    • Priority: Highest
    • 3.6.1
    • Affects Version/s: 3.4.0

      The application does not properly validate user-supplied input in https://uatamrit.piramalswasthya.org/ecd/supervisor/innerpage-supervisor?data=smsTemplate. Improper input validation can lead to security issues such as SQL injection, XSS (Cross-Site Scripting), command injection, or application crashes.

      Vulnerability Name Vulnerable Point, Port or Parameter CVE/CWE CVSS Score Overall Risk
      (Severity)
      Mapping with OWASP Testing Checklist Observation / Description Impact Recommendation Reference Steps to reproduce
      Improper Input Validation https://uatamrit.piramalswasthya.org/ecd/supervisor/innerpage-supervisor?data=smsTemplate CWE-79 5.4 Medium OWASP Client Side Testing Allowing raw HTML input without proper validation increases the risk of future client-side vulnerabilities like stored XSS or UI manipulation
       
      Weak input validation may allow chaining with other attacks. Implement server-side validation to restrict HTML tags and unexpected input types.
       
      Sanitize all incoming user data using a secure whitelist approach.
      https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html  

            Assignee:
            Deep Shikha
            Reporter:
            Shashank Kharkwal
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated: