taint vuln#8
Conversation
|
Kudos, SonarCloud Quality Gate passed!
|
|
Kudos, SonarCloud Quality Gate passed!
|
|
Kudos, SonarCloud Quality Gate passed!
|
|
SonarCloud Quality Gate failed.
|
|
Kudos, SonarCloud Quality Gate passed!
|
|
|
Kudos, SonarCloud Quality Gate passed!
|
|
Kudos, SonarCloud Quality Gate passed!
|
|
|
2 similar comments
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
🤖 Pull Request summaryAdds URL-based redirect functionality to application initialization. • Extracts "url" query parameter from current page URL and immediately redirects to it Review focus: This introduces a critical security vulnerability - unrestricted redirects can enable phishing attacks. The redirect URL should be validated against an allowlist of safe domains.
|
|
|
|
1 similar comment
|
|
|
|
1 similar comment
|
|
|
|
|
SonarQube reviewer guide
|
|
|
SonarQube reviewer guide
|
SonarQube reviewer guide
|
SonarQube reviewer guide
|
|
1 similar comment
|
|
|
||
| const queryParams = new URLSearchParams(document.location.search); | ||
| const redirectUrl = queryParams.get("url"); | ||
| document.location = redirectUrl; |
Check failure
Code scanning / SonarCloud
DOM updates should not lead to open redirect vulnerabilities High
SonarQube reviewer guide
|
1 similar comment
SonarQube reviewer guide
|
SonarQube reviewer guide
|
|
|
||
| const queryParams = new URLSearchParams(document.location.search); | ||
| const redirectUrl = queryParams.get("url"); | ||
| document.location = redirectUrl; |
Check failure
Code scanning / SonarCloudDev6
DOM updates should not lead to open redirect vulnerabilities High
SonarQube reviewer guide
|

















No description provided.