rspec/rules/S5131/summary.adoc
2023-03-02 18:07:54 +01:00

1 line
308 B
Plaintext

This vulnerability makes it possible to temporarily execute JavaScript code in the context of the application, granting access to the session of the victim. This is possible because user-provided data, such as URL parameters, are copied into the HTML body of the HTTP response that is sent back to the user.