VID |
210147 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
Client Side (Javascript) - never use Eval. Needing to use eval usually indicates a problem in your design. - In any programming language you should be extremely cautious of executing code from an untrusted source. The same is true for JavaScript - you should be extremely cautious of running eval() against any code that may have been tampered with - for example, strings taken from the page query string. Executing untrusted code can leave you vulnerable to cross-site scripting attacks.
https://www.owasp.org/index.php/OWASP_AJAX_Security_Guidelines#Don.27t_use_eval
* Platforms Affected: Any HTTP server Any version Any operating system Any version |
Recommendation |
Client Side (Javascript) - Don't Use Eval - Validate User Input |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|