Skip to content

Commit dd34433

Browse files
committed
Remove XSS from list of vulnerabilities
1 parent 435330e commit dd34433

File tree

2 files changed

+0
-3
lines changed

2 files changed

+0
-3
lines changed

README.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,6 @@ This project contains the following vulnerabilities:
3131

3232
- Remote Code Execution
3333
- SQL injection
34-
- XSS
3534
- Insecure Deserialization
3635
- Directory Traversal
3736
- Open Redirect
@@ -47,7 +46,6 @@ $ grep vulnerability . -R -n | grep -v README
4746
./flask_webgoat/actions.py:43: # vulnerability: Remote Code Execution
4847
./flask_webgoat/users.py:37: # vulnerability: SQL Injection
4948
./flask_webgoat/auth.py:17: # vulnerability: SQL Injection
50-
./flask_webgoat/ui.py:14: # vulnerability: XSS
5149
./flask_webgoat/actions.py:60: # vulnerability: Insecure Deserialization
5250
./flask_webgoat/actions.py:35: # vulnerability: Directory Traversal
5351
./flask_webgoat/auth.py:45: # vulnerability: Open Redirect

flask_webgoat/ui.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@ def search():
1111
query_param = request.args.get("query")
1212
if query_param is None:
1313
message = "please provide the query parameter"
14-
# vulnerability: XSS
1514
return render_template("error.html", message=message)
1615

1716
try:

0 commit comments

Comments
 (0)