From bd7292acd35807c1e47975513bb4c872c3a7c164 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 20 Nov 2023 15:02:48 +0530 Subject: [PATCH] Update wildcard-postmessage.yaml --- http/misconfiguration/wildcard-postmessage.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/http/misconfiguration/wildcard-postmessage.yaml b/http/misconfiguration/wildcard-postmessage.yaml index 3f2b5c0cdc..e802f72f76 100644 --- a/http/misconfiguration/wildcard-postmessage.yaml +++ b/http/misconfiguration/wildcard-postmessage.yaml @@ -3,7 +3,7 @@ id: wildcard-postmessage info: name: postMessage - Cross-Site Scripting author: pdteam - severity: high + severity: unknown description: postMessage contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and therefore steal cookie-based authentication credentials and launch other attacks. reference: - https://jlajara.gitlab.io/web/2020/06/12/Dom_XSS_PostMessage.html