-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
test/20241118_1034 #14
base: main
Are you sure you want to change the base?
Conversation
⛔ Snyk checks have failed. 3 issues have been found so far.
✅ security/snyk check is complete. No issues have been found. (View Details) ✅ license/snyk check is complete. No issues have been found. (View Details) ⛔ code/snyk check is complete. 3 issues have been found. (View Details) |
@@ -35,7 +35,26 @@ exports.index = function (req, res, next) { | |||
}; | |||
|
|||
exports.loginHandler = function (req, res, next) { | |||
// TODO: Implement | |||
if (validator.isEmail(req.body.username)) { | |||
User.find( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
NoSQL Injection
Unsanitized input from the HTTP request body flows into find, where it is used in an NoSQL query. This may result in an NoSQL Injection vulnerability.
CWE-943 | Priority score 813 | Line 39
Data flow: 6 steps
Step 1
username: req.body.username, |
Step 2
routes/index.js#41
Step 3
routes/index.js#41
Step 4
routes/index.js#41
Step 5
routes/index.js#40
Step 6
User.find( |
No description provided.