Dojo.js有未经验证的数据

时间:2015-01-07 16:51:03

标签: javascript security dojo fortify phishing

我正在使用供应商创建的电子学习课程(我们不再处理这些课程),以及何时通过我公司的安全软件(HP Fortify Scan)上传文件我&#39 ;我得到多个错误。我已经纠正了所有错误。错误发生在dojo.js文件中,它与未经验证的url变量有关。我确定这是一个简单的解决方法,但有人可以解释是什么原因导致无效吗?我该如何验证此url变量?

以下是带有代码的错误消息的屏幕截图(我将行号放在注释中):

Fortify Scan Screen Shot

代码:

function xhr(url, options, returnDeferred){
    var response = util.parseArgs(
        url,
        util.deepCreate(defaultOptions, options),
        has('native-formdata') && options && options.data && options.data instanceof FormData
    );
    // THIS IS LINE 11540
    url = response.url; 
    options = response.options;

    var remover,
        last = function(){
            remover && remover();
        };

    //Make the Deferred object for this xhr request.
    var dfd = util.deferred(
        response,
        cancel,
        isValid,
        isReady,
        handleResponse,
        last
    );
    var _xhr = response.xhr = xhr._create();

    if(!_xhr){
        // If XHR factory somehow returns nothings,
        // cancel the deferred.
        dfd.cancel(new RequestError('XHR was not created'));
        return returnDeferred ? dfd : dfd.promise;
    }

    response.getHeader = function(headerName){
        return this.xhr.getResponseHeader(headerName);
    };

    if(addListeners){
        remover = addListeners(_xhr, dfd, response);
    }

    var data = options.data,
        async = !options.sync,
        method = options.method;

    try{
        // IE6 won't let you call apply() on the native function.
        // THIS IS LINE 11580
        _xhr.open(method, url, async, options.user || undefined, options.password || undefined);

        if(options.withCredentials){
            _xhr.withCredentials = options.withCredentials;
        }

        var headers = options.headers,
            contentType;
        if(headers){
            for(var hdr in headers){
                if(hdr.toLowerCase() === 'content-type'){
                    contentType = headers[hdr];
                }else if(headers[hdr]){
                    //Only add header if it has a value. This allows for instance, skipping
                    //insertion of X-Requested-With by specifying empty value.
                    _xhr.setRequestHeader(hdr, headers[hdr]);
                }
            }
        }

        if(contentType && contentType !== false){
            _xhr.setRequestHeader('Content-Type', contentType);
        }
        if(!headers || !('X-Requested-With' in headers)){
            _xhr.setRequestHeader('X-Requested-With', 'XMLHttpRequest');
        }

        if(util.notify){
            util.notify.emit('send', response, dfd.promise.cancel);
        }
        _xhr.send(data);
    }catch(e){
        dfd.reject(e);
    }

    watch(dfd);
    _xhr = null;

    return returnDeferred ? dfd : dfd.promise;
}

提前致谢,

麦克

1 个答案:

答案 0 :(得分:0)

我说这不一定是错误,只是HP Fortify Scan指出dojo / request / xhr.js中的一段代码,如果您的服务器代码是没有为这样的攻击做好准备...您可以在您的应用程序(可能在您的商店中)中调用xhr()的更高级代码验证URL,不确定它是否满足HP Fortify。