Permissive origin in postMessage
Overview
Rule ID:
java_lang_information_leakageApplicable Languages: Javascript
Weakness ID: CWE-346
Description
Using a permissive origin in postMessage calls presents a security risk. Setting the target origin to "*" in a postMessage call means that any website can receive the message, potentially exposing sensitive information to unauthorized parties.
Remediation Guidelines
Do not use
"*"as the target origin inpostMessagecalls. This practice is insecure because it permits any website to receive the messages.window.postMessage(message, '*'); // unsafeDo specify the precise origin of the target application when using
postMessage. This ensures that only the intended recipient can access the message.window.postMessage(message, 'https://myapp.example.com');
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
Last updated