All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.sonar.l10n.javascript.rules.javascript.S5148.html Maven / Gradle / Ivy

There is a newer version: 5.0.0.6962
Show newest version

A newly opened window having access back to the originating window could allow basic phishing attacks (the window.opener object is not null and thus window.opener.location can be set to a malicious website by the opened page).

For instance, an attacker can put a link (say: "http://example.com/mylink") on a popular website that changes, when opened, the original page to "http://example.com/fake_login". On "http://example.com/fake_login" there is a fake login page which could trick real users to enter their credentials.

Ask Yourself Whether

  • The application opens untrusted external URL.

There is a risk if you answered yes to this question.

Recommended Secure Coding Practices

Use noopener to prevent untrusted pages from abusing window.opener.

Sensitive Code Example

window.open("https://example.com/dangerous"); // Sensitive

Compliant Solution

window.open("https://example.com/dangerous", "WindowName", "noopener");

See





© 2015 - 2025 Weber Informatics LLC | Privacy Policy