TSU-09 concerns security issues in Mendix components that are rendered or executed in the user’s (mobile) browser. Mendix uses various types of UI components that run in the browser and can therefore expose sensitive or malicious data. This includes, among others:
The Mendix platform does not technically restrict access to pages; it only controls their visibility. This means that all pages and UI components are readable by attackers, even if they are not visible to regular users.
As a result, for example:
Standard Mendix widgets automatically protect against the injection of HTML or JavaScript via user input.
This protection does not automatically apply to:
This can lead to Cross-Site Scripting (XSS) and the hijacking of user sessions.
When designing pages, nanoflows, and other UI components, ensure that no sensitive information is hard-coded. If you use Marketplace or custom UI components to display user data, they must actively prevent HTML and JavaScript injection.
Follow these best practices:
These are the most common risks associated with insecure UI-components.
Want to identify and prevent vulnerabilities in Mendix at an early stage? Take a look at our renewed Mendix security trainings based on The S-Unit Top 10.
Want to know how your Mendix application scores against The S-Unit Top 10? In collaboration with Omnext, we have developed a Mendix-specific SAST solution that continuously and automatically scans for vulnerabilities. By integrating The S-Unit Top 10 into the CI/CD pipeline, risks are identified early and made immediately visible. Learn more about our collaboration with Omnext and the Mendix-specific SAST module.