An attacker can run malicious JavaScript code due to an XSS in the GeneralHandler GET handler.
NanoHTTPD (,2.3.1), fixed in [2.3.2]
An issue was discovered in RouterNanoHTTPD.java in NanoHTTPD through 2.3.1. The GeneralHandler
class implements a basic GET handler that prints debug information as an HTML page. Any web server that extends this class without implementing its own GET handler is vulnerable to reflected XSS, because the GeneralHandler
GET handler prints user input passed through the query string without any sanitization.
http://vulnerable.com?a=<script>alert("XSS!");</script>
Implement a different general GET handler that does not use user-input