Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prevent XSS vector from section names #290

Merged
merged 1 commit into from
Sep 21, 2017
Merged

Prevent XSS vector from section names #290

merged 1 commit into from
Sep 21, 2017

Conversation

nitriques
Copy link
Member

Section names are not safe to output as is.

Section names are not safe to output as is.
Copy link
Member

@michael-e michael-e left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is the attack vector here? Are we talking about "developer" users in the backend only? Or do we have a bigger issue than that?

@brendo?

@nitriques
Copy link
Member Author

Are we talking about "developer" users in the backend only

Mostly developers directly, but anybody else also. Let's say there is a hypothetical problem that allows an attacker to change the section name. Then the XSS becomes a nice payload delivery, to run js in the CMS.

@nitriques nitriques merged commit 7866ff4 into integration Sep 21, 2017
@nitriques nitriques deleted the xss branch September 21, 2017 17:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants