这是indexloc提供的服务,不要输入任何密码
Skip to content

Conversation

@jmmacdo4
Copy link
Contributor

@jmmacdo4 jmmacdo4 commented Mar 25, 2021

Wherever ListPickerTag.java is used, the individual items could contain HTML XSS that could be embedded on the page. By sanitizing them using HTML encoding, they no longer allow XSS attacks such as iframes.

@isears I am currently trying to untangle the git mess I made with this one (I didn't make a new branch for the error div vulnerability we talked about last week). The only change that should be in this PR is in ListPickerTag.java. I just wanted to get it up for review ASAP since our meeting is tomorrow.

@HerbertYiga
Copy link
Contributor

I am currently trying to untangle the git mess I made with this one

@jmmacdo4 are you still working on this mess

@isears
Copy link
Member

isears commented Mar 27, 2021

Oh, I see. I by mistake closed #136 because I assumed this superseded it. I'll go ahead and reopen it.

It definitely makes sense to keep these two issues separate. First glance at the <br> refactoring looks good. Ping me when you've sorted all the changes into the appropriate PRs.

@jmmacdo4 jmmacdo4 closed this Mar 27, 2021
@jmmacdo4
Copy link
Contributor Author

This PR has been restructured and reopened as #150

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants