Skip to content
This repository was archived by the owner on Mar 21, 2025. It is now read-only.

Conversation

@Onyx2406
Copy link

@Onyx2406 Onyx2406 commented Jun 20, 2023

Description

This fix creates jQuery objects for each HTML element and sets their attributes and text content separately, which ensures that no untrusted string can be interpreted as HTML. This way, even if inputId or $(this).text() are controlled by a user and contain malicious script, they will be treated as plain text and not executed as script which prevents injection attacks.

Related issues and discussion

#3526

Screenshots, if any

image

Checklist

Please make sure these boxes are checked before submitting your pull request - thanks!

  • [] Validate the JS and HTML files with grunt validate to detect errors and potential problems in JavaScript code.
    giving network error "grunt validate" giving network error #3519

  • [] Run the tests by opening test/SpecRunner.html in the browser to make sure you didn't break anything.

  • If you have multiple commits please combine them into one commit by squashing them.

  • Read and understood the contribution guidelines at community-app/Contributing.md.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant