-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CDPT-2079 Focus first new result after (infinite) pagination. #744
CDPT-2079 Focus first new result after (infinite) pagination. #744
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice :) do we need to worry about the .append() function reinterpreting text as HTML?
Hey @wilson1000 , I've double and triple checked and I think it's ok. With AFAICT, there is no opportunity for an attacker to get their own content into the parameters. From my understanding this is bad:
Because someone could visit example.com#<script>alert('pwned')</script> , and it would run the js. But I think it's safe to do the following:
|
Hey @EarthlingDavey - can a user intercept the request before the server responds, or do we have complete trust that the server gave us the response and not another service? I hope that made sense, and sorry for being (probably) catastrophic in my thinking! |
I think it's possible that a user could manipulate requests, but all $_POST data is being sanitized in This sanitization prevents 'reflected' xss attacks. But, I've learned recently that 'stored' xss attacks can happen when a script tag that's stored in the database makes it's way into the DOM, because of insufficient escaping at render time. I'll look into it, to see if this script is vulnerable to that kind of attack. |
No description provided.