Skip to content
This repository has been archived by the owner on Nov 19, 2024. It is now read-only.

Fix XSS in the preview functionality #3

Closed
wants to merge 1 commit into from
Closed

Fix XSS in the preview functionality #3

wants to merge 1 commit into from

Conversation

j-mie
Copy link

@j-mie j-mie commented Sep 13, 2016

By default this library uses the including preview page, which doesn't make use of the markdown_safe function. I changed the page to use markdown_safe so that this page wouldn't allow XSS by default.

By default this library uses the including preview page, which doesn't make use of the markdown_safe function. I changed the page to use markdown_safe so that this page wouldn't allow XSS by default.
@j-mie
Copy link
Author

j-mie commented Sep 13, 2016

I submitted this upstream but I'm presuming it will go unmerged just like the rest of the PRs. klen/django_markdown#74

@coveralls
Copy link

Coverage Status

Coverage increased (+0.8%) to 64.831% when pulling 3fdfb1d on JamieH:patch-1 into 58e4b4e on sv0:master.

@sv0
Copy link
Owner

sv0 commented Sep 14, 2016

XSS is injecting client-side scripts into web pages viewed by other users.

Mentioned preview is viewed only by the user who edits some markdown content, but not by other users.

@j-mie
Copy link
Author

j-mie commented Oct 4, 2016

There is no CSRF, You should merge this request to stop potential XSS via a rogue form on another site.

@sv0 sv0 closed this Oct 17, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants