You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In case a user of grow does something like growl.error(errorMessageWithUserInput) then the client gets vulnerable for injection and XSS. This way an evil hacker can read cookies and send it to evil sites.
IMHO growl should already prevent such vulnerability e.g. by using $sanitize (https://docs.angularjs.org/api/ngSanitize/service/$sanitize). Filtering/escaping all markup would also be fine for me but maybe some growl users like to do injection of markup such as ul, string, em, etc. in growl messages.
The text was updated successfully, but these errors were encountered:
@morgenes noticed this vulnerability as well. If the message contains user supplied text, scripts can be run when the message is displayed (e.g., <script>console.log('gotcha')</script>). We take advantage of the fact messages are rendered as HTML because we want to have working links in our messages. To combat the XSS we are using Lodash's _.escape() on user-supplied input that is rendered in a message.
In case a user of grow does something like
growl.error(errorMessageWithUserInput)
then the client gets vulnerable for injection and XSS. This way an evil hacker can read cookies and send it to evil sites.IMHO growl should already prevent such vulnerability e.g. by using $sanitize (https://docs.angularjs.org/api/ngSanitize/service/$sanitize). Filtering/escaping all markup would also be fine for me but maybe some growl users like to do injection of markup such as ul, string, em, etc. in growl messages.
The text was updated successfully, but these errors were encountered: