fix(sanitizer): improve reliability of sanitizer #26820
Merged
+37
−2
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull request checklist
Please check if your PR fulfills the following requirements:
ionic-docs
repo, in a separate PR. See the contributing guide for details.npm run build
) was run locally and any changes were pushednpm run lint
) has passed locally and any fixes were made for failuresPull request type
Please check the type of change your PR introduces:
What is the current behavior?
We received a report about 3 XSS attack vectors:
onload
is fired in Chrome when the untrusted string is appended to the document fragment. Even though we later remove theonload
attribute, Chrome has already executed the code.javascript:
code can be executed by adding special characters to thejavascript:
string. For example, addingjava	script:
is still interpreted by the browser asjavascript:
.Element.attributes
. This allows attackers to add blocked attributes to their string.What is the new behavior?
onload=
is detected anywhere in the untrusted string.javascript:
.attributes
is not of typeNamedNodeMap
which is what a non-clobberedElement.attributes
should be: https://developer.mozilla.org/en-US/docs/Web/API/NamedNodeMapNote: Long term we should move away from this custom sanitizer. This custom sanitizer was made in response to an older XSS vulnerability to mitigate that issue while avoiding breaking custom HTML functionality. A couple options:
Does this introduce a breaking change?
Other information