Skip to content

Protect against injecting javascript:URI into edited href tags #934

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
May 5, 2023

Conversation

planetmilesm
Copy link
Contributor

@planetmilesm planetmilesm commented Apr 20, 2023

Eliminates the chance that someone could make an evil custom theme. Potentially someone could add a javascript:URI into the edited href tags, which could allow them to craft a malicious custom theme which links to a fake planet website.

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Eliminates the chance that someone could make an evil custom theme.
Copy link
Contributor

@JuLeeAtPlanet JuLeeAtPlanet left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hiya, @planetmilesm ! Thanks so much for catching this. I was able to avoid a 404 by prepending a dot before your fix. Feel free to accept changes. Otherwise, DM me to discuss?

      <a href="./{{ 'get-started/quick-start-guide' | url }}" title="Get Started" class="md-button md-button--primary md-button--teriary">
        Get started
      </a>
      <a href="./{{ 'get-started/get-your-planet-account' | url }}" title="Get your Planet account" class="md-button md-button--secondary">
        Get a Planet account
      </a>

planetmilesm and others added 2 commits May 4, 2023 10:48

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Co-authored-by: JuLee Burdekin <91982271+JuLeeAtPlanet@users.noreply.github.com>

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Co-authored-by: JuLee Burdekin <91982271+JuLeeAtPlanet@users.noreply.github.com>
@jreiberkyle jreiberkyle changed the title Security peace-of-mind Protect against injecting javascript:URI into edited href tags May 5, 2023
@jreiberkyle jreiberkyle merged commit f7244d2 into main May 5, 2023
@jreiberkyle jreiberkyle deleted the planetmilesm-patch-XSS branch May 5, 2023 21:01
@jreiberkyle jreiberkyle mentioned this pull request May 11, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants