Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixes XSS vulnerabilities #6831

Merged
merged 7 commits into from Mar 19, 2019
Merged

Fixes XSS vulnerabilities #6831

merged 7 commits into from Mar 19, 2019

Conversation

snipe
Copy link
Owner

@snipe snipe commented Mar 19, 2019

This fixes a few places where data was not being escaped in the API, and also handles what appears to be a bug in Select2 (that was first reported in 2016, but has not been addressed).

Because we use rich menus (images, etc) in our dropdowns, we use the HTML template feature of Select2. While the data we send to Select2 was properly escaped, a bug in Select2 takes that escaped data and parses the HTML in the DOM when the "selected" method fires.

This vulnerability in Select2 is likely reproducible in any implementation of Select2 where the application is using remote data loading via ajax and also using HTML templates to display the listbox data. We've mitigated it in our specific implementation, and have reached out to Select2 to see if there's been any progress on patching the Select2 library itself.

@snipe snipe merged commit dee92cf into master Mar 19, 2019
@snipe snipe deleted the fixes/xss branch May 28, 2019 20:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant