Skip to content

Conversation

planetmilesm
Copy link
Contributor

@planetmilesm planetmilesm commented Apr 20, 2023

Eliminates the chance that someone could make an evil custom theme. Potentially someone could add a javascript:URI into the edited href tags, which could allow them to craft a malicious custom theme which links to a fake planet website.

Eliminates the chance that someone could make an evil custom theme.
Copy link
Contributor

@JuLeeAtPlanet JuLeeAtPlanet left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hiya, @planetmilesm ! Thanks so much for catching this. I was able to avoid a 404 by prepending a dot before your fix. Feel free to accept changes. Otherwise, DM me to discuss?

      <a href="./{{ 'get-started/quick-start-guide' | url }}" title="Get Started" class="md-button md-button--primary md-button--teriary">
        Get started
      </a>
      <a href="./{{ 'get-started/get-your-planet-account' | url }}" title="Get your Planet account" class="md-button md-button--secondary">
        Get a Planet account
      </a>

planetmilesm and others added 2 commits May 4, 2023 10:48
Co-authored-by: JuLee Burdekin <91982271+JuLeeAtPlanet@users.noreply.github.com>
Co-authored-by: JuLee Burdekin <91982271+JuLeeAtPlanet@users.noreply.github.com>
@jreiberkyle jreiberkyle changed the title Security peace-of-mind Protect against injecting javascript:URI into edited href tags May 5, 2023
@jreiberkyle jreiberkyle merged commit f7244d2 into main May 5, 2023
@jreiberkyle jreiberkyle deleted the planetmilesm-patch-XSS branch May 5, 2023 21:01
@jreiberkyle jreiberkyle mentioned this pull request May 11, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants