Skip to content

TODO project is vulnerable to XSS/HTML injection attacks #1405

@dmdhrumilmistry

Description

@dmdhrumilmistry

Checklist

  • I added a descriptive title
  • I searched for other issues and couldn't find a solution or duplication
  • I already searched in Google and didn't find any good information or help

What happened?

TODO example project is vulnerable to XSS/HTML injection attacks.

Payload Used:

<button onclick='javascript:confirm("vulnerable");document.location.href="https://dmdhrumilmistry.github.io"'>click me</button>

Result:

XSS output image

Issue: Since most of the devs will be learning pyscript referring the examples, they'll be making applications which will be vulnerable to XSS/HTML injection. We would appreciate if pyscript team can also use secure coding techniques while creating examples; this will help devs to build secure applications.

What browsers are you seeing the problem on? (if applicable)

No response

Console info

No response

Additional Context

creating a cheatsheet might help devs to avoid such common issues in their applications

Metadata

Metadata

Assignees

No one assigned

    Labels

    type: bugSomething isn't workingwaiting for releaseBugs and features already landed but not released yet

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions