Skip to content

Conversation

j-mie
Copy link

@j-mie j-mie commented Sep 13, 2016

By default this library uses the including preview page, which doesn't make use of the markdown_safe function. I changed the page to use markdown_safe so that this page wouldn't allow XSS by default.

By default this library uses the including preview page, which doesn't make use of the markdown_safe function. I changed the page to use markdown_safe so that this page wouldn't allow XSS by default.
@j-mie
Copy link
Author

j-mie commented Sep 13, 2016

I submitted this upstream but I'm presuming it will go unmerged just like the rest of the PRs. klen/django_markdown#74

@coveralls
Copy link

Coverage Status

Coverage increased (+0.8%) to 64.831% when pulling 3fdfb1d on JamieH:patch-1 into 58e4b4e on sv0:master.

@sv0
Copy link
Owner

sv0 commented Sep 14, 2016

XSS is injecting client-side scripts into web pages viewed by other users.

Mentioned preview is viewed only by the user who edits some markdown content, but not by other users.

@j-mie
Copy link
Author

j-mie commented Oct 4, 2016

There is no CSRF, You should merge this request to stop potential XSS via a rogue form on another site.

@sv0 sv0 closed this Oct 17, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants