Skip to content

Releases: textAngular/textAngular

v1.4.4

12 Sep 23:41
Compare
Choose a tag to compare

See changelog for more details.
Note: this is a hotfix and replaces the prior v1.4.4. Since this version, was published on npm --- that version on npm was unpublished and cannot be updated until we bump the version number for the next npm release -- sorry.

v1.4.3

30 Jul 18:09
Compare
Choose a tag to compare

Breaking Changes

If you were using a different sanitize provider instead of textAngular-sanitize we will now detect this and throw an error. To eliminate this error set taOptions.forceTextAngularSanitize: false

See changelog for more details.

v1.4.2

15 Jul 22:55
Compare
Choose a tag to compare

See changelog for more details.

v1.4.1

24 May 23:05
Compare
Choose a tag to compare

Breaking Changes

This changes the structure of the files - all production files are now in the dist folder, this makes where PR's should be done a little more clear.

If you were referencing the src/.js files they will need to be updated to dist/js.

See changelog for more details.

v1.4.0

23 May 15:48
Compare
Choose a tag to compare

Breaking Changes

The minimum required versions of AngularJS is 1.3 and Rangy is 1.3.

For Full notes see Changelog.

v1.3.11

15 Mar 23:41
Compare
Choose a tag to compare

See Changelog for details.

v1.3.10

15 Mar 22:30
Compare
Choose a tag to compare

See Changelog for details.

v1.3.8

13 Mar 05:01
Compare
Choose a tag to compare

See Changelog for details.

v1.3.7

13 Feb 03:32
Compare
Choose a tag to compare

See Changelog for details.

Security Patch - Update Strongly Recommended

This patch closes an XSS attack vector that could allow the someone to execute un-sanitized javascript on the page via the editor.

Vulnerability Detail:

There is a XSS vulnerability in the textAngular-sanitize.js code that allows onerror and onload events to be triggered for elements. Any events that would be executed during construction of the element are beinig executed these include onerror and onload.

Vulnerable Code:

<img src="http://bla" onerror=alert(1)>
<img src="https://www.google.com/images/srpr/logo11w.png" onload=alert(1)>

v1.3.6

05 Feb 20:17
Compare
Choose a tag to compare

See Changelog for details.