Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

rigorous html escaping #1836

Merged
merged 2 commits into from
Jun 24, 2021
Merged

rigorous html escaping #1836

merged 2 commits into from
Jun 24, 2021

Conversation

chappjc
Copy link
Member

@chappjc chappjc commented Jun 23, 2021

Both the insight and dcrdata http APIs need to be more cautious with their responses that might include html.
For the most part this involves using html.EscapeString with any string that might contain user input, such as an error message.

chappjc added 2 commits June 23, 2021 17:30
Commit 9a1c04d eliminated
the last bits of inline javascript so that CSP could be more strict, so
update the sample-nginx.conf to reflect this change.
Copy link
Member

@buck54321 buck54321 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@chappjc chappjc merged commit 62bf65a into decred:master Jun 24, 2021
@chappjc chappjc deleted the escape-addr branch June 24, 2021 14:36
@degeri
Copy link
Member

degeri commented Jun 24, 2021

Tested . LGTM

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants