-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
XSS vulnerability on <abbr> and <sup>. #715
Comments
sup |
👋 Hey! We've recently opened a bug bounty against this issue, so if you want to get rewarded 💰 for fixing this vulnerability 🕷, head over to https://huntr.dev! |
Hello while bug bounting this issue, I noticed the filter is implemented, you should use
while starting editor, this should be preferred method, that way it protects against code injection in all elements, like divs, img, ...., not just abbr & sup XSS can also be achived with many more elements:
sent PR updating README to make it clear |
Disable script and on events by default to avoid XSS. User can enable by setting allowScript|allowOn Readme updated
I think this can be closed |
After looking deeper I realized filter is inefective for self clossing tags, will look into it |
Should work properly now |
fixes #pandao#612 fixes #pandao#662 fixes #pandao#697 fixes #pandao#700 fixes #pandao#701 fixes #pandao#709 fixes #pandao#715 fixes #pandao#764 fixes #pandao#816 ### Probably: fixes #pandao#307 fixes #pandao#560
fixes #pandao#612 fixes #pandao#662 fixes #pandao#697 fixes #pandao#700 fixes #pandao#701 fixes #pandao#709 fixes #pandao#715 fixes #pandao#764 fixes #pandao#816 fixes #pandao#307 fixes #pandao#560
Summary
Because there are no attribute filters in the
abbr
andsup
tags, an attacker can trigger XSS on websites which is using editor.md.CVE
CVE-2019-14653
Payloads
This will execute JavaScript when you move the mouse on any part of the page.
Images
The text was updated successfully, but these errors were encountered: