Escape HTML while parsing Markdown documents to remove XSS vulnerabilities #4

Merged
nicole merged 1 commits from fix-xss-vulnerability into main 2024-06-03 18:15:53 +00:00
Owner

Here, I opted to use the Markdown parser's detection of HTML so that we don't add another library. This does limit users somewhat, because it means that no inline HTML is allowed, but I think this is acceptable: this is a platform for project management, not general-purpose publishing, so inline HTML is probably not necessary. There is a clear upgrade path in the future to add sanitizing instead of escaping tags, if we want.

This approach also gives us a clear place to plug in detection of extra things, like custom @ tags or other features.

Here, I opted to use the Markdown parser's detection of HTML so that we don't add another library. This does limit users somewhat, because it means that *no* inline HTML is allowed, but I think this is acceptable: this is a platform for project management, not general-purpose publishing, so inline HTML is probably not necessary. There is a clear upgrade path in the future to add sanitizing instead of escaping tags, if we want. This approach also gives us a clear place to plug in detection of extra things, like custom `@` tags or other features.
nicole added 1 commit 2024-06-03 18:15:47 +00:00
nicole merged commit 0611aac45f into main 2024-06-03 18:15:53 +00:00
nicole deleted branch fix-xss-vulnerability 2024-06-03 18:15:53 +00:00
Sign in to join this conversation.
No reviewers
No Label
No Milestone
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: nicole/pique#4
No description provided.