close Warning: Can't synchronize with repository "(default)" (/project/cl-weblocks/svn does not appear to be a Subversion repository.). Look in the Trac log for more information.

Opened 17 years ago

Closed 17 years ago

#34 closed defect (fixed)

Escape HTML outputted by 'render-data' to prevent XSS attacks

Reported by: Slava Akhmechet Owned by: Slava Akhmechet
Priority: medium Milestone: 0.1
Component: weblocks Version: pre-0.1
Keywords: cross-site scripting SQL injection sanitize Cc:

Description

We should sanitize form input to prevent cross-site scripting and SQL injection. Sanitation should ideally be done in a centralized place (in particular, request-object-mapping).

Change History (3)

comment:1 Changed 17 years ago by Slava Akhmechet

Priority: highmedium

comment:2 Changed 17 years ago by Slava Akhmechet

Summary: Sanitize input to prevent cross-site scripting and SQL injectionEscape HTML outputted by 'render-data' to prevent XSS attacks

The goals of this ticket are too broad and ill defined. SQL injection is an unrelated issue and input sanitation depends on the type of data. For now we should change the goal to escaping HTML outputted by 'render-data' since all widgets [should] use it for rendering.

comment:3 Changed 17 years ago by Slava Akhmechet

Resolution: fixed
Status: newclosed

Fixed. 'render-data' now escapes all output.

Note: See TracTickets for help on using tickets.