Commit a6e636f
aazad
Fix stored XSS in user profile description
strip_tags() allows <a> tags but does not remove HTML attributes,
allowing event handlers like onmouseover to pass through. The
description is rendered unescaped via {!! !!} in linkinfo.blade.php,
enabling stored XSS.
Add regex filters to strip all on* event handler attributes (both
quoted and unquoted values) from the sanitized description before
saving to the database.1 parent 2dfa544 commit a6e636f
1 file changed
Lines changed: 2 additions & 0 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
609 | 609 | | |
610 | 610 | | |
611 | 611 | | |
| 612 | + | |
| 613 | + | |
612 | 614 | | |
613 | 615 | | |
614 | 616 | | |
| |||
0 commit comments