-
Notifications
You must be signed in to change notification settings - Fork 8.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(editor): Fixing XSS vulnerability in toast messages #10329
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
MiloradFilipovic
changed the title
Sec 78 stored xss in toast
fix(editor): Fixing XSS vulnerability in toast messages
Aug 8, 2024
n8n-assistant
bot
added
n8n team
Authored by the n8n team
ui
Enhancement in /editor-ui or /design-system
labels
Aug 8, 2024
netroy
reviewed
Aug 8, 2024
netroy
approved these changes
Aug 8, 2024
Test summaryRun details
This comment has been generated by cypress-bot as a result of this project's GitHub integration settings. You can manage this integration in this project's settings in the Cypress Cloud |
✅ All Cypress E2E specs passed |
MiloradFilipovic
added a commit
that referenced
this pull request
Aug 9, 2024
* master: fix(core): Prevent XSS via static cache dir (#10339) fix(editor): Enable credential sharing between all types of projects (#10233) refactor(core): Extract webhook request handler to own file (#10301) feat: Allow sharing to and from team projects (no-changelog) (#10144) refactor(editor): Convert ChangePasswordModal to composition api (no-changelog) (#10337) docs: Change display name for WhatsApp Trigger API Credential (#10334) fix(core): Do not load ScalingService in regular mode (no-changelog) (#10333) docs: Update wording in X credentials (#10327) fix(editor): Fixing XSS vulnerability in toast messages (#10329) fix(core): Rate limit MFA activation and verification endpoints (#10330) refactor(core): Decouple emailing and workflow sharing from internal hooks (no-changelog) (#10326) refactor(core): Stop reporting disk I/O error to Sentry (no-changelog) (#10324)
Merged
Got released with |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
Preventing XSS attacks via parameter values that end up in error messages by:
href
sanitizationdangerouslyUseHTMLString = true
Related Linear tickets, Github issues, and Community forum posts
Fixes SEC-78
Review / Merge checklist
release/backport
(if the PR is an urgent fix that needs to be backported)