You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
// TODO: This seems it should be factored outif(phet.chipper.queryParameters.stringTest==='xss'){for(varkeyinFrictionA11yStrings){FrictionA11yStrings[key].value+='<img src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NkYGD4DwABCQEBtxmN7wAAAABJRU5ErkJggg==" onload="window.location.href=atob(\'aHR0cHM6Ly93d3cueW91dHViZS5jb20vd2F0Y2g/dj1kUXc0dzlXZ1hjUQ==\')" />';}}
Over in phetsims/rosetta#193 we have a plan forward that involves deleting *A11yStrings.js files. I'm going to close this, see phetsims/chipper#795 for issue about deleting.
During phetsims/friction#64 I noticed the following code:
balloons-and-static-electricity/js/balloons-and-static-electricity/BASEA11yStrings.js
friction/js/friction/FrictionA11yStrings.js
john-travoltage/js/john-travoltage/JohnTravoltageA11yStrings.js
joist
molecules and light
ohms-law
resistance-in-a-wire
scenery-phet
This code should be factored out. It may be possible to use
window.phet.chipper.mapString
which already has the xss test base64 data.The text was updated successfully, but these errors were encountered: