Details
-
Bug
-
Resolution: Duplicate
-
Major
-
None
-
None
-
None
-
None
Description
Both the native syntaxes for images and links enable for arbitrary javascript to be injected on the page:
[[image:Click me!||onerror="javascript:alert('XSS')" onclick="javascript:alert('XSS')"]]
[[Label >> https://jira.xwiki.org||onerror="javascript:alert('XSS')" onclick="javascript:alert('XSS')"]]
How can we best sanitize page contents to avoid XSS exploits?
Can we guarantee backwards compatibility with macros and extensions that rely on javascript being injected on the page?
Attachments
Issue Links
- duplicates
-
XWIKI-8593 XSS in images and links using on* parameter.
- Closed