Details
-
Bug
-
Resolution: Fixed
-
Blocker
-
Rendering in the platform, 3.1 M1
-
Unit
-
High
-
Hard
-
N/A
-
N/A
-
Pull Request accepted
-
Description
To reproduce, just type the following in any document :
[[Click!>>path:javascript:alert('XSS')]].
Attachments
Issue Links
- depends on
-
XCOMMONS-1680 Filter Html attributes in restricted mode based on a whitelist
- Closed
- is duplicated by
-
XWIKI-19141 stored XSS on XWiki
- Closed
-
XWIKI-19602 Vulnerability in the XWiki
- Closed
-
XWIKI-8593 XSS in images and links using on* parameter.
- Closed
-
XWIKI-4740 Parser should filter (% style="background:url('javascript:badscript') %) because some browsers will execute such script.
- Closed
- relates to
-
XWIKI-19514 XSS using a JSX object
- Closed
-
XWIKI-18049 Improve the html escaping mechanism for XSS protection
- Closed
- links to