Details
-
Bug
-
Resolution: Invalid
-
Critical
-
None
-
12.6.4, 11.10.11, 12.9
-
Unknown
-
N/A
-
N/A
-
Description
Currently we always escape the xproperties to protect against XSS.
A proposed solution to allow some users to define html content in a safe way is the following:
require/check script right for anything that produces JavaScript code:
- JSX (with "on this page")
- HTML macro (the attributes and tags that can contain JavaScript should be filtered out at rendering time if the content author doesn't have script right)
- wiki syntax parameters (% onclick="..." %)
- etc.
See the discussion https://matrix.to/#/!fSfTnnfYXenblSmDEe:matrix.xwiki.com/$uyLOqwtVEUspUoNHdM0tPmCk0y6DHZZqMCQ6UTCONKE?via=matrix.xwiki.com&via=matrix.org
Attachments
Issue Links
- blocks
-
XWIKI-9118 XSS in restricted context via html macro
- Closed
- is related to
-
XRENDERING-663 XSS Javascript injection via XWiki 2.x syntax
- Closed
-
XWIKI-19514 XSS using a JSX object
- Closed
-
XWIKI-17374 XSS Cross Site Scripting
- Closed
- relates to
-
XWIKI-18568 Multiple instances of stored cross-site scripting (XSS) via editor and HTML macro
- Closed