You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When allowlisting the default-blocked form and button tags and the default-blocked formaction attribute, it's possible to inject scripting into the rendered HTML.
We do not consider this to be a vulnerability, since:
the application developer must explicitly change the sanitizer configuration to:
allow multiple blocked tags (form and button)
allow a blocked attribute (formaction)
it's not likely to be a common configuration
That said, if the developer has indeed taken advantage of the sharp knife that the API provides and explicitly allowed the form and button tags and the formaction attribute, it would be a good feature to scrub that attribute like we scrub other URL attributes.
Note: this sanitization feature will likely be implemented in Loofah.
Originally reported by reported by @maitaii at https://hackerone.com/reports/3008446
When allowlisting the default-blocked
form
andbutton
tags and the default-blockedformaction
attribute, it's possible to inject scripting into the rendered HTML.We do not consider this to be a vulnerability, since:
form
andbutton
)formaction
)That said, if the developer has indeed taken advantage of the sharp knife that the API provides and explicitly allowed the
form
andbutton
tags and theformaction
attribute, it would be a good feature to scrub that attribute like we scrub other URL attributes.Note: this sanitization feature will likely be implemented in Loofah.
References:
The text was updated successfully, but these errors were encountered: