Make Markdown safe #21
Labels
No Label
ANA
BUG
CSS
DOC
DX
ECO
FET
GFX
PRO
SEC
TPL
UX
VIS
analysis
analysis.data
analysis.editor
analysis.util
analysis.visualization
auth
cli
core
doc
form
mailing
md
rendering
storage
svg
svg.color
svg.palettes
testing
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: phryk-evil-mad-sciences-llc/poobrains#21
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Currently any
md.MarkdownField
is an open invitation for XSS.This should be fixed, even though none of those are exposed to
users who aren't logged in and have permission to add/edit
Storable
s withMarkdownField
s.Far as we know,
md.MarkdownString
is the only way markdown is currently used.This means this is a central place where we can do cleanup of the input string.
markupsafe.Markup
offers some nice functions likeescape
andstrip_tags
for this. We might want to have a whitelist of allowed tags.