User tests: Successful: Unsuccessful:
Pull Request for Issue #19464 .
As documented in the jQuery tracker (jquery/jquery#2432), jQuery 1.x has a potential security flaw connected to AJAX requests, the results returned are executed (!) as JS code by default.
As we can't upgrade to a newer jQuery version in 3.x for BC reasons, I ported the patch developed by the guys at TYPO3:
TYPO3/TYPO3.CMS@43b1d7a
Apply patch, browse pages with AJAX requests (i.e. the backend dashboard or the indexer of com_finder).
Features still work
If 3rd party developers rely on the current, dangerous behavior then this change will break their code! So this needs to be communicated upfront!
Status | New | ⇒ | Pending |
Category | ⇒ | JavaScript |
Labels |
Added:
?
|
I have tested this item
as far as i can tell no issues observed
I hate to see us editing external scripts.
Honestly I can't wait to watch jQuery joining the mootools in the tech graveyard...
Seems to work only with DEBUG on, that loads media/jui/js/jquery.js
with DEBUG off , that loads media/jui/js/jquery.min.js
i get
SyntaxError: expected expression, got '}'[Μάθετε περισσότερα] jquery.min.js:2:96463
I have tested this item
@brianteeman can you please retest? [first i wrote: "can you please rest ;-)]
I have tested this item
Status | Pending | ⇒ | Ready to Commit |
RTC
Status | Ready to Commit | ⇒ | Fixed in Code Base |
Closed_Date | 0000-00-00 00:00:00 | ⇒ | 2018-06-18 02:51:32 |
Closed_By | ⇒ | mbabker | |
Labels |
Added:
?
|
@brianteeman done!