Test instructions missing Updates Requested NPM Resource Changed PR-5.2-dev Pending

User tests: Successful: Unsuccessful:

avatar Shivam7-1
Shivam7-1
8 Nov 2024

Summary of Changes

In This PR Joomla.sanitizeHtml to sanitize all HTML content rendered within the application. This change improves security by preventing XSS (Cross-Site Scripting) vulnerabilities and ensures that user-generated or external HTML is safe. All relevant components have been updated for consistent sanitization, enhancing overall application integrity.

Link to documentations

Please select:

  • Documentation link for docs.joomla.org:

  • No documentation changes for docs.joomla.org needed

  • Pull Request link for manual.joomla.org:

  • No documentation changes for manual.joomla.org needed

avatar Shivam7-1 Shivam7-1 - open - 8 Nov 2024
avatar Shivam7-1 Shivam7-1 - change - 8 Nov 2024
Status New Pending
avatar joomla-cms-bot joomla-cms-bot - change - 8 Nov 2024
Category JavaScript Repository NPM Change
avatar Shivam7-1 Shivam7-1 - change - 8 Nov 2024
The description was changed
avatar Shivam7-1 Shivam7-1 - edited - 8 Nov 2024
avatar Shivam7-1 Shivam7-1 - change - 8 Nov 2024
The description was changed
avatar Shivam7-1 Shivam7-1 - edited - 8 Nov 2024
avatar Shivam7-1 Shivam7-1 - change - 11 Nov 2024
Labels Added: Test instructions missing Updates Requested NPM Resource Changed PR-5.2-dev
avatar Shivam7-1
Shivam7-1 - comment - 11 Nov 2024

Hii Reviewers
Thank You so Much For Reviewing 😃

I understand the concern about using Joomla.sanitizeHtml() without proper configuration. The intent was to sanitize potentially unsafe HTML, but I agree that it could break things when not properly configured for specific elements and their attributes. As a result, I will update the code to use textContent, which will ensure that any HTML is rendered as plain text, avoiding the potential for broken content or issues with element attributes.

I don’t have a specific test case to demonstrate an exploit, but I can explain how the issue could be tested. The potential vulnerability lies in cases where user-provided content—such as input from forms or comments—could be injected into the page and rendered without proper sanitization.

I will proceed with the change to textContent to eliminate this risk

Add a Comment

Login with GitHub to post a comment