-
Notifications
You must be signed in to change notification settings - Fork 75
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
names of some users are stored with HTML entities #729
Milestone
Comments
Also updating user creation and org create and update to ensure that no HTML entities for names are added to the database or included in the http response |
slubar
added a commit
that referenced
this issue
Dec 7, 2022
jdaigneau5
added a commit
that referenced
this issue
Dec 9, 2022
#729 decode HTML entities in names prior to storing in the database and sending http response
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Using the PUT /org/{shortname}/user/{username} endpoint with a query string of
results in a response containing
because of escape() in
cve-services/src/controller/org.controller/index.js
Line 708 in b083cfe
It's unclear why the HTML entity is used for the quote character in O'Reilly. There is no documentation stating that some parts of API responses are supposed to be interpreted as HTML.
If a client application receives a list of users and their names, it should probably be the client's responsibility to encode the data in a way that is valid and safe for the specific context. The server doesn't comprehensively ensure safe content for all possible client contexts, e.g., the CVE Services code does not prevent use of
in the name.last field, and does not modify that string in any way. Having the server send HTML entities to the client makes it harder for the client to do input validation, e.g., the client would need to know the places in which double encoding must be avoided.
The text was updated successfully, but these errors were encountered: