fix: sanitize potentially dangerous values in order template... #1551
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
…and wishlist titles
PR Type
[x] Bugfix
[ ] Feature
[ ] Code style update (formatting, local variables)
[ ] Refactoring (no functional changes, no API changes)
[ ] Build-related changes
[ ] CI-related changes
[ ] Documentation content changes
[ ] Application / infrastructure changes
[ ] Other:
What Is the Current Behavior?
It is not possible to add a malicious script (XXS) to the order template/wishlist title.
But if there is a XSS in the order template or wishlist title it is executed after the user adds a product to this order template/wishlist.
Issue Number: Closes #
What Is the New Behavior?
After fetching the order templates/wishlists from the server any malicious script will be removed from the title field. This scrips is not executed any more.
Does this PR Introduce a Breaking Change?
[ ] Yes
[x] No
Other Information
AB#92013