-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replace '<' and '>' for swarm 'host' field. Fix for XSS attack. #1603
Conversation
Codecov Report
@@ Coverage Diff @@
## master #1603 +/- ##
==========================================
- Coverage 82.41% 82.30% -0.12%
==========================================
Files 28 28
Lines 2565 2565
Branches 390 390
==========================================
- Hits 2114 2111 -3
- Misses 355 358 +3
Partials 96 96
Continue to review full report at Codecov.
|
Hmm... I think this might be the wrong place to escape this. Right now XSS is not really a major thing for us, as the web ui should never be exposed to external users (just spawning a test with 10000000 users could at least crash the machine it is running on, so that will always be a bad idea, and I'm sure there are other vulnerabilities as well) |
I think the place is correct. It would be very hard to ensure the security by attempting to replace at every point of use. The actual error found was from injecting a script and then viewing the exception log!
Maybe just replace I agree that most people will not expose Locust to the internet, which is also why I mentioned as not being very critical, regardless of that I still think it should be fixed (I personally will not be allowed to roll out the use of Locust in our organisation until a fix is in place). |
This was the only input validation bug found, after all there is a very limited number of input fields. |
html.escape() only escapes &, < and > anyways. If you change your fix to only do a string replace for < and > instead, then I'm fine with it. |
247e803
to
0d11817
Compare
Done |
Thx! |
Thank you for the quick response |
:( the black check failed I see, but it only says "would be refomattted". I did not see that because I had not raised the number of open files, so never got the black test. |
Shouldn't all the tests be run on the PRs? |
They would have been if I hadnt been so sloppy as to merge it before they had completed :) Fixed in master now. |
😃
…On Thu, 22 Oct 2020, 14:43 Lars Holmberg, ***@***.***> wrote:
They would have been if I hadnt been so sloppy as to merge it before they
had completed :)
Fixed in master now.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#1603 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAMCZSISARWV3JCTKEBGDSDSMASHNANCNFSM4S3BJE6A>
.
|
@cyberw I'm hoping for this to get released soon. The security team keeps asking for this to be deployed. |
I can do it next week |
Thank you |
No description provided.