From ba5808a6e3ccd9e0f56d5ba513e6b001901cbb00 Mon Sep 17 00:00:00 2001 From: Rene Rehme Date: Wed, 2 Aug 2023 19:25:04 +0200 Subject: [PATCH] [FIX] Improved security for import output to protect against XSS In this commit, I've addressed a security concern related to the redirect import feature. Specifically, I've taken measures to eliminate a reflected cross-site scripting (XSS) vulnerability in the "import protocol" output. In simple terms, I've added String.htmlSpecialChrars() to ensure that any user-generated data is now thoroughly encoded. This significantly minimizes the risk of malicious scripts being executed through the output. If you have any questions about this commit or want more information about the changes, feel free to reach out to me. Your feedback and suggestions are always appreciated! --- .../Private/FusionModule/Components/ImportProtocol.fusion | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/Resources/Private/FusionModule/Components/ImportProtocol.fusion b/Resources/Private/FusionModule/Components/ImportProtocol.fusion index d961615..403256e 100644 --- a/Resources/Private/FusionModule/Components/ImportProtocol.fusion +++ b/Resources/Private/FusionModule/Components/ImportProtocol.fusion @@ -20,9 +20,9 @@ prototype(Neos.RedirectHandler.Ui:Component.ImportProtocol) < prototype(Neos.Fus - {entry.message} + {String.htmlSpecialChars(entry.message)} - {entry.redirect.host}/{entry.redirect.sourceUriPath} → {entry.redirect.targetUriPath} ({entry.redirect.statusCode}) + {String.htmlSpecialChars(entry.redirect.host)}/{String.htmlSpecialChars(entry.redirect.sourceUriPath)} → {String.htmlSpecialChars(entry.redirect.targetUriPath)} ({String.htmlSpecialChars(entry.redirect.statusCode)}) @@ -37,7 +37,7 @@ prototype(Neos.RedirectHandler.Ui:Component.ImportProtocol) < prototype(Neos.Fus - {String.crop(entry.redirect.comment, 25, '…') || '–'} + {String.crop(String.htmlSpecialChars(entry.redirect.comment), 25, '…') || '–'}