Skip to content
Extraits de code Groupes Projets
Valider b8128d35 rédigé par Jonne Haß's avatar Jonne Haß
Parcourir les fichiers

Merge branch 'hotfix/0.0.2.4' into develop

Conflicts:
	Changelog.md
	app/views/people/show.html.haml
	config/defaults.yml
	spec/helpers/layout_helper_spec.rb
parents 1b3664a1 7134513b
Branches
Étiquettes
Aucune requête de fusion associée trouvée
......@@ -92,6 +92,9 @@
* ffi 1.1.5 -> 1.3.1
* configurate 0.0.1 -> 0.0.2
# 0.0.2.4
* Fix XSS vulnerabilities caused by not escaping a users name fields when loading it from JSON. [#3948](https://github.com/diaspora/diaspora/issues/3948)
# 0.0.2.3
......
......@@ -36,11 +36,12 @@
};
this.formatResult = function(row) {
return row.name;
return Handlebars.Utils.escapeExpression(row.name);
};
this.parse = function(data) {
var results = data.map(function(person){
person['name'] = Handlebars.Utils.escapeExpression(person['name']);
return {data : person, value : person['name']}
});
......
......@@ -43,7 +43,7 @@ module LayoutHelper
user = UserPresenter.new(current_user, a_ids).to_json
content_tag(:script) do
<<-JS.html_safe
window.current_user_attributes = #{user}
window.current_user_attributes = #{j user}
JS
end
end
......
......@@ -7,7 +7,7 @@
= javascript_include_tag :people
- if user_signed_in? && @person != current_user.person
:javascript
Mentions.options.prefillMention = Mentions._contactToMention(#{@person.to_json});
Mentions.options.prefillMention = Mentions._contactToMention(#{j @person.to_json});
- content_for :page_title do
= @person.name
......
# From http://jfire.io/blog/2012/04/30/how-to-securely-bootstrap-json-in-a-rails-view/
# Review on Rails 4 update, might be built in by then!
class ActionView::Base
def json_escape(s)
result = s.to_s.gsub('/', '\/')
s.html_safe? ? result.html_safe : result
end
alias j json_escape
end
......@@ -201,11 +201,10 @@ describe PeopleController do
it 'does not allow xss attacks' do
user2 = bob
profile = user2.profile
profile.first_name = "<script> alert('xss attack');</script>"
profile.save
profile.update_attribute(:first_name, "</script><script> alert('xss attack');</script>")
get :show, :id => user2.person.to_param
response.should be_success
response.body.match(profile.first_name).should be_false
response.body.should_not include(profile.first_name)
end
......
......@@ -5,6 +5,18 @@
require 'spec_helper'
describe LayoutHelper do
describe "#set_current_user_in_javascript" do
it "doesn't allow xss" do
user = FactoryGirl.create :user
profile = user.profile
profile.update_attribute(:first_name, "</script><script>alert(0);</script>");
stub!(:user_signed_in?).and_return true
stub!(:current_user).and_return user
set_current_user_in_javascript.should_not be_empty
set_current_user_in_javascript.should_not include(profile.first_name)
end
end
describe "#page_title" do
context "passed blank text" do
it "returns Diaspora*" do
......
describe("Diaspora.Widgets.Search", function() {
describe("parse", function() {
it("escapes a persons name", function() {
$("#jasmine_content").html('<form action="#" id="searchForm"></form>');
var search = Diaspora.BaseWidget.instantiate("Search", $("#jasmine_content > #searchForm"));
var person = {"name": "</script><script>alert('xss');</script"};
result = search.parse([$.extend({}, person)]);
expect(result[0].data.name).toNotEqual(person.name);
});
});
});
0% Chargement en cours ou .
You are about to add 0 people to the discussion. Proceed with caution.
Veuillez vous inscrire ou vous pour commenter