提交 19969b4f 编写于 作者: W Wataru 提交者: Felipe Martins

Fixing Vulnerability A Fortify Scan finds a critical Cross-Site Scrip… (#2451)

* Fixing Vulnerability A Fortify Scan finds a critical Cross-Site Scripting

* use var insted of const
上级 4f189ec8
'use strict';
var utils = require('./../utils');
var isValidXss = require('./isValidXss');
module.exports = (
utils.isStandardBrowserEnv() ?
......@@ -27,6 +28,8 @@ module.exports = (
href = urlParsingNode.href;
}
isValidXss(url);
urlParsingNode.setAttribute('href', href);
// urlParsingNode provides the UrlUtils interface - http://url.spec.whatwg.org/#urlutils
......
'use strict';
module.exports = function isValidXss(requestURL) {
var regex = RegExp('<script+.*>+.*<\/script>');
return regex.test(requestURL);
};
......@@ -8,4 +8,8 @@ describe('helpers::isURLSameOrigin', function () {
it('should detect different origin', function () {
expect(isURLSameOrigin('https://github.com/axios/axios')).toEqual(false);
});
it('should detect xss', function () {
expect(isURLSameOrigin('https://github.com/axios/axios?<script>alert("hello")</script>')).toEqual(false)
})
});
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册