Merge pull request #2351 from mabashian/2301-xss

Rolls back changes to the xss filter.  Addresses escaped characters in cred tags.
This commit is contained in:
Michael Abashian 2018-06-28 15:04:56 -04:00 committed by GitHub
commit 1c194dbfbc
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 5 additions and 5 deletions

View File

@ -417,7 +417,7 @@ function buildCredentialDetails (credential) {
const icon = `${credential.kind}`;
const link = `/#/credentials/${credential.id}`;
const tooltip = strings.get('tooltips.CREDENTIAL');
const value = $filter('sanitize')(credential.name);
const value = credential.name;
return { icon, link, tooltip, value };
}

View File

@ -170,10 +170,10 @@ function ListTemplatesController(
const icon = `${credential.kind}`;
const link = `/#/credentials/${credential.id}`;
const tooltip = strings.get('tooltips.VIEW_THE_CREDENTIAL');
const value = $filter('sanitize')(credential.name);
const value = credential.name;
return { icon, link, tooltip, value };
})
});
};
vm.getLastRan = template => {

View File

@ -6,7 +6,7 @@
export default [function() {
return function(input) {
input = $("<span>").text(input)[0].textContent;
input = $("<span>").text(input)[0].innerHTML;
return input;
};
}];

View File

@ -12,6 +12,6 @@ describe('Filter: sanitize', () => {
});
it('should sanitize xss-vulnerable strings', function(){
expect(filter("<div>foobar</div>")).toBe("<div>foobar</div>");
expect(filter("<div>foobar</div>")).toBe("&lt;div&gt;foobar&lt;/div&gt;");
});
});