-
Notifications
You must be signed in to change notification settings - Fork 452
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Resolve template injection with context name #9650
Comments
@jardakotesovec, could you review the PRs? I've tested them here. Thanks! |
3.3 |
@asmecher Tests are passing - for 3.3.0 most of the runs are passing, which I think we consider as pass :-). So feel free to merge these. |
Sorry for the headache, @jardakotesovec, but could you reformat the |
@asmecher should be better now.. |
Thanks! There was an accidental submodule update, but I removed it. I'll file a new issue for |
Ops, not sure how that happened. Sorry about that. |
Describe the bug
The context name (e.g. journal name in OJS or site name) is susceptible to Vue template injection (e.g.
{{ 4*5 }}
will present as20
rather than as a literal string.After some review, the impact of this issue is fortunately low -- the affected fields are for privileged users, who already (intentionally) have tools to e.g. enter arbitrary Javascript in certain fields. Injectability requires:
We were not able to identify other cases meeting these requirements.
What application are you using?
OJS, OMP or OPS version 3.4.0
Reported by Daniel Barros.
The text was updated successfully, but these errors were encountered: