From: Joey Hess Date: Mon, 12 Nov 2007 19:14:00 +0000 (-0500) Subject: security issues X-Git-Tag: 2.12~2 X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/commitdiff_plain/d9e9e474a8df4abf14ca2d0a4d673f9af8812e13 security issues --- diff --git a/doc/todo/__42__forward__42__ing_functionality_for_the_meta_plugin.mdwn b/doc/todo/__42__forward__42__ing_functionality_for_the_meta_plugin.mdwn index 30bcbd58f..5cd4def38 100644 --- a/doc/todo/__42__forward__42__ing_functionality_for_the_meta_plugin.mdwn +++ b/doc/todo/__42__forward__42__ing_functionality_for_the_meta_plugin.mdwn @@ -24,3 +24,12 @@ I can also submit a Git patch, if desired. --[[tschwinge]] + +> The html scrubber cannot scrub meta headers. So if you emit one +> containing user-supplied data, it's up to you to scrub it to avoid all +> possible XSS attacks. Two attacks I'd worry about are cyclic meta refresh +> loops, which some, but not all web browsers detect and break, and any way +> to insert javascript via the user-supplied parameters. (Ie, putting +> something in the delay value that closes the tag can probably insert +> javascript ATM; and are there ways to embed javascript in the url?) +> --[[Joey]]