-
Notifications
You must be signed in to change notification settings - Fork 47.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Symbol Tagging for dangerouslySetInnerHTML to Help Prevent XSS #10506
Comments
I am running react18 and recently installed and ran AuditJS scan against the project. In the scan react version 18.1.0 was flagged for Cross-Site Scripting (XSS) and this issue was a referenced link...
I was wondering if any work is being done to resolve this issue? |
I received the same vulnerability notice as above for [email protected] [sonatype-2017-0717] CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Description The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to What's up with this? Advice on how to resolve? |
It seems like this Sonatype CWE sonatype-2017-0717 could be considered as not important. Just to check, do people using React that gets flagged with this CWE, typically add this as waiver? |
following upon on this .. |
If you're spreading props from a user provided source we have a XSS. E.g.
That's already true today because this URL is now an XSS hole:
This is very uncommon. There are many different ways to screw up getting user data. However doing that + also spreading is unusual. We decided in #3473 that React should add an extra layer of protection for these types of mistakes. This one is much more uncommon than the one in #3473 though.
You should already have a pretty centralized way of sanitizing these objects so it seems to me that adding a Symbol to this object shouldn't be that big of a deal though.
Either:
or:
The text was updated successfully, but these errors were encountered: