fix: mitigate "sequential @import chaining" vulnerability (#5616)
* `test/e2e-cypress/tests/features/xss/` -> `test/e2e-cypress/tests/security` * add tests * filter <style> tags out of Markdown fields * initialize OAuth inputs without applying `value` attribute
This commit is contained in:
@@ -0,0 +1,7 @@
|
||||
* {
|
||||
color: red !important; /* for humans */
|
||||
}
|
||||
|
||||
h4 {
|
||||
display: none; /* for machines, used to trace whether this sheet is applied */
|
||||
}
|
||||
@@ -0,0 +1,10 @@
|
||||
openapi: "3.0.0"
|
||||
|
||||
info:
|
||||
title: Sequential Import Chaining
|
||||
description: >
|
||||
<h4>This h4 would be hidden by the injected CSS</h4>
|
||||
|
||||
This document tests the ability of a `<style>` tag in a Markdown field to pull in a remote stylesheet using an `@import` directive.
|
||||
|
||||
<style>@import url(/documents/security/sequential-import-chaining/injection.css);</style>
|
||||
@@ -0,0 +1,10 @@
|
||||
swagger: "2.0"
|
||||
|
||||
info:
|
||||
title: Sequential Import Chaining
|
||||
description: >
|
||||
<h4>This h4 would be hidden by the injected CSS</h4>
|
||||
|
||||
This document tests the ability of a `<style>` tag in a Markdown field to pull in a remote stylesheet using an `@import` directive.
|
||||
|
||||
<style>@import url(/documents/security/sequential-import-chaining/injection.css);</style>
|
||||
Reference in New Issue
Block a user