Merge branch 'security-xss-in-markdown-following-unrecognized-html-element' into 'master'
[master] XSS in markdown following unrecognized HTML element Closes #2732 See merge request gitlab/gitlabhq!2599
This commit is contained in:
parent
c4bb0a116e
commit
b5b475c273
5 changed files with 25 additions and 2 deletions
|
@ -15,7 +15,7 @@ module CacheMarkdownField
|
|||
# Increment this number every time the renderer changes its output
|
||||
CACHE_REDCARPET_VERSION = 3
|
||||
CACHE_COMMONMARK_VERSION_START = 10
|
||||
CACHE_COMMONMARK_VERSION = 11
|
||||
CACHE_COMMONMARK_VERSION = 12
|
||||
|
||||
# changes to these attributes cause the cache to be invalidates
|
||||
INVALIDATED_BY = %w[author project].freeze
|
||||
|
|
|
@ -0,0 +1,5 @@
|
|||
---
|
||||
title: Fix possible XSS attack in Markdown urls with spaces
|
||||
merge_request: 2599
|
||||
author:
|
||||
type: security
|
|
@ -17,6 +17,9 @@ module Banzai
|
|||
# This is a small extension to the CommonMark spec. If they start allowing
|
||||
# spaces in urls, we could then remove this filter.
|
||||
#
|
||||
# Note: Filter::SanitizationFilter should always be run sometime after this filter
|
||||
# to prevent XSS attacks
|
||||
#
|
||||
class SpacedLinkFilter < HTML::Pipeline::Filter
|
||||
include ActionView::Helpers::TagHelper
|
||||
|
||||
|
|
|
@ -12,13 +12,16 @@ module Banzai
|
|||
def self.filters
|
||||
@filters ||= FilterArray[
|
||||
Filter::PlantumlFilter,
|
||||
|
||||
# Must always be before the SanitizationFilter to prevent XSS attacks
|
||||
Filter::SpacedLinkFilter,
|
||||
|
||||
Filter::SanitizationFilter,
|
||||
Filter::SyntaxHighlightFilter,
|
||||
|
||||
Filter::MathFilter,
|
||||
Filter::ColorFilter,
|
||||
Filter::MermaidFilter,
|
||||
Filter::SpacedLinkFilter,
|
||||
Filter::VideoLinkFilter,
|
||||
Filter::ImageLazyLoadFilter,
|
||||
Filter::ImageLinkFilter,
|
||||
|
|
|
@ -104,5 +104,17 @@ describe Banzai::Pipeline::GfmPipeline do
|
|||
|
||||
expect(output).to include("src=\"test%20image.png\"")
|
||||
end
|
||||
|
||||
it 'sanitizes the fixed link' do
|
||||
markdown_xss = "[xss](javascript: alert%28document.domain%29)"
|
||||
output = described_class.to_html(markdown_xss, project: project)
|
||||
|
||||
expect(output).not_to include("javascript")
|
||||
|
||||
markdown_xss = "<invalidtag>\n[xss](javascript:alert%28document.domain%29)"
|
||||
output = described_class.to_html(markdown_xss, project: project)
|
||||
|
||||
expect(output).not_to include("javascript")
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in a new issue