You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@sling.apache.org by "Radu Cotescu (JIRA)" <ji...@apache.org> on 2017/01/09 17:40:58 UTC

[jira] [Assigned] (SLING-6438) Add encodeForHTMLAttrName() to XSSAPI

     [ https://issues.apache.org/jira/browse/SLING-6438?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Radu Cotescu reassigned SLING-6438:
-----------------------------------

    Assignee: Radu Cotescu

> Add encodeForHTMLAttrName() to XSSAPI
> -------------------------------------
>
>                 Key: SLING-6438
>                 URL: https://issues.apache.org/jira/browse/SLING-6438
>             Project: Sling
>          Issue Type: Improvement
>          Components: XSS Protection API
>    Affects Versions: XSS Protection API 1.0.16
>            Reporter: Lars Krapf
>            Assignee: Radu Cotescu
>
> The XSSAPI currently does not provide a method to safely encode HTML attribute names. This could cause problems if for example attackers were allowed to define arbitrary "data-" attributes. I don't think Encoder already provides a context for that, but {{forHtmlUnquotedAttribute}} might just do the trick.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)