fix: xss vulnerability in creating choice labels #968
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
This addresses a XSS vulnerability when creating labels for choices. For example, if we set the label property of a choice to the HTML string
<img src=x onerror=alert()>
like so:It will execute the JavaScript function defined in the
onerror
attribute since thesrc
does not exist. An attacker can exploit this.The issue was that when creating the choice / placeholder elements, it would set the
innerHTML
content of the element. Instead, since these are just string labels, we should be setting the content as a string using theinnerText
property.Screenshots (if appropriate)
Choices executing JavaScript functions (
alert()
) defined in a label string.Types of changes
Checklist