You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this case, when a user clicks the preview button, the malicious script alert(1) will be executed. Note that the specified format: "data-url" does not successfully sanitize the value.
Suggested Fix or Mitigation:
The root cause is due to:
where a malicious dataURL may be passed to the <a />, causing an XSS attack.
It is best practice for a package to ensure security. Even though the dataURL has been validated elsewhere, there's still a risk of malicious dataURL being passed to <a /> as shown in the example. Please consider patching this issue by validating the dataURL to prevent the XSS attack. Thanks!
The text was updated successfully, but these errors were encountered:
Hi, I've found a Cross-Site Scripting (XSS) vulnerability in
@rjsf/core
Vulnerability Details:
Steps to Reproduce:
In this case, when a user clicks the preview button, the malicious script
alert(1)
will be executed. Note that the specifiedformat: "data-url"
does not successfully sanitize the value.Suggested Fix or Mitigation:
The root cause is due to:
react-jsonschema-form/packages/core/src/components/widgets/FileWidget.tsx
Line 79 in f31bef1
where a malicious dataURL may be passed to the
<a />
, causing an XSS attack.It is best practice for a package to ensure security. Even though the dataURL has been validated elsewhere, there's still a risk of malicious dataURL being passed to
<a />
as shown in the example. Please consider patching this issue by validating the dataURL to prevent the XSS attack. Thanks!The text was updated successfully, but these errors were encountered: