enhanced-github
enhanced-github copied to clipboard
Resolve XSS vulnerability
Fixes #43, #96
Hey @zanothis , Thanks for your contribution.
Could you please explain the changes and how they solve the XSS vulnerability?
#43 & #96 were caused because the file names started with a "
which allows for constructing a filename like "><iframe src="...">.png
resulting in an iframe being injected into the page. By using encodeURIComponent, the filename is transformed into a safe string to be injected into the download attribute.
@softvar any news on this? Or has the vulnerability been fixed somewhere else?