XSS from sanitized text - <script>alert('XSS');</script>
See original GitHub issueIt’s been mentioned here already (with working example), but on an already closed issue: https://github.com/summernote/summernote/issues/1627#issuecomment-227417111 So I believe it is worth opening a new issue:
This (otherwise sanitized) code:
<textarea>
<script>alert('XSS');</script></p>
</textarea>
gets executed by summernote.
Issue Analytics
- State:
- Created 7 years ago
- Reactions:7
- Comments:6 (1 by maintainers)
Top Results From Across the Web
XSS: Beating HTML Sanitizing Filters - PortSwigger
XSS : Beating HTML Sanitizing Filters The most prevalent manifestation of data sanitization occurs when the application HTML-encodes certain key characters .
Read more >Cross Site Scripting Prevention - OWASP Cheat Sheet Series
This cheat sheet provides guidance to prevent XSS vulnerabilities. ... This is where Output Encoding and HTML Sanitization are critical.
Read more >How to sanitize third-party content with vanilla JS to prevent ...
How to sanitize third-party content with vanilla JS to prevent cross-site scripting (XSS) attacks. Third-party content (things like data from ...
Read more >Cross-site Scripting (XSS) in sanitize | CVE-2020-4054 | Snyk
A cross-site scripting attack occurs when the attacker tricks a legitimate web-based application or site to accept a request as originating from ...
Read more >XSS on Google Search - Sanitizing HTML in The Client?
An actual XSS on google.com by Masato Kinugawa. It abuses a parsing differential between a JavaScript enabled and disabled context.
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Prepared Inputs into Summernote should be treated as explained here: http://stackoverflow.com/questions/26103875/script-tags-being-rendered-after-purification-in-wysiwyg#26128263
So it is seems that it is a feature, but I still believe it is worth at least mentioning in the documentation.
it shows in website like <script>alert('XSS');</script></p>