Commit cb30eaf4 authored by Alessio Caiazza's avatar Alessio Caiazza

Merge remote-tracking branch 'dev/master'

parents 9bf26835 eaae2461
Please view this file on the master branch, on stable branches it's out of date. Please view this file on the master branch, on stable branches it's out of date.
## 11.0.1 (2018-06-21)
- No changes.
## 11.0.0 (2018-06-22) ## 11.0.0 (2018-06-22)
### Security (2 changes) ### Security (2 changes)
...@@ -71,6 +75,10 @@ Please view this file on the master branch, on stable branches it's out of date. ...@@ -71,6 +75,10 @@ Please view this file on the master branch, on stable branches it's out of date.
- Allow viewing only one when multiple issue boards is not enabled. - Allow viewing only one when multiple issue boards is not enabled.
## 10.8.5 (2018-06-21)
- No changes.
## 10.8.4 (2018-06-06) ## 10.8.4 (2018-06-06)
### Fixed (4 changes) ### Fixed (4 changes)
...@@ -191,6 +199,10 @@ Please view this file on the master branch, on stable branches it's out of date. ...@@ -191,6 +199,10 @@ Please view this file on the master branch, on stable branches it's out of date.
- Remove `features/group_active_tab.feature`. !5554 (@blackst0ne) - Remove `features/group_active_tab.feature`. !5554 (@blackst0ne)
## 10.7.6 (2018-06-21)
- No changes.
## 10.7.5 (2018-05-28) ## 10.7.5 (2018-05-28)
### Security (3 changes) ### Security (3 changes)
......
...@@ -2,6 +2,17 @@ ...@@ -2,6 +2,17 @@
documentation](doc/development/changelog.md) for instructions on adding your own documentation](doc/development/changelog.md) for instructions on adding your own
entry. entry.
## 11.0.1 (2018-06-21)
### Security (5 changes)
- Fix XSS vulnerability for table of content generation.
- Update sanitize gem to 4.6.5 to fix HTML injection vulnerability.
- HTML escape branch name in project graphs page.
- HTML escape the name of the user in ProjectsHelper#link_to_member.
- Don't show events from internal projects for anonymous users in public feed.
## 11.0.0 (2018-06-22) ## 11.0.0 (2018-06-22)
### Security (3 changes) ### Security (3 changes)
...@@ -242,6 +253,17 @@ entry. ...@@ -242,6 +253,17 @@ entry.
- Workhorse to send raw diff and patch for commits. - Workhorse to send raw diff and patch for commits.
## 10.8.5 (2018-06-21)
### Security (5 changes)
- Fix XSS vulnerability for table of content generation.
- Update sanitize gem to 4.6.5 to fix HTML injection vulnerability.
- HTML escape branch name in project graphs page.
- HTML escape the name of the user in ProjectsHelper#link_to_member.
- Don't show events from internal projects for anonymous users in public feed.
## 10.8.4 (2018-06-06) ## 10.8.4 (2018-06-06)
- No changes. - No changes.
...@@ -460,6 +482,22 @@ entry. ...@@ -460,6 +482,22 @@ entry.
- Gitaly handles repository forks by default. - Gitaly handles repository forks by default.
## 10.7.6 (2018-06-21)
### Security (6 changes)
- Fix XSS vulnerability for table of content generation.
- Update sanitize gem to 4.6.5 to fix HTML injection vulnerability.
- HTML escape branch name in project graphs page.
- HTML escape the name of the user in ProjectsHelper#link_to_member.
- Don't show events from internal projects for anonymous users in public feed.
- XSS fix to use safe_params instead of params in url_for helpers.
### Other (1 change)
- Replacing gollum libraries for gitlab custom libs. !18343
## 10.7.5 (2018-05-28) ## 10.7.5 (2018-05-28)
### Security (3 changes) ### Security (3 changes)
......
---
title: Fix XSS vulnerability for table of content generation
merge_request:
author:
type: security
...@@ -92,7 +92,7 @@ module Banzai ...@@ -92,7 +92,7 @@ module Banzai
def text def text
return '' unless node return '' unless node
@text ||= node.text @text ||= EscapeUtils.escape_html(node.text)
end end
private private
......
...@@ -139,5 +139,14 @@ describe Banzai::Filter::TableOfContentsFilter do ...@@ -139,5 +139,14 @@ describe Banzai::Filter::TableOfContentsFilter do
expect(items[5].ancestors).to include(items[4]) expect(items[5].ancestors).to include(items[4])
end end
end end
context 'header text contains escaped content' do
let(:content) { '<img src="x" onerror="alert(42)">' }
let(:results) { result(header(1, content)) }
it 'outputs escaped content' do
expect(doc.inner_html).to include(content)
end
end
end end
end end
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment