stable

Clone or download

Read-only

Fix html injection vulnerability

Part of epic #12142 Baseline v1 All fields content were displayed as html in baseline view. So, one user can save content with some JS script which may be executed by victim when showing baseline page. Change-Id: I3f967c34cf95b3766c2ea6d36964883f43a701fd

Modified Files

Name
M scripts/baseline/components/baseline-page/BaselineArtifact.vue +1 −0 Go to diff View file
A scripts/baseline/components/baseline-page/Field.spec.js +55 −0 Go to diff View file
M scripts/baseline/components/baseline-page/Field.vue +13 −2 Go to diff View file
A scripts/baseline/components/comparison/content/FieldComparison.spec.js +62 −0 Go to diff View file
M scripts/baseline/components/comparison/content/FieldComparison.vue +5 −3 Go to diff View file
M scripts/package-lock.json +5 −0 Go to diff View file
M scripts/package.json +1 −0 Go to diff View file