Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS possible #216

Closed
treuter opened this issue Nov 4, 2015 · 2 comments
Closed

XSS possible #216

treuter opened this issue Nov 4, 2015 · 2 comments
Assignees

Comments

@treuter
Copy link

treuter commented Nov 4, 2015

It is possible to read the user's cookie, e.g.:

[XSS](javascript:window.onerror=alert;throw%20document.cookie)

Maybe there should be a configuration option to prevent creating javascript code.

@tivie
Copy link
Member

tivie commented Nov 4, 2015

Showdown doesn't sanitize the input. This is by design since markdown relies on it to allow certain features to be correctly parsed into HTML. This, however, means XSS injection is quite possible.

Further reference:

@tivie tivie added the duplicate label Nov 4, 2015
@tivie tivie self-assigned this Nov 4, 2015
@treuter
Copy link
Author

treuter commented Nov 4, 2015

Thanks for the information!

@treuter treuter closed this as completed Nov 4, 2015
@tivie tivie mentioned this issue Nov 1, 2018
Closed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants