-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: xss vulnerability patch for 4.3.1 #7340
Conversation
|
return (req: Request, res: Response, next: NextFunction) => { | ||
// Validate & sanitize the request params | ||
Object.entries(req.params).forEach(([key, value]) => { | ||
req.params[key] = typeof value === "string" ? xss(value) : value; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Isn't it always string?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is the same logic as we have in new version that you have already approved there
f00b483
to
29df9a0
Compare
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
Quality Gate passedIssues Measures |
It is already reviewed. |
https://alokai.atlassian.net/browse/IN-4420