aboutsummaryrefslogtreecommitdiffstats
path: root/src/ng/parse.js
diff options
context:
space:
mode:
authorChirayu Krishnappa2013-06-21 19:00:45 -0700
committerChirayu Krishnappa2013-06-24 14:17:18 -0700
commit38deedd6e3d806eb8262bb43f26d47245f6c2739 (patch)
tree2307e8a84b040b32acf4fe8d325af0eb021469a1 /src/ng/parse.js
parent39841f2ec9b17b3b2920fd1eb548d444251f4f56 (diff)
downloadangular.js-38deedd6e3d806eb8262bb43f26d47245f6c2739.tar.bz2
fix($compile): reject multi-expression interpolations for src attribute
BREAKING CHANGE: Concatenating expressions makes it hard to reason about whether some combination of concatenated values are unsafe to use and could easily lead to XSS. By requiring that a single expression be used for *[src/ng-src] such as iframe[src], object[src], etc. (but not img[src/ng-src] since that value is sanitized), we ensure that the value that's used is assigned or constructed by some JS code somewhere that is more testable or make it obvious that you bound the value to some user controlled value. This helps reduce the load when auditing for XSS issues. To migrate your code, follow the example below: Before: JS: scope.baseUrl = 'page'; scope.a = 1; scope.b = 2; HTML: <!-- Are a and b properly escaped here? Is baseUrl controlled by user? --> <iframe src="{{baseUrl}}?a={{a}&b={{b}}"> After: JS: var baseUrl = "page"; scope.getIframeSrc = function() { // There are obviously better ways to do this. The // key point is that one will think about this and do // it the right way. var qs = ["a", "b"].map(function(value, name) { return encodeURIComponent(name) + "=" + encodeURIComponent(value); }).join("&"); // baseUrl isn't on scope so it isn't bound to a user // controlled value. return baseUrl + "?" + qs; } HTML: <iframe src="{{getIframeSrc()}}">
Diffstat (limited to 'src/ng/parse.js')
0 files changed, 0 insertions, 0 deletions