dcd1f5d48c
Here we go, next step then. As we did not fix the performance issue when autofiltering the variables (see bug 20975), the only solution we have is to add the filters explicitely. This patch has been autogenerated (using add_html_filters.pl, see next pathces) and add the html filter to all the variables displayed in the template. Exceptions are made (using the new 'raw' TT filter) to the variable we already listed in the previous versions of this patch. To test: - Use t/db_dependent/Koha/Patrons.t to populate your DB with autogenerated data which contain <script> tags - Remove them from borrower_debarments.comments (there are allowed here) update borrower_debarments set comment="html tags possible here"; - From the interface hit page and try to catch alert box. If you find one it means you find a possible XSS. To know where it comes from: * note the exact URL where you found it * note the alert box content * Dump your DB and search for the string in the dump to identify its location (for instance table.field) Next: * Ideally we would like to use the raw filter when it is not necessary to HTML escape the variables (in big loop for instance) * Provide a QA script to catch missing filters (we want html, uri, url or raw, certainly others that I am forgetting now) * Replace the html filters with uri when needed (!) Signed-off-by: Owen Leonard <oleonard@myacpl.org> Signed-off-by: Martin Renvoize <martin.renvoize@ptfs-europe.com> Signed-off-by: Nick Clemens <nick@bywatersolutions.com>
9 lines
323 B
HTML
9 lines
323 B
HTML
[% USE raw %]
|
|
[% USE Asset %]
|
|
<script>
|
|
var GB_ROOT_DIR = "[% interface | html %]/[% theme | html %]/lib/greybox/";
|
|
</script>
|
|
[% Asset.js("lib/greybox/AJS.js") | $raw %]
|
|
[% Asset.js("lib/greybox/AJS_fx.js") | $raw %]
|
|
[% Asset.js("lib/greybox/gb_scripts.js") | $raw %]
|
|
[% Asset.css("lib/greybox/gb_styles.css") | $raw %]
|