mirror of
https://github.com/netbox-community/netbox.git
synced 2025-08-28 10:16:10 -06:00
Fixes #20009: Fix DOM-based XSS vulnerability in search export functionality
Replace direct string concatenation with URLSearchParams to properly encode user input in export link URLs, preventing injection of malicious parameters or scripts through the search functionality. Resolves CodeQL Alert #63 (js/xss-through-dom)
This commit is contained in:
parent
bb83187505
commit
2c09973e01
BIN
netbox/project-static/dist/netbox.js
vendored
BIN
netbox/project-static/dist/netbox.js
vendored
Binary file not shown.
BIN
netbox/project-static/dist/netbox.js.map
vendored
BIN
netbox/project-static/dist/netbox.js.map
vendored
Binary file not shown.
@ -38,7 +38,9 @@ function handleQuickSearchParams(event: Event): void {
|
|||||||
|
|
||||||
if (quickSearchParameters != null) {
|
if (quickSearchParameters != null) {
|
||||||
const link = document.getElementById('export_current_view') as HTMLLinkElement;
|
const link = document.getElementById('export_current_view') as HTMLLinkElement;
|
||||||
const search_parameter = `q=${quickSearchParameters.value}`;
|
const params = new URLSearchParams();
|
||||||
|
params.set('q', quickSearchParameters.value);
|
||||||
|
const search_parameter = params.toString();
|
||||||
const linkUpdated = link?.href + '&' + search_parameter;
|
const linkUpdated = link?.href + '&' + search_parameter;
|
||||||
link.setAttribute('href', linkUpdated);
|
link.setAttribute('href', linkUpdated);
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user