Update dependency dompurify to v2.5.4 [SECURITY] #390
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.0.12
->2.5.4
GitHub Vulnerability Alerts
CVE-2019-16728
Versions of
dompurify
prior to 2.0.3 are vulnerable to Cross-Site Scripting (XSS). The package has an XSS filter bypass due to Mutation XSS in both Chrome and Safari through a combination of<svg>
/<math>
elements and</p>
/</br>
. An example payload is:<svg></p><style><a id="</style><img src=1 onerror=alert(1)>">
. This allows attackers to bypass the XSS protection and execute arbitrary JavaScript in a victim's browser.Recommendation
Upgrade to version 2.0.3 or later. You may also disallow
<svg>
and<math>
throughdompurify
configurations: