-
Notifications
You must be signed in to change notification settings - Fork 368
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: [M3-8424] - Fix CodeQL alerts for DOM text reinterpreted as HTML
#11008
Conversation
Coverage Report: ✅ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I may have my local CodeQL configured incorrectly but I'm not seeing any results when scanning the selected vulnerabilities either before or after this change. Still, reviewing the changes, I believe they are sensical and will cause no harm.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Was the vulnerability detected in this file a false alarm?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The changes didn't really make sense to include as part of the PR because they didn't see to accomplish anything different than the existing code, so I removed them. The change made in the sessions.ts
file actually made sense and I decided to leave it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In the same boat as Hussain - encodeURIComponent
makes sense to me. Will the other alerts be dismissed as false positives?
My hope is that by merging this small change, we should see if the alert goes away or at least trigger a new alert, which may provide more context. I will check with John and Jaalah before I take an action with respect to handling the alert on the GitHub page. |
Cloud Manager E2E
|
Project |
Cloud Manager E2E
|
Branch Review |
develop
|
Run status |
|
Run duration | 27m 17s |
Commit |
|
Committer | carrillo-erik |
View all properties for this run ↗︎ |
Test results | |
---|---|
|
1
|
|
2
|
|
2
|
|
0
|
|
407
|
View all changes introduced in this branch ↗︎ |
Tests for review
cypress/e2e/core/linodes/clone-linode.spec.ts • 1 failed test
Test | Artifacts | |
---|---|---|
clone linode > can clone a Linode from Linode details page |
Screenshots
Video
|
linodes/rebuild-linode.spec.ts • 1 flaky test
Test | Artifacts | |
---|---|---|
rebuild linode > cannot rebuild a provisioning linode |
Screenshots
Video
|
placementGroups/delete-placement-groups.spec.ts • 1 flaky test
Test | Artifacts | |
---|---|---|
Placement Group deletion > can unassign Linode when unexpected error show up and reopen the dialog |
Screenshots
Video
|
@carrillo-erik This PR is being reverted. Not only did it not fix the dependabot warnings but it introduced a bad bug - see #11017 |
Description 📝
This PR attempts to reproduce and resolve the CodeQL code scan alerts for
DOM text reinterpreted as HTML
. Alternatively, these alerts might be determined to be false positives and will be dismissed as so.Changes 🔄
List any change relevant to the reviewer.
Target release date 🗓️
10/16/2024
How to test 🧪
Prerequisites
(How to setup test environment)
cd
into thesrc/
directory of themanager
package and execute thecodeql database create codeqldb --language=javascript
command.codeql-repo
(this is one of the directories created using the linked guide).codeql database create codeqldb --language=javascript
command. (This DataBase will be located in thesrc/
directory of themanager
package.Verification steps
(How to verify changes)
javascript/ql/src/Security/
directory.XssThroughDom.ql
query and run it by clicking the play button.As an Author I have considered 🤔
Check all that apply