#23561: Can unauthorized JS execution happen in quoted & escaped HTML class 
name?
-------------------------------+------------------------------------
     Reporter:  djbug          |                    Owner:  nobody
         Type:  Uncategorized  |                   Status:  new
    Component:  Documentation  |                  Version:  1.7
     Severity:  Normal         |               Resolution:
     Keywords:                 |             Triage Stage:  Accepted
    Has patch:  0              |      Needs documentation:  0
  Needs tests:  0              |  Patch needs improvement:  0
Easy pickings:  0              |                    UI/UX:  0
-------------------------------+------------------------------------
Changes (by carljm):

 * component:  Uncategorized => Documentation
 * stage:  Unreviewed => Accepted


Comment:

 It looks to me like those quotes were added in 9432f1, probably without
 consideration that adding them changed that particular example
 significantly.

 I'm not aware of a browser vulnerability that would make the shown code
 (with quoted attributes and autoescaping on) vulnerable.

--
Ticket URL: <https://code.djangoproject.com/ticket/23561#comment:3>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to django-updates+unsubscr...@googlegroups.com.
To post to this group, send email to django-updates@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/063.2a5fbdb06571e1d4b9415bee4ce909fc%40djangoproject.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to