#23561: Can unauthorized JS execution happen in quoted & escaped HTML class name? -------------------------------+------------------------------------ Reporter: djbug | Owner: nobody Type: Uncategorized | Status: closed Component: Documentation | Version: 1.7 Severity: Normal | Resolution: fixed Keywords: | Triage Stage: Accepted Has patch: 0 | Needs documentation: 0 Needs tests: 0 | Patch needs improvement: 0 Easy pickings: 0 | UI/UX: 0 -------------------------------+------------------------------------
Comment (by Carl Meyer <carl@…>): In [changeset:"d7bc30ffd26ebbe6d98fcd08d9120f44702d2a62"]: {{{ #!CommitTicketReference repository="" revision="d7bc30ffd26ebbe6d98fcd08d9120f44702d2a62" [1.7.X] Fixed #23561 -- Corrected a security doc example that requires an unquoted HTML attribute. Thanks "djbug" for the report. }}} -- Ticket URL: <https://code.djangoproject.com/ticket/23561#comment:5> Django <https://code.djangoproject.com/> The Web framework for perfectionists with deadlines. -- You received this message because you are subscribed to the Google Groups "Django updates" group. To unsubscribe from this group and stop receiving emails from it, send an email to django-updates+unsubscr...@googlegroups.com. To post to this group, send email to django-updates@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/django-updates/063.f6850b93c8e7561dd13bf1a5d826a346%40djangoproject.com. For more options, visit https://groups.google.com/d/optout.