* fix(lib): block XSS attacks via nonstandard URLs This could allow an attacker to craft an Anubis pass-challenge URL that forces a redirect to nonstandard URLs, such as the `javascript:` scheme which executes arbitrary JavaScript code in a browser context when the user clicks the "Try again" button. Release-status: cut Signed-off-by: Xe Iaso <me@xeiaso.net> * chore: spelling Signed-off-by: Xe Iaso <me@xeiaso.net> --------- Signed-off-by: Xe Iaso <me@xeiaso.net> |
||
|---|---|---|
| .. | ||
| challenge | ||
| localization | ||
| policy | ||
| store | ||
| testdata | ||
| anubis.go | ||
| anubis_test.go | ||
| config.go | ||
| config_test.go | ||
| http.go | ||
| http_test.go | ||