whiTeLeaf-TL / U1bot

一个令人欢喜的娱乐机器
GNU General Public License v3.0
6 stars 3 forks source link

🔧修复安全问题 `BAN-B701`(deepsource) #51

Closed xiaozhu2007 closed 9 months ago

xiaozhu2007 commented 9 months ago

Using Jinja2 templates without autoescaping enabled leaves application vulnerable to [XSS attacks](https://owasp.org/www-project-top-ten/2017/A72017-Cross-SiteScripting_(XSS).

Autoescaping is the concept of automatically escaping special characters. Special characters for HTML, XML and XHTMl are &, >, <, " as well as '. These characters carry specific meanings so need to be replaced by so called entities if you want to use them for text. Not doing so makes application susceptible to Cross Site Scripting (XSS) attacks.

When configuring the Jinja2 environment, the option to use autoescaping on input can be specified. By default, autoescaping is disabled. When enabled, Jinja2 will filter input strings to escape any HTML content submitted via template variables.

wling-art commented 9 months ago

okay,thank