Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(vue-admin): comment out the vue mount point #438

Merged
merged 1 commit into from
May 23, 2023
Merged

feat(vue-admin): comment out the vue mount point #438

merged 1 commit into from
May 23, 2023

Conversation

gmq
Copy link
Contributor

@gmq gmq commented May 22, 2023

En un Ethical Hacking se encontró que nuestra forma de usar Vue en el admin es vulnerable a ataques de Client-Side Template Injection. Por ejemplo si un usuario escribe {{ 13 + 13 }}, en el admin en las vistas de Index y Show se va a ver como 26. Esto puede ser cualquier tipo de javascript (detalles: https://book.hacktricks.xyz/pentesting-web/client-side-template-injection-csti#vuejs )

Este fix comenta el mount de Vue para que sea una decisión explícita el montar Vue en un elemento.

@gmq gmq requested a review from difernandez May 22, 2023 21:19
@gmq gmq merged commit 7c2915a into master May 23, 2023
@gmq gmq deleted the admin-vue branch May 23, 2023 14:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants