Skip to content

Commit

Permalink
Deploy the generated website via GitHub Actions
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Feb 7, 2024
1 parent 7c0aa63 commit e1f0418
Show file tree
Hide file tree
Showing 7 changed files with 101 additions and 101 deletions.
2 changes: 1 addition & 1 deletion News.xml

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1 +1 @@
Website last update: 2024-02-06 at 14:33:08.
Website last update: 2024-02-07 at 13:49:31.
Binary file modified bundle.zip
Binary file not shown.
2 changes: 1 addition & 1 deletion cheatsheets/DOM_based_XSS_Prevention_Cheat_Sheet.html
Original file line number Diff line number Diff line change
Expand Up @@ -3019,7 +3019,7 @@ <h3 id="html-encodings-disarming-nature">HTML Encoding's Disarming Nature<a clas
<p>HTML encoded example to highlight a fundamental difference with JavaScript encoded values (DNW):</p>
<div class="highlight"><pre><span></span><code><span class="err">&lt;</span><span class="ni">&amp;#x61;</span> href=...&gt;
</code></pre></div>
<p>If HTML encoding followed the same semantics as JavaScript encoding. The line above could have possibly worked to render a link. This difference makes JavaScript encoding a less viable weapon in our fight against XSS.</p>
<p>If HTML encoding followed the same semantics as JavaScript encoding, the line above could have possibly worked to render a link. This difference makes JavaScript encoding a less viable weapon in our fight against XSS.</p>
<h2 id="rule-4-javascript-escape-before-inserting-untrusted-data-into-the-css-attribute-subcontext-within-the-execution-context">RULE #4 - JavaScript Escape Before Inserting Untrusted Data into the CSS Attribute Subcontext within the Execution Context<a class="headerlink" href="#rule-4-javascript-escape-before-inserting-untrusted-data-into-the-css-attribute-subcontext-within-the-execution-context" title="Permanent link">&para;</a></h2>
<p>Normally executing JavaScript from a CSS context required either passing <code>javascript:attackCode()</code> to the CSS <code>url()</code> method or invoking the CSS <code>expression()</code> method passing JavaScript code to be directly executed.</p>
<p>From my experience, calling the <code>expression()</code> function from an execution context (JavaScript) has been disabled. In order to mitigate against the CSS <code>url()</code> method, ensure that you are URL encoding the data passed to the CSS <code>url()</code> method.</p>
Expand Down
2 changes: 1 addition & 1 deletion search/search_index.json

Large diffs are not rendered by default.

Loading

0 comments on commit e1f0418

Please sign in to comment.