Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Patched results for branch: master#43

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Open
patched-codes wants to merge2 commits intomaster
base:master
Choose a base branch
Loading
frompatched-master

Conversation

@patched-codes
Copy link

@patched-codespatched-codesbot commentedMay 24, 2024
edited
Loading

This pull request from patched fixes 2 issues.


  • File changed:main.py
    Fixed command injection vulnerability The diff shows that a security vulnerability, specifically a command injection vulnerability, has been fixed. The user input is now being sanitized using the shlex.quote() function before being used in a command. This prevents malicious user input from being executed as part of the command.
  • File changed:html.js
    Refactoring and improving security of script loading The diff shows that the script loading code has been refactored for better readability and security. The changes include the addition of encodeURIComponent() function to the kitId when forming the script source URL, which can prevent potential cross-site scripting (XSS) attacks by ensuring the kitId is properly encoded. The rest of the changes are mainly formatting and do not alter the functionality of the code.

@patched-codespatched-codesbotforce-pushed thepatched-master branch 2 times, most recently from95076d0 to437c15bCompareJune 7, 2024 15:21
@github-actions
Copy link

This pull request addresses two issues by fixing a command injection vulnerability in main.py through user input sanitization with shlex.quote() and enhancing security in html.js by encoding the kitId with encodeURIComponent() to prevent cross-site scripting attacks. Other changes in html.js are related to formatting and do not affect functionality.


  • File changed:html.js
    This pull request fixes two issues: it addresses a command injection vulnerability in the main.py file by sanitizing user input with the shlex.quote() function, and it refactors the script loading code in html.js to improve security by encoding the kitId using encodeURIComponent() to prevent potential cross-site scripting attacks. Other changes in the html.js file mainly relate to formatting and do not impact the code's functionality.
  • File changed:main.py
    This pull request from patched fixes 2 issues, including a command injection vulnerability in main.py being fixed by sanitizing user input with shlex.quote() and refactoring of script loading code in html.js to improve security and readability, mainly by properly encoding the kitId in the script source URL to prevent XSS attacks.

Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

No reviews

Assignees

No one assigned

Labels

None yet

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

1 participant


[8]ページ先頭

©2009-2025 Movatter.jp