Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork7.6k
fixed CWE-79 on docs.py#13887
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
base:master
Are you sure you want to change the base?
fixed CWE-79 on docs.py#13887
Conversation
probably was needed to make the flaky test pass for the documentation... |
@LucaPaterlini, thanks for the interest in FastAPI! |
https://cwe.mitre.org/data/definitions/79.html Thanks for your replies was not expecting this celery response, great fan of your work guys |
YuriiMotov commentedJul 13, 2025 • edited
Loading Uh oh!
There was an error while loading.Please reload this page.
edited
Uh oh!
There was an error while loading.Please reload this page.
So, as I understand it, the intruder can open a PR that injects malicious code in docs. And if somebody tries opening automatically generated docs preview that injected code may be executed on client side. Right? Do you have any idea why "Building Docs" action fails? |
As an alternative approach, we can disable automatic docs preview deployments for PRs and do it only after maintainers check the diff and explicitly request it |
No description provided.