Skip to content

Escape query string params before calling config #4968

@gfellerph

Description

@gfellerph

There are some attempts at various injection attacks on the internet header config mechanism.

Image

The internet header element takes some properties and uses them to request the config. Before sending the request, the properties are not validated and the element can be manipulated to send potentially malicious code to our servers.

Tasks

Metadata

Metadata

Labels

v8🐞 bugSomething isn't working📦 internet-headerRelated to the @swisspost/internet-header package

Type

Projects

Status

🧐 In Review

Relationships

None yet

Development

No branches or pull requests

Issue actions