1. 13 12月, 2019 2 次提交
  2. 12 12月, 2019 5 次提交
  3. 11 12月, 2019 1 次提交
  4. 09 12月, 2019 2 次提交
  5. 25 10月, 2019 3 次提交
    • G
      Merge branch 'security-stored-xss-using-find-file-12-1' into '12-1-stable' · 41948c2c
      GitLab Release Tools Bot 提交于
      Sanitize search text to prevent XSS
      
      See merge request gitlab/gitlabhq!3471
      41948c2c
    • G
      Merge branch 'security-xss-grafana-url-12-1' into '12-1-stable' · 27e6daa2
      GitLab Release Tools Bot 提交于
      Handle Stored XSS for Grafana URL in settings
      
      See merge request gitlab/gitlabhq!3483
      27e6daa2
    • D
      Handle Stored XSS for Grafana URL in settings · 9a0dc3fa
      David Wilkins 提交于
      - Extend Gitlab::UrlBlocker to allow relative urls (require_absolute
        setting).  The new `require_absolute` setting defaults to true,
        which is the existing behavior.
      
      - Extend AddressableUrlValidator to accept `require_abosolute` and
        default to the existing behavior
      
      - Add validation for ApplicationSetting#grafana_url to validate that
        the URL does not contain XSS but can be a valid relative or absolute
        url.
      
      - In the case of existing stored URLs, validate the stored URL does
        not contain XSS. If the stored URL contains stored XSS or is an
        otherwise invalid URL, return the default database column value.
      
      - Add tests for Gitlab::UrlBlocker to test require_absolute setting
      
      - Add tests for AddressableUrlValidator
      
      - Add tests for ApplicationSetting#grafana_url
      9a0dc3fa
  6. 11 10月, 2019 1 次提交
  7. 07 10月, 2019 3 次提交
  8. 02 10月, 2019 3 次提交
  9. 01 10月, 2019 3 次提交
  10. 27 9月, 2019 2 次提交
  11. 26 9月, 2019 12 次提交
  12. 25 9月, 2019 3 次提交