Skip to content

Commit bea2aff

Browse files
author
Ferry To
authored
Update README.md
1 parent acc430b commit bea2aff

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ Using Bootstrap in VueJS application is easy with BootstrapVue:
133133
- Add the Bootstrap components (e.g. I added a badge at Dashboard.vue template.)
134134

135135
### Prevent XSS Attack:
136-
During the journey in solveing the asp-prerendering v3.0.0+ dependency issue, I found an article talking about Cross-site scripting attack in JavaScript applications: *[The Most Common XSS Vulnerability in React.js Applications](https://medium.com/node-security/the-most-common-xss-vulnerability-in-react-js-applications-2bdffbcc1fa0)* And turns out rednerOnServer.js also has such vulnerability.
136+
During the journey in solving the asp-prerendering v3.0.0+ dependency issue, I found an article talking about Cross-site scripting attack in JavaScript applications: *[The Most Common XSS Vulnerability in React.js Applications](https://medium.com/node-security/the-most-common-xss-vulnerability-in-react-js-applications-2bdffbcc1fa0)* And turns out rednerOnServer.js also has such vulnerability.
137137

138138
module.exports = prerendering.createServerRenderer(function (params) {
139139
return new Promise(
@@ -178,4 +178,4 @@ and when you inspect the HTML from browser you will see the tags are escaped:
178178

179179
window.__INITIAL_STATE__ = {"url":"/","xss":"\"\\u003C\\u002Fscript\\u003E\\u003Cscript\\u003Ealert('Possible XSS vulnerability from user input!')\\u003C\\u002Fscript\\u003E\""};
180180

181-
Cheers. :smirk:
181+
Cheers. :smirk:

0 commit comments

Comments
 (0)