Skip to content

Commit 86a4a41

Browse files
committed
Update v8_09.md
1 parent 9d00953 commit 86a4a41

File tree

1 file changed

+23
-0
lines changed

1 file changed

+23
-0
lines changed

MyApp/_pages/releases/v8_09.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3142,3 +3142,26 @@ customizations see the [API Explorer Docs](https://docs.servicestack.net/api-exp
31423142
## XSS Vulnerability fixed in HtmlFormat.html
31433143

31443144
Late in this release cycle a Customer has reported a DOM XSS vulnerability in ServiceStack's built-in HtmlFormat.html page which has been fixed in [this commit](https://github.com/ServiceStack/ServiceStack/commit/76df4609410f7b440c3fb153371a1d29b9c06ac0) and available from this ServiceStack v8.9+ release.
3145+
3146+
Alternatively it can also be prevented by rejecting requests with `"` in its path:
3147+
3148+
```csharp
3149+
GlobalRequestFilters.Add((req, res, dto) => {
3150+
if (req.OriginalPathInfo.IndexOf('"') >= 0)
3151+
throw HttpError.Forbidden("Illegal characters in path");
3152+
});
3153+
```
3154+
3155+
By reverting to the use old HTML Format:
3156+
3157+
```csharp
3158+
ServiceStack.Templates.HtmlTemplates.HtmlFormatName = "HtmlFormatLegacy.html";
3159+
```
3160+
3161+
Or by disabling the auto rendering of HTML API responses:
3162+
3163+
```csharp
3164+
SetConfig(new HostConfig {
3165+
EnableAutoHtmlResponses = false
3166+
})
3167+
```

0 commit comments

Comments
 (0)