Skip to content

Code example contains XSS vulnerability #22866

@jwoyo

Description

@jwoyo

Existing documentation URL(s)

What changes are you suggesting?

Hey,

it bugs me that this code example has an obvious XSS vulnerability. The objectName can contain an arbitrary user input that is passed as an unsanitized value to the html response that is returned by objectNotFound. I suggest to fix that.

Best,
Julian

Additional information

No response

Metadata

Metadata

Labels

content:editRequest for content editsdocumentationDocumentation editsproduct:r2R2 object storage: https://developers.cloudflare.com/r2

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions