You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Previously, we would parse the malicious URL example with an authority
of 'user:[email protected]\\test.corp.google.com:8080' but we would not
parse that into its components because it had invalid characters. So
accessing the `host` attribute would result in `None`. That said,
someone might still have used the `authority` attribute and been misled.
To avoid misuse by developers, let's parse this similarly to the fix in
the blog post.
See also:
- https://bugs.xdavidhu.me/google/2020/03/08/the-unexpected-google-wide-domain-check-bypass/
0 commit comments