-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Conversation
- ETH-02-001
- ETH-02-002
- ETH-02-003
- ETH-02-004
@frozeman, thanks for your PR! By analyzing the history of the files in this pull request, we identified @evertonfraga and @alexvandesande to be potential reviewers. |
@@ -114,7 +114,7 @@ Helpers.generateBreadcrumb = function (url) { | |||
return el === ''; | |||
}); | |||
|
|||
return new Spacebars.SafeString(_.flatten(['<span>' + filteredUrl.host + ' </span>', pathname]).join(' ▸ ')); | |||
return new Spacebars.SafeString(url.protocol +'//'+ _.flatten(['<span>' + filteredUrl.host + ' </span>', pathname]).join(' ▸ ')); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@frozeman here I'd recommend using the Blaze._escape the same way we're using on host
and pathname
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will do, but as far as i understand whats put into the protocol is already stripped out. if invalid, it would be returned empty by webkit.
But we can certainly do it to increase security
This thread has been automatically locked because it has not had recent activity. Please open a new issue for related bugs and link to relevant comments in this thread. |