gaellalire commented on PR #122:
URL: https://github.com/apache/johnzon/pull/122#issuecomment-1998060261

   > to me it sounds more like you want to sanitize whatever json johnzon 
produced (from probably untrusted input). 
   
   Yes because of the number of method I have, I prefer a global solution. 
Security team don't want script injection, I don't want  to change existing 
behavior.
   
   You can escape < to &lt; but in that case you will have to ask all of your 
clients to add unescapeHTML in their code (every methods, every string fields 
...).
   
   The beauty here is that this escape is not a real one for JSON ( "\u003C"  = 
"<" : it is just another way to write it) while for an HTML parser ("\u003C"  
!= "<") it will behave differently.
   
   So with that patch, REST clients have nothing to change and security team 
cannot insert script tags.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@johnzon.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to