https://bugzilla.wikimedia.org/show_bug.cgi?id=11106

Daniel Renfro <[email protected]> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |[email protected]

--- Comment #3 from Daniel Renfro <[email protected]> ---
Looks like the commit to Sanitizer.php that disallows the CSS url() function
was meant to avoid running JavaScript in CSS with the url("javascript:...");
type of thing. (See the Mozilla bug report at
https://bugzilla.mozilla.org/show_bug.cgi?id=230134 for more info.) 

While I agree with the security concerns (and bad bad bad coding practice) of
executing JavaScript from within a CSS file, I don't agree that the url()
function should be completely disallowed. 

The method above (comment1) seems like a good idea: if some global variable
($wgDisallowedCssRegex) is set, use that. If not, fallback to what is there
now.

I might tackle this on the weekend if I've got time.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.
_______________________________________________
Wikibugs-l mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/wikibugs-l

Reply via email to