TheDesk
TheDesk copied to clipboard
Bump sanitize-html from 2.4.0 to 2.7.1 in /app
Bumps sanitize-html from 2.4.0 to 2.7.1.
Changelog
Sourced from sanitize-html's changelog.
2.7.1 (2022-07-20)
- Protocol-relative URLs are properly supported for script tags. Thanks to paweljq.
- A denial-of-service vulnerability has been fixed by replacing global regular expression replacement logic for comment removal with a new implementation. Thanks to Nariyoshi Chida of NTT Security Japan for pointing out the issue.
2.7.0 (2022-02-04)
- Allows a more sensible set of default attributes on
<img />tags. Thanks to Zade Viggers.2.6.1 (2021-12-08)
- Fixes style filtering to retain
!importantwhen used.- Fixed trailing text bug on
transformTagsoptions that was reported on [issue #506](apostrophecms/sanitize-html#506). Thanks to Alex Rantos.2.6.0 (2021-11-23)
- Support for regular expressions in the
allowedClassesoption. Thanks to Alex Rantos.2.5.3 (2021-11-02):
- Fixed bug introduced by klona 2.0.5, by removing klona entirely.
2.5.2 (2021-10-13):
- Nullish HTML input now returns an empty string. Nullish value may be explicit
null,undefinedor implicitundefinedwhen value is not provided. Thanks to Artem Kostiuk for the contribution.- Documented that all text content is escaped. Thanks to Siddharth Singh.
2.5.1 (2021-09-14):
- The
allowedScriptHostnamesandallowedScriptDomainsoptions now implicitly purge the inline content of all script tags, not just those withsrcattributes. This behavior was already strongly implied by the fact that they purged it in the case where asrcattribute was actually present, and is necessary for the feature to provide any real security. Thanks to Grigorii Duca for pointing out the issue.2.5.0 (2021-09-08):
- New
allowedScriptHostnamesoption, it enables you to specify which hostnames are allowed in a script tag.- New
allowedScriptDomainsoption, it enables you to specify which domains are allowed in a script tag. Thank you to Yorick Girard for this and theallowedScriptHostnamescontribution.- Updates whitelist to allowlist.
Commits
b4682c1Merge pull request #557 from apostrophecms/release-2.7.1b6c4971release 2.7.1 (with security fix previously tested and approved by Miro)6683aadremove DoS vulnerability7c7ccb4credit994f962Merge pull request #555 from paweljq/fix_protocol_relative_script_tag3c3f075Merge pull request #556 from cha147/patch-18e3b00ffix typos in readme329dae7Fix protocol relative url in scripts tags #5313cdc262release 2.7.0 (#534)72989f1Merge pull request #530 from apostrophecms/zade-credit- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)