You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Level 1: Seed
25 / 150 points
Next: Root
1 badge earned
Challenges come and go, but your rewards stay with you. Do more to earn more!
What goes around comes around! Share the love by gifting kudos to your peers.
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Join now to unlock these features and more
So the following Confluence doc mentions the XSS risk, does the Adaptavista CSS Stylesheet macro pose the same security risk?
https://confluence.atlassian.com/doc/styling-confluence-with-css-166528400.html
https://www.adaptavist.com/doco/display/CFP/Style+Sheet
Hello John.
Thank you for contacting us about this!
According to Content Formatting documentation from Adaptavist:
As Confluence is a content-management system that allows user-generated content to be posted on the web, precautions have been taken within the Content Formatting Add-On to prevent cross-site scripting attacks:
The Content Formatting html macros specifically prevent the use of unknown HTML attributes, and all parameter values are checked against an allowable range to ensure that they are not being abused.
For example, where an html attribute has an 'enum' set of values, ONLY those values are allowed; where it's a free text attribute, the value is checked for breaking out of the attribute rules. If any 'bad' values are found a macro exception is thrown and the output is not rendered.
Additional Precautions:
All of the 'form' html elements are disabled by default and must be manually enabled by an administrator.
JavaScript attributes are not allowed and cannot be enabled e.g. 'onclick'.
I hope that clarifies things for you, but I've included your question in the Adaptavist collection as well, in case anyone from Adaptavist has any further information for you regarding this.
Regards,
Shannon
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.