1 | # CHANGELOG
|
---|
2 |
|
---|
3 | ## 7.0.0
|
---|
4 |
|
---|
5 | - Move constant declarations from index file to `constants.ts` file
|
---|
6 | - Update to node v18
|
---|
7 |
|
---|
8 | - Dev Dependency Updates
|
---|
9 | - Update to TypeScript 5
|
---|
10 | - Other minor dependency updates
|
---|
11 |
|
---|
12 | ## 6.0.4
|
---|
13 |
|
---|
14 | - Add additional null byte sanitization prior to html decoding (#48)
|
---|
15 |
|
---|
16 | ## 6.0.3
|
---|
17 |
|
---|
18 | - Add null check to beginning of `sanitizeUrl` function ([#54](https://github.com/braintree/sanitize-url/issues/54))
|
---|
19 |
|
---|
20 | ## 6.0.2
|
---|
21 |
|
---|
22 | - Fix issue where urls in the form `https://example.com

/something` were not properly sanitized
|
---|
23 |
|
---|
24 | ## 6.0.1
|
---|
25 |
|
---|
26 | - Fix issue where urls in the form `javascript:alert('xss');` were not properly sanitized
|
---|
27 | - Fix issue where urls in the form `javasc	ript:alert('XSS');` were not properly sanitized
|
---|
28 |
|
---|
29 | ## 6.0.0
|
---|
30 |
|
---|
31 | **Breaking Changes**
|
---|
32 |
|
---|
33 | - Decode HTML characters automatically that would result in an XSS vulnerability when rendering links via a server rendered HTML file
|
---|
34 |
|
---|
35 | ```js
|
---|
36 | // decodes to javacript:alert('XSS')
|
---|
37 | const vulnerableUrl =
|
---|
38 | "javascript:alert('XSS')";
|
---|
39 |
|
---|
40 | sanitizeUrl(vulnerableUrl); // 'about:blank'
|
---|
41 |
|
---|
42 | const okUrl = "https://example.com/" + vulnerableUrl;
|
---|
43 |
|
---|
44 | // since the javascript bit is in the path instead of the protocol
|
---|
45 | // this is successfully sanitized
|
---|
46 | sanitizeUrl(okUrl); // 'https://example.com/javascript:alert('XSS');
|
---|
47 | ```
|
---|
48 |
|
---|
49 | ## 5.0.2
|
---|
50 |
|
---|
51 | - Fix issue where certain invisible white space characters were not being sanitized (#35)
|
---|
52 |
|
---|
53 | ## 5.0.1
|
---|
54 |
|
---|
55 | - Fix issue where certain safe characters were being filtered out (#31 thanks @akirchmyer)
|
---|
56 |
|
---|
57 | ## 5.0.0
|
---|
58 |
|
---|
59 | _Breaking Changes_
|
---|
60 |
|
---|
61 | - Sanitize vbscript urls (thanks @vicnicius)
|
---|
62 |
|
---|
63 | ## 4.1.1
|
---|
64 |
|
---|
65 | - Fixup path to type declaration (closes #25)
|
---|
66 |
|
---|
67 | ## 4.1.0
|
---|
68 |
|
---|
69 | - Add typescript types
|
---|
70 |
|
---|
71 | ## 4.0.1
|
---|
72 |
|
---|
73 | - Fix issue where urls with accented characters were incorrectly sanitized
|
---|
74 |
|
---|
75 | ## 4.0.0
|
---|
76 |
|
---|
77 | _Breaking Changes_
|
---|
78 |
|
---|
79 | - Protocol-less urls (ie: www.example.com) will be sanitised and passed on instead of sending out `about:blank` (Thanks @chawes13 #18)
|
---|
80 |
|
---|
81 | ## 3.1.0
|
---|
82 |
|
---|
83 | - Trim whitespace from urls
|
---|
84 |
|
---|
85 | ## 3.0.0
|
---|
86 |
|
---|
87 | _breaking changes_
|
---|
88 |
|
---|
89 | - Replace blank strings with about:blank
|
---|
90 | - Replace null values with about:blank
|
---|
91 |
|
---|
92 | ## 2.1.0
|
---|
93 |
|
---|
94 | - Allow relative urls to be sanitized
|
---|
95 |
|
---|
96 | ## 2.0.2
|
---|
97 |
|
---|
98 | - Sanitize malicious URLs that begin with `\s`
|
---|
99 |
|
---|
100 | ## 2.0.1
|
---|
101 |
|
---|
102 | - Sanitize malicious URLs that begin with %20
|
---|
103 |
|
---|
104 | ## 2.0.0
|
---|
105 |
|
---|
106 | - sanitize data: urls
|
---|
107 |
|
---|
108 | ## 1.0.0
|
---|
109 |
|
---|
110 | - sanitize javascript: urls
|
---|