Unfiltered HTML in abstracts is a security risk
Please turn on the filtering, unless you believe it would be likely to break legitimate use cases.
I can't confirm whether this problem is broader than Onward 2016, but I asked the PC chair (Emerson Murphy-Hill) and he told me to file a bug here.Submitted by Matt McCutchen on 25 August 2016 at 08:51
Hi Matt, thanks for sharing.
This is indeed a security issue. We previously filtered all markdown text for specific HTML/JS, but later removed this filtering at specific places that were to be managed by content managers of the conference editions/tracks. At that moment, authors were not allowed to edit parts of the event details of their paper. I think we started supporting unfiltered HTML in abstracts to have some way to embed some slides or video in the abstract. But this is not needed anymore, as we have separate fields for embedded media.
Because authors of papers can now edit the event details, including the abstract, we should definitely filter the markdown texts again. I'll try to fix this today.
Great. As an aside, I realize that if content managers can still use unfiltered HTML, then they could collect user passwords and use them to log in to other conference sites. That could be fixed by having users enter their password only on http://conf.researchr.org and using a single sign-on protocol such as OpenID Connect to log in to conference sites. Do you care? Shall I file a separate bug?
We are planning to improve login later this year, so you only needs to log-in once for all conf-hosted conferences served from any domain.
Log in to post comments