Skip to content

Commit 182a9d4

Browse files
authored
bug-fix: Fix cross site scripting vulnerability in OGTag (#907)
Fixes: [CLNP-1845](https://sendbird.atlassian.net/browse/CLNP-1845) ### Changelogs - Fixed cross site scripting vulnerability in OGTag [CLNP-1845]: https://sendbird.atlassian.net/browse/CLNP-1845?atlOrigin=eyJpIjoiNWRkNTljNzYxNjVmNDY3MDlhMDU5Y2ZhYzA5YTRkZjUiLCJwIjoiZ2l0aHViLWNvbS1KU1cifQ
1 parent 0e0deb5 commit 182a9d4

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

src/ui/OGMessageItemBody/index.tsx

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,15 @@ export default function OGMessageItemBody({
3737
}: Props): ReactElement {
3838
const imageRef = useRef<HTMLDivElement>(null);
3939
const { stringSet } = useContext(LocalizationContext);
40+
4041
const openOGUrl = (): void => {
41-
if (message?.ogMetaData?.url) window.open(message?.ogMetaData?.url);
42+
let url = message?.ogMetaData?.url;
43+
if (url) {
44+
if (!url.startsWith('http://') && !url.startsWith('https://')) {
45+
url = 'https://' + url;
46+
}
47+
window.open(url);
48+
}
4249
};
4350
const isMessageMentioned = isMentionEnabled && message?.mentionedMessageTemplate?.length > 0 && message?.mentionedUsers?.length > 0;
4451
const tokens = useMemo(() => {

0 commit comments

Comments
 (0)