symposion_app/symposion
Sachi King 0652471164 Sanitize user input on markdown fields
This is an XSS vulnribilitiy.

This also blocks a number of MD attributes that a user might attempt to
use.

The following are the allowed attributes.

['a', 'abbr', 'acronym', 'b', 'blockquote', 'code', 'em', 'i', 'li',
'ol', 'p', 'pre', 'strong', 'ul']

I belive this to be acceptable, as honeslty, a speaker using H1 is going
to stomp all over the page and make it harder for the reviewer to parse.

UX wise, it's less than great.  A user can do # title and be left with
<h1> in the sanitized output.
2017-04-29 15:47:08 +10:00
..
conference Use django's login_required decorator 2017-03-26 12:32:32 +11:00
locale add japanese translation 2015-06-21 12:51:36 +09:00
proposals Flake8 Fixes 2017-04-17 22:51:48 +10:00
reviews Flake8 Fixes 2017-04-17 22:51:48 +10:00
schedule Flake8 Fixes 2017-04-17 22:51:48 +10:00
speakers Flake8 Fixes 2017-04-17 22:51:48 +10:00
sponsorship Flake8 Fixes 2017-04-17 22:51:48 +10:00
static drop old unused chosen 2015-07-11 16:02:35 +09:00
teams Flake8 Fixes 2017-04-17 22:51:48 +10:00
utils Flake8 Fixes 2017-04-17 22:51:48 +10:00
__init__.py bump version for dev 2013-03-14 04:56:04 -04:00
conf.py Ignore linting the settings import 2014-12-18 08:19:01 -06:00
markdown_parser.py Sanitize user input on markdown fields 2017-04-29 15:47:08 +10:00
models.py add blank models.py to symposion 2012-08-14 04:20:46 -04:00
views.py Use django's login_required decorator 2017-03-26 12:32:32 +11:00