-
-
Notifications
You must be signed in to change notification settings - Fork 964
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[QUESTION] how to properly sanitize API request payloads #1089
Comments
Data is validated after the denormalization phase. To avoid type errors you can disable type checking in the normalizers. |
I understand. However I was aiming more into a security kind of checking. I've come up with a simple implementation by decorating a default decoder and manually inspecting string values from a raw JSON payload and throwing HTTP 400 if funky business was detected. It's a bit defensive I know so i was wondering about alternatives. |
|
Hi, thanks for input. |
If a string containing javascript is stored in the database, it’s not harmful per se. You shouldnt evaluate the javascript on output though. |
Of course, that might be the solution. However, by using a default ApiPlatform implementation the XSS content will be returned to client. So you'll have to tweak around that. |
Just a general question what do you guys recommend as a best practice to sanitize user request payloads for XSS and other potential harmful data.
There are several ideas that come on my mind, like:
Any other ideas? Does api-platform have it's own way of handling this? It seems to me that data is persisted straight from the request.
The text was updated successfully, but these errors were encountered: