Fix for URL sanitization that can lead to cross-site scripting (XSS) attacks.
Props irsdl, sstoqnov, whyisjake. Built from https://develop.svn.wordpress.org/trunk@45997 git-svn-id: http://core.svn.wordpress.org/trunk@45808 1a063a9b-81f0-0310-95a4-ce76da25c4cd
This commit is contained in:
parent
62b22b86a7
commit
30ac675795
|
@ -1664,6 +1664,7 @@ function wp_kses_html_error( $string ) {
|
||||||
* @return string Sanitized content.
|
* @return string Sanitized content.
|
||||||
*/
|
*/
|
||||||
function wp_kses_bad_protocol_once( $string, $allowed_protocols, $count = 1 ) {
|
function wp_kses_bad_protocol_once( $string, $allowed_protocols, $count = 1 ) {
|
||||||
|
$string = preg_replace( '/(�*58(?![;0-9])|�*3a(?![;a-f0-9]))/i', '$1;', $string );
|
||||||
$string2 = preg_split( '/:|�*58;|�*3a;/i', $string, 2 );
|
$string2 = preg_split( '/:|�*58;|�*3a;/i', $string, 2 );
|
||||||
if ( isset( $string2[1] ) && ! preg_match( '%/\?%', $string2[0] ) ) {
|
if ( isset( $string2[1] ) && ! preg_match( '%/\?%', $string2[0] ) ) {
|
||||||
$string = trim( $string2[1] );
|
$string = trim( $string2[1] );
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
*
|
*
|
||||||
* @global string $wp_version
|
* @global string $wp_version
|
||||||
*/
|
*/
|
||||||
$wp_version = '5.3-alpha-45990';
|
$wp_version = '5.3-alpha-45997';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Holds the WordPress DB revision, increments when changes are made to the WordPress DB schema.
|
* Holds the WordPress DB revision, increments when changes are made to the WordPress DB schema.
|
||||||
|
|
Loading…
Reference in New Issue