mirror of
https://github.com/github/codeql.git
synced 2025-12-22 19:56:32 +01:00
Remove webview example and its reference in qlhelp file
This commit is contained in:
@@ -5,10 +5,10 @@
|
||||
|
||||
<overview>
|
||||
<p>
|
||||
Enabling Node.js integration in web content renderers (BrowserWindow, BrowserView and webview) could result in
|
||||
Enabling Node.js integration in web content renderers (<code>BrowserWindow</code>, <code>BrowserView</code> and <code>webview</code>) could result in
|
||||
remote native code execution attacks when rendering malicious JavaScript code from untrusted remote web site or
|
||||
code that is injected via a cross site scripting vulnerability into the web content under processing. Please note that
|
||||
the nodeIntegration property is enabled by default in Electron and needs to be set to 'false' explicitly.
|
||||
code that is injected via a cross site scripting vulnerability into a trusted remote web site. Note that
|
||||
the <code>nodeIntegration</code> property is enabled by default in Electron and needs to be set to <code>false</code> explicitly.
|
||||
</p>
|
||||
</overview>
|
||||
|
||||
@@ -21,28 +21,21 @@
|
||||
|
||||
<example>
|
||||
<p>
|
||||
The following example shows insecure use of BrowserWindow with regards to <code>nodeIntegration</code>
|
||||
The following example shows insecure use of <code>BrowserWindow</code> with regards to <code>nodeIntegration</code>
|
||||
property:
|
||||
</p>
|
||||
<sample src="examples/DefaultNodeIntegration.js"/>
|
||||
|
||||
<p>
|
||||
This is problematic, because default value of nodeIntegration is 'true'.
|
||||
This is problematic, because default value of <code>nodeIntegration</code> is 'true'.
|
||||
</p>
|
||||
|
||||
</example>
|
||||
|
||||
<example>
|
||||
<p>
|
||||
The following example shows insecure and secure uses of <code>webview</code> tag:
|
||||
</p>
|
||||
<sample src="examples/WebViewNodeIntegration.html"/>
|
||||
|
||||
</example>
|
||||
|
||||
<example>
|
||||
<p>
|
||||
The following example shows insecure and secure uses of BrowserWindow and BrowserView when
|
||||
The following example shows insecure and secure uses of <code>BrowserWindow</code> and <code>BrowserView</code> when
|
||||
loading untrusted web sites:
|
||||
</p>
|
||||
<sample src="examples/EnablingNodeIntegration.js"/>
|
||||
|
||||
@@ -1,15 +0,0 @@
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset = "UTF-8">
|
||||
<title>WebView Examples</title>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<!-- BAD -->
|
||||
<webview src="https://untrusted-site.com/" nodeintegration></webview>
|
||||
|
||||
<!-- GOOD -->
|
||||
<webview src="https://untrusted-site.com/"></webview>
|
||||
</body>
|
||||
</html>
|
||||
Reference in New Issue
Block a user