TASK-019: Fix XSS vulnerability in DICOM series display
- Add html.EscapeString() to series_desc when building Series struct - Prevents JavaScript injection via malicious DICOM metadata Security impact: XSS payloads in series descriptions now render as harmless text.
This commit is contained in:
parent
5ebf9925ed
commit
989969375d
|
|
@ -4,6 +4,7 @@ import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"html"
|
||||||
"io"
|
"io"
|
||||||
"net/http"
|
"net/http"
|
||||||
"sort"
|
"sort"
|
||||||
|
|
@ -189,7 +190,7 @@ func fetchStudiesWithSeries(dossierHex string) ([]Study, error) {
|
||||||
for _, ser := range apiSeries {
|
for _, ser := range apiSeries {
|
||||||
s.Series = append(s.Series, Series{
|
s.Series = append(s.Series, Series{
|
||||||
ID: ser.ID,
|
ID: ser.ID,
|
||||||
Description: ser.SeriesDesc,
|
Description: html.EscapeString(ser.SeriesDesc), // FIX TASK-019: XSS prevention
|
||||||
Modality: ser.Modality,
|
Modality: ser.Modality,
|
||||||
SliceCount: ser.SliceCount,
|
SliceCount: ser.SliceCount,
|
||||||
})
|
})
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue