-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Huurtoeslag #31
Huurtoeslag #31
Conversation
for more information, see https://pre-commit.ci
- Added scenario for person under 18 years old (not eligible) - Added scenario for single person with low income and higher rent - Added scenario for person with income too high (over €44,000) - Fixed up YAML file with correct service costs calculation - Updated template display for required fields 🤖 Generated with Claude Code Co-Authored-By: Claude <[email protected]>
for more information, see https://pre-commit.ci
<div class="-mt-2 -mr-2">{{ org_logo(current_service) }}</div> | ||
<div class="relative"> | ||
<select class="appearance-none bg-white border rounded-md py-2 pl-4 pr-10 font-medium focus:outline-none focus:ring-2 focus:ring-blue-500" | ||
onchange="window.location.href = '/admin/' + this.value"> |
Check warning
Code scanning / CodeQL
DOM text reinterpreted as HTML Medium
DOM text
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix AI 14 days ago
To fix the problem, we need to ensure that the value from the select
element is properly encoded or sanitized before being used in the URL. One way to achieve this is by using JavaScript's encodeURIComponent
function, which encodes a URI component by replacing each instance of certain characters by one, two, three, or four escape sequences representing the UTF-8 encoding of the character.
- Modify the
onchange
event handler to useencodeURIComponent(this.value)
instead of directly concatenatingthis.value
. - This change ensures that any special characters in
this.value
are properly encoded, preventing potential XSS attacks.
-
Copy modified line R12
@@ -11,3 +11,3 @@ | ||
<select class="appearance-none bg-white border rounded-md py-2 pl-4 pr-10 font-medium focus:outline-none focus:ring-2 focus:ring-blue-500" | ||
onchange="window.location.href = '/admin/' + this.value"> | ||
onchange="window.location.href = '/admin/' + encodeURIComponent(this.value)"> | ||
{% for service_name in available_services %} |
<meta charset="UTF-8"> | ||
<meta name="viewport" content="width=device-width, initial-scale=1.0"> | ||
<title>Burger.nl</title> | ||
<script src="https://cdnjs.cloudflare.com/ajax/libs/htmx/1.9.10/htmx.min.js"></script> |
Check warning
Code scanning / CodeQL
Inclusion of functionality from an untrusted source Medium
<script defer | ||
src="https://cdnjs.cloudflare.com/ajax/libs/alpinejs/3.13.3/cdn.min.js"></script> |
Check warning
Code scanning / CodeQL
Inclusion of functionality from an untrusted source Medium
<!-- User Switcher --> | ||
<div class="flex items-center space-x-4"> | ||
<select class="bg-white text-gray-900 px-4 py-2 rounded w-96" | ||
onchange="window.location.href='/?bsn=' + this.value"> |
Check warning
Code scanning / CodeQL
DOM text reinterpreted as HTML Medium
DOM text
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix AI 14 days ago
To fix the problem, we need to ensure that the value from the select
element is properly encoded before being used in the URL. This can be achieved by using JavaScript's encodeURIComponent
function, which encodes a URI component by replacing each instance of certain characters by one, two, three, or four escape sequences representing the UTF-8 encoding of the character.
The best way to fix the problem without changing existing functionality is to modify the onchange
attribute to use encodeURIComponent(this.value)
instead of this.value
. This ensures that any special characters in the value are properly escaped, preventing potential XSS attacks.
-
Copy modified line R29
@@ -28,3 +28,3 @@ | ||
<select class="bg-white text-gray-900 px-4 py-2 rounded w-96" | ||
onchange="window.location.href='/?bsn=' + this.value"> | ||
onchange="window.location.href='/?bsn=' + encodeURIComponent(this.value)"> | ||
{% for bsn_key, profile_data in all_profiles.items() %} |
for more information, see https://pre-commit.ci
for more information, see https://pre-commit.ci
The engine was trying to access operation["value"][0] but when operation["value"] is a dictionary instead of a list, this caused a KeyError. Now it checks if it's a list first. 🤖 Generated with Claude Code Co-Authored-By: Claude <[email protected]>
No description provided.