-
Notifications
You must be signed in to change notification settings - Fork 451
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Redesigned Dashboard & Workflow - Persisting state in URL #10771
Comments
* pkp/pkp-lib#10771 Persist also selected menu in workflow page * pkp/pkp-lib#10771 remove correct query param when redirecting to decision page
@jardakotesovec One possible efficiency (I don't know what to call it) would be if the user has opened up a workflow pane the search Phrase shouldn't be kept since it doesn't do anything when you copy and paste the urls for state? Here is an example with searchPhrase being kept in the URL but the workflow is opened and the search doesn't have anything to do with it. It also introduces a bit of a security flaw in that I can send you a link with a searchPhrase that could potentially allow a user to put malicious code into the string. This is more of a generalized method for all parameters but I'm thinking about this : https://pragmaticwebsecurity.com/articles/apisecurity/tamper-proof-params-jwt#:~:text=URL%20parameters%20are%20present%20in,a%20URL%20containing%20sensitive%20parameters. |
@Tribunal33 regarding the search phrase. That still gets applied, but to the dashboard state, not workflow as all other filters. I don't think thats causing any problems? Even if someone is sharing url with opened workflow page - keeping the dashboard state increase the chance that after closing workflow page - that particular submission will be somewhere in that listing. Regarding the xss attacks, these are prevented (escaped) on rendering layer (vue.js), so we don't do any explicit handling of that. |
@jardakotesovec this case passes QA. The tricky part was trying to figure out how these URLs interact with certain users. Which users are able to see what. I did not see requirements on them so I tried a few that I knew shouldn't be allow. It blocks them correctly -- gives this error response These params are easy to manipulate because of the readability but if the search bar is escaping properly then I don't really see a strong attack vector here. Might be something to monitor on hosting side to scan for any malicious looking urls. @pmangahis I believe that PS team wanted to make sure copy pasting urls was working well. Are there any other cases I might have missed? Test Case Overview
|
To make it easier to bookmark and share urls in dashboard and workflow, following items are being persisted to the URL as query params.
This is new feature compared to 3.4.
Testing is mostly just copying url and making sure that the state was applied accurately.
The text was updated successfully, but these errors were encountered: