This component proves to be highly useful, notwithstanding the fact that our team discovered a vulnerability related to XSS (cross-site scripting). Consequently, we implemented an update on the ProcessFiles screen to enhance the security, as described below.
- First we added a SanitizeHtml action (from Sanitization) with the qqfile on the html input. [html = qqfile]
-Then we encoded the output URL from SanitizeHTML action.
[qqfile = EncondeURL(SanitizeHtml.SanitizedHtml)]
This was made in the beginning of the preparation action and the vulnerability was resolved.
I hope this helps!