Bug/132 address xss issue
Addresses issue in #132
What does this MR do?
sanitize_html method in
XhrMethods in order to escape html passed to
How confident are you it won't break things if deployed?
Fairly confident, it's a very small addition in an isolated part of the project.
Links to related issues
- added a test, or explain why one is not needed/possible...
- no unrelated changes
- asked someone for a code review
- joined #foodsharing-beta channel at https://slackin.yunity.org
- added an entry to CHANGELOG.md (description, merge request link, username(s))