Kopete doesn't escape HTML in receiving messages

Bug #309006 reported by Sjoerd Hemminga
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
kdenetwork (Ubuntu)
Invalid
Undecided
Unassigned

Bug Description

Binary package hint: kdenetwork

When receiving a message that contains HTML code, Kopete will interpret the HTML and display a parsed version of it. E.g. "<a href="http://www.example.com/">Hi</a>" will display as a link to example.com. I've seen this behaviour on ICQ, where the other person was using CenterIM, and on MSN, where the other party was using Trillian.

It is quite annoying when people send you messages like "http://link/ <-- Check this out" or an HTML paste. I'm not sure if this can be abused. I tried some simple tests with Javascript, which didn't work, but that was in no way exhaustive.

I'm using Ubuntu 8.10 and Kopete 4.1.3.

Revision history for this message
Terence Simpson (tsimpson) wrote :

I think this is the same as bug #181073, so I'm marking it as a duplicate.

Revision history for this message
Terence Simpson (tsimpson) wrote :

actually, I'll mark that one as a dup of this

Revision history for this message
Sjoerd Hemminga (sjoerd-hemminga) wrote :

That bug (and it's duplicate bug #283495), are about sending text. This bug is about received text. While those issues may be related, I don't think they are the same.

Revision history for this message
Terence Simpson (tsimpson) wrote :

They are both the same thing, about text being interpreted as HTML by Kopete when it should be interpreted as plain text. That's why I marked it as a duplicate.
There was an option in the KDE3 version of Kopete to disable sending/receiving in HTML format, but this appears to be missing in the KDE4 client.

Revision history for this message
Harald Sitter (apachelogger) wrote :

Configure => Behavior => Chat => Enable rich text by default

deactivate that option and html will not be parsed any longer, at least not on KDE 4.4.

Changed in kdenetwork (Ubuntu):
status: New → Invalid
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.