From ec211f5849ee6f956bb0ffc95c2b0bd362be386e Mon Sep 17 00:00:00 2001 From: Dev Date: Wed, 5 Jun 2024 15:13:10 -0700 Subject: [PATCH] Fixed jquery-ujs vulnerbility issue --- src/rails.js | 20 ++------------------ 1 file changed, 2 insertions(+), 18 deletions(-) diff --git a/src/rails.js b/src/rails.js index 0e27110..6e7a714 100644 --- a/src/rails.js +++ b/src/rails.js @@ -212,24 +212,8 @@ // Handles "data-method" on links such as: // Delete - handleMethod: function(link) { - var href = rails.href(link), - method = link.data('method'), - target = link.attr('target'), - csrfToken = rails.csrfToken(), - csrfParam = rails.csrfParam(), - form = $('
'), - metadataInput = ''; - - if (csrfParam !== undefined && csrfToken !== undefined && !rails.isCrossDomain(href)) { - metadataInput += ''; - } - - if (target) { form.attr('target', target); } - - form.hide().append(metadataInput).appendTo('body'); - form.submit(); - }, + // Handles "data-method" on links such as: +// Delete // Helper function that returns form elements that match the specified CSS selector // If form is actually a "form" element this will return associated elements outside the from that have