Use the glide.ui.security.allow_codetag property to disable support for embedding HTML code created using the [code] tag.

Disable support for displaying HTML code embedded using the [code] tag. This tag allows rendered HTML to display in journal fields and may lead to cross-site scripting (XSS) attacks. These attacks can enable foreign scripts to execute on a user session in the logged in browser's context. Attackers can use these scripts to steal session information and sensitive data. The HTML language was not designed to separate script from formatting, so allowing user-controlled HTML in any system has inherent risk.

Setting the glide.ui.security.codetag.allow_script to false is compliant, and significantly reduces this risk, however some small risk remains. It disables only the script portion of a code tag, and relies on sanitizing all known conventions of script in the HTML.

Set the glide.ui.security.allow_codetag system property to false to completely prohibit journal fields and forms from displaying rendered HTML.

The ServiceNow AI Platform mitigates many injection and cross-site attacks by implementing escaping and encoding techniques. As a result, users can't write/submit HTML formatted inputs for journal fields. But journal fields can render text enclosed within code tags as HTML.
  • However, there is an associated security risk. If set to true, malicious users can write harmful HTML JS code that may be executed on a different client browser after rendering of journal fields.
  • Set this property to false so that administrators can prevent journal fields from rendering HTML code by disabling support for the [code] tag.

More information