HTML sanitization issue in MFM posts leading to XSS #280
Labels
No labels
approved, awaiting change
bug
configuration
documentation
duplicate
enhancement
extremely low priority
feature request
Fix it yourself
help wanted
invalid
mastodon_api
needs docs
needs tests
not a bug
planned
pleroma_api
privacy
question
static_fe
triage
wontfix
No milestone
No project
No assignees
2 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: AkkomaGang/akkoma#280
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Floatinghost told me to post it here despite it being a security issue so:
I read this article on a very similar XSS attack in mastodon, which has since been fixed
MFM inputs in the form of:
are being converted into
which, without content security policy enabled, is an XSS.
This does not affect HTML or markdown input, which leaves the input unchanged
would have been weird if this was unique to misskey markdown, since that uses a combination of markdown > html sanitisers
luckily this was purely a FE issue
fixed via 169282ea42a85d0f9da51b206a34210ceca6b99e
aaaand merged into stable
thanks a lot!