[bug] Javascript insertion via media Vulnerability #547
Labels
No labels
approved, awaiting change
bug
configuration
documentation
duplicate
enhancement
extremely low priority
feature request
Fix it yourself
help wanted
invalid
mastodon_api
needs docs
needs tests
not a bug
planned
pleroma_api
privacy
question
static_fe
triage
wontfix
No milestone
No project
No assignees
3 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: AkkomaGang/akkoma#547
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This vulnerability was discovered today.
Sorry this may not be the right place to put this.
This is my first created issue around here.
[bug]to [bug] Javascript Vulnerabilityfix applied and released
My understanding is that the
sandbox
directive should have been fine, since it forbids JS execution. It's actually a bit stronger thanscript-src
, as it forbids scripts from running even if they bypass CSP fetch directives (e.g. scripts injected by the user-agent).The most bulletproof CSP for media would be this:
(if you wanna go overkill, use
base-uri 'none'; form-action 'none'
. Shouldn't be necessary for static media and SVGs with the secure static processing mode enforced by theimg
element).This would prevent anything from loading except the single media resource.
Other instances that load something more advanced (e.g. ruffle.rs flash animations) or support hotlinking could also request browsers to use strict origin isolation:
I don't know Elixir but this doesn't seem too hard; I could draft a PR if you're interested.
Some new information...
Might need to reopen.
luckily we don't rely on a one-line nginx modification
we tightened csp way back in
336d06b2a8
, which pleroma (and soapbox by extension) never got around to doing afaik(also, for the love of christ do not link gleasonator here, this entire place pretty much exists to get away from that idiot)
[bug] Javascript Vulnerabilityto [bug] Javascript insertion via media Vulnerabilityhek ya, sun. I am going to trust that this vulnerability does not affect Akkoma users anymore, then.
My mistake. I edited my reply.
the HTML sanitisation issue from pleroma has been pulled in though - that is in release v3.9.3 (just out)
i think that's everything
Oneric referenced this issue2024-05-07 00:22:42 +00:00