Skip to content
  • Categories
  • Recent
  • Popular
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

NodeBB-ActivityPub Bridge Test Instance

  1. Home
  2. Categories
  3. Uncategorized
  4. All Mastodon versions until v4.3.8 and v4.2.21 allow arbitrary user-facing URLs for remote accounts, posts, and media attachments without any verification, which can be used by attackers for XSS attacks.Lol, I raised similar concerns about this behavio...

All Mastodon versions until v4.3.8 and v4.2.21 allow arbitrary user-facing URLs for remote accounts, posts, and media attachments without any verification, which can be used by attackers for XSS attacks.Lol, I raised similar concerns about this behavio...

Scheduled Pinned Locked Moved Uncategorized
5 Posts 2 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • hazelnoot@enby.lifeH This user is from outside of this forum
    hazelnoot@enby.lifeH This user is from outside of this forum
    hazelnoot@enby.life
    wrote last edited by
    #1

    All Mastodon versions until v4.3.8 and v4.2.21 allow arbitrary user-facing URLs for remote accounts, posts, and media attachments without any verification, which can be used by attackers for XSS attacks.
    Lol, I raised similar concerns about this behavior a whole year ago, and people told me I had to be wrong because Mastodon wouldn't make such an obvious oversight ​​

    (my concern was about spoofing / phishing rather than XSS, but it's the same but it code at fault)

    RE: https://mastodon.social/users/MastodonEngineering/statuses/114461656642664237

    jenniferplusplus@hachyderm.ioJ 1 Reply Last reply
    0
    • hazelnoot@enby.lifeH hazelnoot@enby.life

      All Mastodon versions until v4.3.8 and v4.2.21 allow arbitrary user-facing URLs for remote accounts, posts, and media attachments without any verification, which can be used by attackers for XSS attacks.
      Lol, I raised similar concerns about this behavior a whole year ago, and people told me I had to be wrong because Mastodon wouldn't make such an obvious oversight ​​

      (my concern was about spoofing / phishing rather than XSS, but it's the same but it code at fault)

      RE: https://mastodon.social/users/MastodonEngineering/statuses/114461656642664237

      jenniferplusplus@hachyderm.ioJ This user is from outside of this forum
      jenniferplusplus@hachyderm.ioJ This user is from outside of this forum
      jenniferplusplus@hachyderm.io
      wrote last edited by
      #2

      @hazelnoot So if I understand correctly, mastodon used to accept relative URLs in federated objects?

      That does seem like a spoofing vector. I'm not sure I see the XSS risk, though

      hazelnoot@enby.lifeH 1 Reply Last reply
      0
      • jenniferplusplus@hachyderm.ioJ jenniferplusplus@hachyderm.io

        @hazelnoot So if I understand correctly, mastodon used to accept relative URLs in federated objects?

        That does seem like a spoofing vector. I'm not sure I see the XSS risk, though

        hazelnoot@enby.lifeH This user is from outside of this forum
        hazelnoot@enby.lifeH This user is from outside of this forum
        hazelnoot@enby.life
        wrote last edited by
        #3

        @jenniferplusplus@hachyderm.io It used to accept anything, including links to other posts on other instances. It's not spoofing like the vulns we had to fix for sharkey, but spoofing in the sense that you could direct to a phishing link or something.

        jenniferplusplus@hachyderm.ioJ 1 Reply Last reply
        0
        • hazelnoot@enby.lifeH hazelnoot@enby.life

          @jenniferplusplus@hachyderm.io It used to accept anything, including links to other posts on other instances. It's not spoofing like the vulns we had to fix for sharkey, but spoofing in the sense that you could direct to a phishing link or something.

          jenniferplusplus@hachyderm.ioJ This user is from outside of this forum
          jenniferplusplus@hachyderm.ioJ This user is from outside of this forum
          jenniferplusplus@hachyderm.io
          wrote last edited by
          #4

          @hazelnoot I'm just reading through the patch, and it seems to me that the only change is to require that object urls are rooted with an http(s) scheme. So I'm not sure that it really mitigates that particular vector for being misleading.

          hazelnoot@enby.lifeH 1 Reply Last reply
          0
          • jenniferplusplus@hachyderm.ioJ jenniferplusplus@hachyderm.io

            @hazelnoot I'm just reading through the patch, and it seems to me that the only change is to require that object urls are rooted with an http(s) scheme. So I'm not sure that it really mitigates that particular vector for being misleading.

            hazelnoot@enby.lifeH This user is from outside of this forum
            hazelnoot@enby.lifeH This user is from outside of this forum
            hazelnoot@enby.life
            wrote last edited by
            #5

            @jenniferplusplus@hachyderm.io oh, then maybe I should report that other case as well...

            1 Reply Last reply
            0
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Login or register to search.
            Powered by NodeBB Contributors
            • First post
              Last post
            0
            • Categories
            • Recent
            • Popular