Skip to content
  • Categories
  • Recent
  • Popular
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

NodeBB-ActivityPub Bridge Test Instance

hazelnoot@enby.lifeH

hazelnoot@enby.life

@hazelnoot@enby.life
About
Posts
3
Topics
1
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • All Mastodon versions until v4.3.8 and v4.2.21 allow arbitrary user-facing URLs for remote accounts, posts, and media attachments without any verification, which can be used by attackers for XSS attacks.Lol, I raised similar concerns about this behavio...
    hazelnoot@enby.lifeH hazelnoot@enby.life

    @jenniferplusplus@hachyderm.io oh, then maybe I should report that other case as well...

    Uncategorized

  • All Mastodon versions until v4.3.8 and v4.2.21 allow arbitrary user-facing URLs for remote accounts, posts, and media attachments without any verification, which can be used by attackers for XSS attacks.Lol, I raised similar concerns about this behavio...
    hazelnoot@enby.lifeH hazelnoot@enby.life

    @jenniferplusplus@hachyderm.io It used to accept anything, including links to other posts on other instances. It's not spoofing like the vulns we had to fix for sharkey, but spoofing in the sense that you could direct to a phishing link or something.

    Uncategorized

  • All Mastodon versions until v4.3.8 and v4.2.21 allow arbitrary user-facing URLs for remote accounts, posts, and media attachments without any verification, which can be used by attackers for XSS attacks.Lol, I raised similar concerns about this behavio...
    hazelnoot@enby.lifeH hazelnoot@enby.life

    All Mastodon versions until v4.3.8 and v4.2.21 allow arbitrary user-facing URLs for remote accounts, posts, and media attachments without any verification, which can be used by attackers for XSS attacks.
    Lol, I raised similar concerns about this behavior a whole year ago, and people told me I had to be wrong because Mastodon wouldn't make such an obvious oversight ​​

    (my concern was about spoofing / phishing rather than XSS, but it's the same but it code at fault)

    RE: https://mastodon.social/users/MastodonEngineering/statuses/114461656642664237

    Uncategorized
  • Login

  • Login or register to search.
Powered by NodeBB Contributors
  • First post
    Last post
0
  • Categories
  • Recent
  • Popular