Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Announcement: About CVE-2021-25987 #4838

Open
SukkaW opened this issue Dec 14, 2021 · 1 comment
Open

Announcement: About CVE-2021-25987 #4838

SukkaW opened this issue Dec 14, 2021 · 1 comment

Comments

@SukkaW
Copy link
Member

SukkaW commented Dec 14, 2021

Hexo team is already aware of the CVE-2021-25987, and we have already implemented a fix five months ago (See PR #4743). However, we will not release a minor version including the fix. The fix will be included in the next major version of Hexo (which will be 6.0.0).

The fix (which will enable HTML entities escaping by default) is considered as a breaking change and we notice that it could break many current themes.

Also, you should be aware that Hexo is only a static site generator. It only generates static HTML from the source from your local computer (or your server).

It is impossible for anyone other than you to modify your hexo theme or your blog post without physical access to your computer or login to your server. That's to say, in order to perform an attack based on the CVE-2021-25987, the hacker will have to hack into your computer or your server to modify your blog posts. But if that really happens (your local computer or server being compromised), the hacker can basically do anything anyway.

If you host the source code of your Hexo site on a server and use some kind of web editor (like hexo-editor), it might be possible for hackers to modify your post through such a web editor (without login to your server). We recommend you to use some kind of authentication to protect your web editor (which you should always have even without this CVE. You don't want anybody to modify your post, right?). hexo-editor we mentioned earlier has a built-in username & password configuration in the first day so you will not be affected if you have set a strong password.

In short, the CVE is not a Stored-XSS or a Reflect-XSS. It is a Self-XSS (Your XSS yourself, or a hacker to hack into your computer or server to perform the XSS attack). And your website will work flawlessly and sound even without we release a fix.

@SukkaW SukkaW pinned this issue Dec 14, 2021
This was referenced Dec 14, 2021
@github-actions

This comment was marked as outdated.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant