Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remaining theoretical attacks #40

Closed
3 tasks done
rugk opened this issue Jul 18, 2016 · 9 comments
Closed
3 tasks done

Remaining theoretical attacks #40

rugk opened this issue Jul 18, 2016 · 9 comments

Comments

@rugk
Copy link
Member

rugk commented Jul 18, 2016

So here the remaining issues of the security audit:

  • 4.2. urls2links XSS
  • 4.5. Is SJCL used correctly?
  • 4.6. Possible XSS in tpl/page.html

I mark this issue as "help wanted", so if anyone wants to look into this, feel free to do this. All of them are very theoretical and are therefore not serious.
If any issues may get obsolete (because the underlying system is changed, such as 4.5 when #28 is implemented, please also tick the issue).

@elrido elrido changed the title Remaining thoretical attacks Remaining theoretical attacks Jul 18, 2016
@rugk
Copy link
Member Author

rugk commented Jul 31, 2016

As RainTPL has been removed is 4.6. still relevant?

@elrido
Copy link
Contributor

elrido commented Jul 31, 2016

All the returned variables currently get encoded/escaped, so I still consider this fixed.

Of course custom templates could have flaws, as the template creators needs to take care of the the escaping, too. We could move the escaping into the main PrivateBin class, then template creators don't have to mind and we reduce code duplication.

@rugk
Copy link
Member Author

rugk commented Jul 31, 2016

Okay, so for now I ticked 4.6.

@rugk
Copy link
Member Author

rugk commented Aug 10, 2016

Anything to do about "4.5."? Basically we can only write to the authors of SJCL.

@elrido
Copy link
Contributor

elrido commented Aug 10, 2016

We could do that, but really... Just compare our implementation (its these 10 lines) with the example given on their homepage and the details on the encrypt function in the API docs. There is really not much one could do wrong, is there?

@rugk
Copy link
Member Author

rugk commented Aug 11, 2016

I also think most issues may only be made with the parameters passed to SJCl and this would not be an "incorrect use of SJCL". So I tick this box too.

@rugk
Copy link
Member Author

rugk commented Aug 11, 2016

Okay, actually I found some things which are not clear to me there. I'll open a new issue for that.

@rugk
Copy link
Member Author

rugk commented Aug 11, 2016

So here it is: #74

Now we also really fixed 4.5.

@elrido
Copy link
Contributor

elrido commented Feb 22, 2017

Regarding 4.2: The only allowed protocols in the urls2link code are http, https, ftp and magnet. As these are hardcoded XSS that uses "javascript:" or hides the use of the same would not trigger URLs to be created.

@elrido elrido closed this as completed Feb 22, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants