Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mask referrer field when creating OEMBED attachments #3860

Closed
Sing-Li opened this issue Jul 25, 2016 · 6 comments · Fixed by #21987
Closed

Mask referrer field when creating OEMBED attachments #3860

Sing-Li opened this issue Jul 25, 2016 · 6 comments · Fixed by #21987
Assignees
Labels
Milestone

Comments

@Sing-Li
Copy link
Member

Sing-Li commented Jul 25, 2016

There are some security sensitive applications where the REFERRER field of the request issued by our OEMBED outreach can be used to identify the source absolutely (and becomes a security risk).

Allow a redirector (or some sort of proxy) to be specified in order to mask the REFERRER field of the outreach request.

@Sing-Li Sing-Li changed the title Mask referrer fields when creating OEMBED attachments Mask referrer field when creating OEMBED attachments Jul 25, 2016
@MartinSchoeler MartinSchoeler added this to the Nice-to-Have milestone Aug 8, 2016
@MartinSchoeler
Copy link
Contributor

MartinSchoeler commented Aug 8, 2016

@Sing-Li Was it a request from Radically Open Security? Or it was just an idea?

@Sing-Li
Copy link
Member Author

Sing-Li commented Aug 8, 2016

@MartinSchoeler Why does it matter? It is an idea from Radically Open Security, our security consultancy partner.

@engelgabriel
Copy link
Member

@Sing-Li, we just wanted to check the priority... If this was a production problem already or a nice-to-have.

@ghost
Copy link

ghost commented Oct 4, 2017

@engelgabriel @Sing-Li I think we have a severe security issue here. This is how it looks on the server who hosts the attachement when someone clicks on an attachement.

151.xxx.xxx.xxx - - [04/Oct/2017:08:59:55 +0200] "GET /pics/test-1.jpg HTTP/1.1" 200 27142 "https://rocketchat.domain.de/direct/<actual_username>" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Rocket.Chat+/2.9.0 Chrome/58.0.3029.110 Electron/1.7.6 Safari/537.36"

So as you can see, at least the username and the channel name is leaked.

Maybe the rocketchat server itself could act as proxy?

thanks and cheers

@yahesh
Copy link

yahesh commented Nov 21, 2017

Hi, we have the same problem. Will this be fixed anytime soon?

@theorenck
Copy link
Contributor

We're decided to go with the "act as a proxy", solution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

8 participants