Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HTML sanitizer for dashboard_info.js #5652

Closed
cakrit opened this issue Mar 15, 2019 · 6 comments
Closed

HTML sanitizer for dashboard_info.js #5652

cakrit opened this issue Mar 15, 2019 · 6 comments
Assignees
Labels
area/web priority/high Super important issue
Projects

Comments

@cakrit
Copy link
Contributor

cakrit commented Mar 15, 2019

Feature idea summary

Use HTML sanitizer when loading dashboard_info.js to prevent https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9834

Expected behavior

Prevent HTML injection when importing a snapshot

@gmosx gmosx added this to the v1.14-rc0 milestone Mar 15, 2019
@gmosx gmosx added this to To do in Web GUI via automation Mar 15, 2019
@gmosx gmosx added the priority/high Super important issue label Mar 17, 2019
gmosx pushed a commit to gmosx/netdata that referenced this issue Mar 17, 2019
@gmosx gmosx removed this from the v1.14-rc0 milestone Mar 28, 2019
@gmosx
Copy link
Contributor

gmosx commented Mar 28, 2019

The sanitizer was added but it doesn't help to resolve the original issue, as dashboard.js contains JavaScript.

@gpapamathND gpapamathND assigned VLegakis and unassigned gmosx Jun 25, 2019
@hmh
Copy link

hmh commented Jul 12, 2019

Some software distributions apparently read the CVE text as in "bug existed only up to 0.13.x and is fixed on newer releases"...

However, from the CVE text and also the contents of this issue, I understand that the security problem is still unfixed.

Is that correct?

@hmh hmh mentioned this issue Jul 12, 2019
@hmh
Copy link

hmh commented Jul 12, 2019

issue #5800 probably should be reopened and linked to this one... Mentioning it here as well so that it is better cross-referenced in github.

@cakrit
Copy link
Contributor Author

cakrit commented Jul 12, 2019

We should have written more here. We went into great detail regarding this and we really can't prevent it. It's why the statement "Snapshot files contain both data and javascript code. Make sure you trust the files you import!" is right next to the Import button. We can make the font bigger/use a different colour, or throw an alert each time, but not much more than that. The responsibility rests with the user to import a trusted file.

@hmh
Copy link

hmh commented Jul 12, 2019

That's a fair mitigation, I suppose. That information was just not easily to get to from a CVE search, which your reply just addressed. I will mention it also on #5800, since people coming from security trackers and web searches are likely to land there.

Thanks!

@cakrit
Copy link
Contributor Author

cakrit commented Jul 13, 2019

Much appreciated @hmh
I did a request to CVE, see if they can include the link to that issue. Not sure how it works.
Closing this one, perhaps someone will ask to make the notification more noticeable in the future.

@cakrit cakrit closed this as completed Jul 13, 2019
Web GUI automation moved this from To do to Done Jul 13, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/web priority/high Super important issue
Projects
No open projects
Web GUI
  
Done
Development

No branches or pull requests

4 participants