-
-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reflected Cross-Site Scripting (XSS) #563
Comments
fix for niccokunzmann#563
This looks like an img tag with Js in it. The error page would show this as a url. I wonder where this is actually exposed to the frontend. I will take more time later to dig into this. |
Found:
It would be safer here to create html elements. Also, the OWC has a different security model than what is there usually. There is no log in, no credentials, nothing private in it. I think, I should describe this in the docs a bit more. And I have a security report to work with in early 2025. That should contain an assessment of this and explain it a bit better. At the moment, this is expected and not a threat and an easy find for security testers. You can also set the js parameter. |
In short: you can do what you want with JavaScript on the subdomain of the open web calendar because
Understand it as static JS (same spec means same code) with a proxy in Python to retrieve the calendars. What you do with JS then only happens where you embed the OWC. So, this is my assumption. You can see that this model is not the usual webservice one where you sign up and so on. |
After #595 is solved, I will publicise the report. Then, you have a proper text to see how this affects users. Also, we could make JS optional. For now, we have fixed the link creation in #590: What are your thoughts on this? Closing Requirement
|
Hi,
i got a security warning from a penetration tester right now and wonder how to fix it. I added
add_header X-XSS-Protection "1; mode=block";
months ago to nginx, but seems not to take proper grip.We're using Polar.sh so you can upvote and help fund this issue. We receive the funding once the issue is completed & confirmed by you. Thank you in advance for helping prioritize & fund our work.
The text was updated successfully, but these errors were encountered: