-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTML tags not rendered anymore? #1672
Comments
https://github.com/jch/html-pipeline/blob/master/lib/html/pipeline/sanitization_filter.rb |
If someone has another idea, let me know. |
two additions would be nice - allowing the style attribute ( |
If it's fine to allow |
https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet I've tried all attacks using |
@Rokt33r any chance of allowing the style tag and not just attribute? |
@emrusso I couldn't find any problem from |
@Rokt33r This would be a candidate for #1644 (comment) |
@Redsandro @Rokt33r I am going to have to disagree with the comment that I don't disagree with OWASP's advice in theory. If a user can control the stylesheet of your website, they can indeed cause all sorts of chaos. Something as simple as Perhaps a "global stylesheet" would be a nice feature - though, this is kind of what themes are already. More of a user-specific one. Thanks again to you both for the awesome improvements to the security of the app. I spent a few hours yesterday banging on it for a new XSS vector and came up empty. Awesome work! Now it's just about tweaking things to make sure everyone has the features they need while also doing what we can to keep them from shooting themselves in the foot. |
Yes, I'm divided between what I know is right and the amount of annoyance it causes. I think people would be more understanding if someones computer was actually compromised in some dramatic way. After all, most people prefer to share notes using Dropbox or some other cloud. Pretty much all cloud storages have been hacked in different ways. Google Drive. Dropbox. iCloud. They have all been breached in the past. And Electron is compromised every other month. This means although we see no vector while trying out known XSS exploits now, it could be a matter of time before a new one is found specific to Electron, and can be exploited. It's hard to win here without implementing danger as a choice as in #1644; otherwise people are going to be upset either way. I'd vote against style-tags and style-attributes being available without first explicitly opting-in through the Boostnote options as proposed in #1644 (comment). Until such possibilities are implemented, I'd say stick with 0.10 at your own risk. <instant update> I mean to the people who find the current restrictions unacceptable and need an immediate fix. I don't mean you personally. </> With that said, I'll leave it in the capable hands of @Rokt33r to make a final verdict. |
Cross-post #1644 (comment)
|
@Redsandro I definitely respect your conservative approach to the security of the product, especially since I am almost always dealing with the opposite! I agree about Electron - it almost feels like the Adobe Flash of 2018 with the various security issues related to it, haha. While, sure, it is possible that an XSS vulnerability in Chrome that allows for XSS via CSS could be discovered, this would be a HUGE deal. To my knowledge, Chrome has never allowed JS to be executed via CSS, and no such vector has existed in any modern browser for quite a number of years. There are a lot more high value targets out there that would be picked on first before Boostnote (fortunately for Boostnote!) if such an attack vector was discovered. All I am really trying to do here is describe the risk as accurately as possible. I am not personally advocating that allowing arbitrary CSS is 100% safe, but rather - if we allow style attributes, I think we should allow the style tag just to save people the pain of using inline styles. The attack surface is the same. Blocking both is another story. I personally feel just as safe with arbitrary styles being allowed as I do with links being added (even if it's part of MD, I found some potential issues that I will share when I get some time). I understand that a lot of notes are stored on dropbox (or similar), but we should also keep in mind that that such an attack would require a very advanced attacker and/or be heavily targeted. If I had access to your dropbox and wanted to take over your computer, I'd definitely look for executables first before finding a 0-day in a relatively small (but growing!) product. You know what I mean? It's not that your concern is crazy, it's just that I think the likelihood is very low due to all the moving pieces. It'd be different if there was an easy/known way of getting XSS/RCE (like before). Sorry for being sooooo wordy! I know some of this probably belongs in another thread, but it's all kinda related. |
@pmood In an attempt to summarize your case, I think you are saying the same things as in your previous message.
My position is the following.
And the solution is an option so that users may opt-in to these as proposed in #1644 (comment) |
It sounds reasonable.👍 |
I'm going to make everything optional today. Sorry for being late. |
I think since last update HTML tags are not rendered anymore. is that by design? Currently running Version 0.11.1 (0.11.1) on Mac OS High Sierra 10.13.3 (17D102)
Exporting it to HTML gives this output. All tags are stripped.
test.txt
The text was updated successfully, but these errors were encountered: