-
-
Notifications
You must be signed in to change notification settings - Fork 165
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Self-attack vulnerabilities] possibilities/list #57
Comments
I'm trying to think of a reason to counter myself and ask should we remove SVG uploading functionality and why?
Please share your opinion on this topic.
|
Added additional warning for uploading SVG's on the WonderCMS download page. Here's the safety tips:
|
Better: generate a random password from start so in the (likely) event that the user doesn't change the password, it's different on all installs. |
@NicolasCARPi since WonderCMS doesn't pick up the users email, we would still have to display the password on the users home page. This would however prevent any automated attacks with the default password. |
Closing this thread, create a seperate wiki page: https://github.com/robiso/wondercms/wiki/%5BSelf-attack-vulnerabilities%5D-possibilities-list |
The bugs below work only if an admin is logged and is tricked into pasting JavaScript code or uploading SVG's
WonderCMS comes with some security features and some responsibilities.
1. A logged-in user (admin) can execute JavaScript anywhere on their website.
2. A logged in user can upload a SVG (containing code other than an image, such as JavaScript).
3. Host header attack.
How to prevent self-attack vulnerabilities
- Install themes and plugins only from wondercms.com
The list above is subject to change. All discussions are welcome.
Reporting the above issues/bugs/vulnerabilities will not include you in the WonderCMS reward system.
The text was updated successfully, but these errors were encountered: