-
Notifications
You must be signed in to change notification settings - Fork 67
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Redirection vulnerability #443
Comments
Nice find! However, this is taken care of by the iframe-src CSP. It doesn't work when you view the dweet in the feed or a normal dweet view: https://www.dwitter.net/d/13734 (at least in my browser) dweet.dwitter.net is never meant to be viewed directly, so as long as it only affects direct viewing I don't think this is a problem in practice. |
Still can be used as a free redirection hosting from a https source. It can be used at creating phishing attacks. |
That's a fair point. It's not really a critical bug, but it's unfortunate that people can send real dwitter links that then redirects. If there's a simple fix I'd be happy to implement it, but I'm not too worried. |
There are similar attacks on the same method. It would be better if we block dweets that contain |
I'm skeptic of doing any sort of scanning of the dweet code, since javascript has so many ways to get around simple filters. |
Like in #367 but combined with XSS. CSP doesn't block it.
https://dweet.dwitter.net/id/13734 will redirect to Google
The text was updated successfully, but these errors were encountered: