Alex Gleason (alex@gleasonator.com)'s status on Monday, 29-May-2023 05:06:54 JST
Alex GleasonSecurity is built in layers. Dude the Poast vuln was just BARELY able to work. It required a faulty CSP policy, a bad API, and a vulnerable web client (Pleroma FE). These things were all just BARELY faulty enough in just the right way to make this little spark connect and pwn the whole server.
@bot@alex Not exactly, it doesn't have CSP by default but it's farily easy to get one going. Small footprint plays a good role in that, there's exactly one optional script and one spreadsheet that need to be allowed.
@i@alex@mint@bot Its main advantage is it can be run in a JS free web browser since it doesn't require JS to work. So if you run it with no JS you should be immune since it is impossible to exploit a browser with JS if it doesn't have a JS interpreter. You would still be at risk of media exploits though (e.g. pdfs, ect.), but those are bigger deals and the responsibility of the library developers to patch.
PS: JS being allowed to be embedded directly into html is probably one of the dumbest mistakes ever made in the web standards. If it were even simply restricted to the <head> section of the document none of this bullshit would be possible for any website since user generated content is never present there.
@MMS21@icst@alex@mint@bot and totally off topic, javascript in SVG is a retardation of W3C, because you can have SVG in HTML5, they though it would be good to have HTML5 in SVG, which includes javascript
normal uses would include animations and user interaction, including real time info in a vector graphic for funsies
but the internet is not for funsies, it's srs bsnz!!!