Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS vulnerability #96

Closed
htadashi opened this issue May 30, 2022 · 6 comments
Closed

XSS vulnerability #96

htadashi opened this issue May 30, 2022 · 6 comments

Comments

@htadashi
Copy link

The XSS vulnerability reported by @augustozanellato in ahrm/chrome-fastread#10 (comment) is also present on Jiffy reader.

@X140Yu
Copy link
Contributor

X140Yu commented May 30, 2022

The Chrome Store version does have this issue, but I tried with the latest master on the poc, and the issue has been fixed, need to furder confirm

@Cveinnt
Copy link
Contributor

Cveinnt commented Jun 1, 2022

I have provided a hackish solution in that discussion, which uses a simple htmlescaper to prevent basic XSS. See more here. Let me know if anyone has a better solution!

@Explosion-Scratch
Copy link
Contributor

I have provided a hackish solution in that discussion, which uses a simple htmlescaper to prevent basic XSS. See more here. Let me know if anyone has a better solution!

Hackish would be making a function that sets innertext of a created element then gets its HTML, regex is not hackish

@asieduernest12
Copy link
Collaborator

@HuiiBuh
Copy link

HuiiBuh commented Jul 19, 2022

I honestly am not even sure if there is a potential for a xss attack.
Something like <script>alert("asdf")script> always gets broken up and ends up like this.
image

In addition to that this regex \p{L} searches for letters.

return sentenceText.replace(/\p{L}+/gu, (word) => {

And as far as I know there is no way to compose an xss attack with only special characters (But I might be wrong on this account) and not a single letter, because everything else (a mix of both) will be replaced with some custom <br-bold> elements in between.

@ansh
Copy link
Owner

ansh commented Nov 30, 2022

Closing as not a concern at the moment.

Any proof of a genuine vulnerability will necessitate a re-opening of this issue.

@ansh ansh closed this as completed Nov 30, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants