GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    lainy (lain@lain.com)'s status on Friday, 26-May-2023 17:37:09 JST lainy lainy
    I found out how the attack works, it indeed depends on mediaproxy, so if you don't use it you are safe.

    You are also safe if you add this code to your nginx.

    location ~ ^/(media|proxy) {
    add_header Content-Security-Policy "script-src 'none';";

    Updates and fixes incoming, but this will fix the issue right away. There is a certain aspect of social engineering here, it will not just attack you by seeing an image inside pleroma-fe.
    In conversation Friday, 26-May-2023 17:37:09 JST from lain.com permalink
    • Polychrome :blabcat: likes this.
    • Embed this notice
      lainy (lain@lain.com)'s status on Friday, 26-May-2023 17:39:35 JST lainy lainy
      in reply to
      • 
      @mint yes, i think so
      In conversation Friday, 26-May-2023 17:39:35 JST permalink
    • Embed this notice
       (mint@ryona.agency)'s status on Friday, 26-May-2023 17:39:36 JST  
      in reply to
      @lain What about sandbox CSP? Does it have the same effect as script-src 'none'?
      https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/sandbox
      In conversation Friday, 26-May-2023 17:39:36 JST permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: developer.mozilla.org
        CSP: sandbox - HTTP | MDN
        from MozDevNet
        The HTTP Content-Security-Policy (CSP) sandbox directive enables a sandbox for the requested resource similar to the sandbox attribute. It applies restrictions to a page's actions including preventing popups, preventing the execution of plugins and scripts, and enforcing a same-origin policy.
    • Embed this notice
      lainy (lain@lain.com)'s status on Friday, 26-May-2023 17:50:14 JST lainy lainy
      in reply to
      • 
      @mint tested it and it indeed fixes it
      In conversation Friday, 26-May-2023 17:50:14 JST permalink
    • Embed this notice
      lainy (lain@lain.com)'s status on Friday, 26-May-2023 17:53:17 JST lainy lainy
      in reply to
      • 御園はくい
      @hakui mediaproxy is literally killing people
      In conversation Friday, 26-May-2023 17:53:17 JST permalink
    • Embed this notice
      御園はくい (hakui@tuusin.misono-ya.info)'s status on Friday, 26-May-2023 17:53:18 JST 御園はくい 御園はくい
      in reply to
      @lain no mediaproxy keeps winning :smug1:
      In conversation Friday, 26-May-2023 17:53:18 JST permalink
    • Embed this notice
      「 Fried Fristi 」 (fristi@akkos.fritu.re)'s status on Friday, 26-May-2023 17:54:22 JST 「 Fried Fristi 」 「 Fried Fristi 」
      in reply to
      @lain yuy am safe :akko_fistup:

      Thanks lain :meowHeart:
      In conversation Friday, 26-May-2023 17:54:22 JST permalink
      lainy likes this.
    • Embed this notice
      lainy (lain@lain.com)'s status on Friday, 26-May-2023 18:12:14 JST lainy lainy
      in reply to
      • 
      • 御shp :blobshp:
      @shpuld @mint it's not in the default, i think you might have it because we had this issue in /media, quick-fixed it via nginx, then also added the fix to pleroma directly, but not fixing it for /proxy because that probably didn't exist yet.
      In conversation Friday, 26-May-2023 18:12:14 JST permalink
    • Embed this notice
      御shp :blobshp: (shpuld@shpposter.club)'s status on Friday, 26-May-2023 18:12:15 JST 御shp :blobshp: 御shp :blobshp:
      in reply to
      • 
      @lain @mint I thought that was in default nginx configs already, it was in mine t least. wonder how it got left out by poast
      In conversation Friday, 26-May-2023 18:12:15 JST permalink
    • Embed this notice
      御shp :blobshp: (shpuld@shpposter.club)'s status on Friday, 26-May-2023 18:30:39 JST 御shp :blobshp: 御shp :blobshp:
      in reply to
      • 
      @lain @mint icic, anyway thanks for investigstion and updates, nice to know that we're safe
      In conversation Friday, 26-May-2023 18:30:39 JST permalink
      lainy likes this.
    • Embed this notice
      ringo (ringo@noagendasocial.com)'s status on Friday, 26-May-2023 18:32:51 JST ringo ringo
      in reply to
      • ringo

      @lain @ringo@talk-here.com interesting. so it was an injection attack using a malformed or corrupted file, which was actually a base64 encoded script ?

      In conversation Friday, 26-May-2023 18:32:51 JST permalink
    • Embed this notice
      lainy (lain@lain.com)'s status on Friday, 26-May-2023 18:32:51 JST lainy lainy
      in reply to
      • ringo
      • ringo
      @ringo @ringo no, i'm deliberately unclear here about the exact details because i want to give people a few more hours to add that line to nginx before people with lots of free time start trying to exploit it.

      Generally, the average pleroma user should be safe, even if they use mediaproxy. the likelihood that someone who isn't specifically attacked and tricked into clicking something will trigger this exploit is very low.
      In conversation Friday, 26-May-2023 18:32:51 JST permalink
    • Embed this notice
      Neko McCatface v2023 :verified::makemeneko: (roboneko@bae.st)'s status on Friday, 26-May-2023 20:09:39 JST Neko McCatface v2023 :verified::makemeneko: Neko McCatface v2023 :verified::makemeneko:
      in reply to
      • :apa: スプリットショックウイルス †
      • ✙ dcc :pedomustdie: :phear_slackware:
      @splitshockvirus @dcc @lain @splitshockvirus to prevent remote instances from harvesting metadata on local users who are passively browsing. less leakage is nearly always better
      In conversation Friday, 26-May-2023 20:09:39 JST permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Friday, 26-May-2023 20:09:39 JST 翠星石 翠星石
      in reply to
      • Neko McCatface v2023 :verified::makemeneko:
      @roboneko >to prevent remote instances from harvesting metadata on local users who are passively browsing
      That is why you use Tor Browser - you can browse whatever you want and all the remote instances can see that is that someone is using Tor.
      In conversation Friday, 26-May-2023 20:09:39 JST permalink
    • Embed this notice
      ✙ dcc :pedomustdie: :phear_slackware: (dcc@annihilation.social)'s status on Friday, 26-May-2023 20:09:40 JST ✙ dcc :pedomustdie: :phear_slackware: ✙ dcc :pedomustdie: :phear_slackware:
      in reply to
      • :apa: スプリットショックウイルス †
      @splitshockvirus @lain i still dont get why anyone would put that on
      In conversation Friday, 26-May-2023 20:09:40 JST permalink

      Attachments


      1. https://annihilation.social/media/aa04846d12795e81c39141e209e5018d7d7cd5fabf314aaf87136ea6ffae2c84.gif
    • Embed this notice
      ✙ dcc :pedomustdie: :phear_slackware: (dcc@annihilation.social)'s status on Friday, 26-May-2023 20:09:41 JST ✙ dcc :pedomustdie: :phear_slackware: ✙ dcc :pedomustdie: :phear_slackware:
      in reply to
      • :apa: スプリットショックウイルス †
      @lain cc @splitshockvirus non media proxy bros we keep winning :dude_smug:
      In conversation Friday, 26-May-2023 20:09:41 JST permalink
    • Embed this notice
      :apa: スプリットショックウイルス † (splitshockvirus@mstdn.starnix.network)'s status on Friday, 26-May-2023 20:09:41 JST :apa: スプリットショックウイルス † :apa: スプリットショックウイルス †
      in reply to
      • かき@GNUsocialJP
      • ✙ dcc :pedomustdie: :phear_slackware:

      @dcc @lain so it would seem

      In conversation Friday, 26-May-2023 20:09:41 JST permalink

      Attachments


      1. https://mstdn.starnix.network/system/media_attachments/files/110/434/082/299/728/051/original/3de042659ce38a00.jpg
    • Embed this notice
      feld (feld@bikeshed.party)'s status on Saturday, 27-May-2023 01:25:00 JST feld feld
      in reply to
      If you use Varnish:

      sub vcl_backend_response {
      if (bereq.url ~ "^/proxy/") {
      set beresp.http.Content-Security-Policy = "sandbox";
      }
      }


      Also clear your MediaProxy cache, because serving the cached variant will have the old header without the CSP rule
      In conversation Saturday, 27-May-2023 01:25:00 JST permalink
      lainy likes this.
    • Embed this notice
      feld (feld@bikeshed.party)'s status on Saturday, 27-May-2023 03:25:10 JST feld feld
      in reply to
      • clemenceau
      your-domain.com {
      # Your existing configuration here

      route /specific-path* {
      header /custom-header "Custom-Header-Value"
      }
      }


      this was sourced from ChatGPT but looks like something I've done before.
      In conversation Saturday, 27-May-2023 03:25:10 JST permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        http://ww25.your-domain.com/?subid1=20230527-0425-1271-87c0-56b3f407a116
    • Embed this notice
      clemenceau (clemenceau@cutewaifu.enjoyer.network)'s status on Saturday, 27-May-2023 03:25:12 JST clemenceau clemenceau
      in reply to
      • feld

      @lain @feld thanks for this. Any idea what a similar directive for Caddy be? This is the relevant section of their docs:

      https://caddyserver.com/docs/caddyfile/directives/header

      In conversation Saturday, 27-May-2023 03:25:12 JST permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.