Life In 19x19 http://prod.lifein19x19.com/ |
|
EidoGo Security Vulnerability Alert http://prod.lifein19x19.com/viewtopic.php?f=9&t=11940 |
Page 1 of 3 |
Author: | YeGO [ Sun Jun 14, 2015 3:39 pm ] |
Post subject: | EidoGo Security Vulnerability Alert |
Public Security Announcement to WebMasters using EidoGo EidoGo contains cross-site scripting (XSS) security vulnerabilities If you are using EidoGo as an embedded SGF player on your website, your site may be susceptible to these security vulnerabilities, particularly if your site supports uploading SGF files that are then displayed to other users via EidoGo. You can read more about this issue in the below GitHub issue report. https://github.com/jkk/eidogo/issues/27 You can also read more about what cross-site scripting is on this website: http://excess-xss.com Note: this is the public disclosure following a two-month period after the developer was first privately notified of this issue. One month ago, the webmasters of several websites (including L19x19) were notified to allow them to address this security issue in advance of wider public disclosure. |
Author: | Bonobo [ Wed Feb 10, 2016 10:12 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
Since I see links to EidoGo all the time … is there any news about this? |
Author: | Javaness2 [ Wed Feb 10, 2016 3:46 pm ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
No |
Author: | Uberdude [ Thu Feb 11, 2016 2:48 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
It appears the eidogo plugin on L19 has patched this vulnerability: |
Author: | Jhyn [ Thu Feb 11, 2016 7:53 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
YeGO wrote: Public Security Announcement to WebMasters using EidoGo Thank you for the time and efforts you spent for our benefit and your responsible approach to disclosure. |
Author: | fanfan [ Fri Feb 12, 2016 3:44 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
I am the author of maxiGos (http://jeudego.org/maxiGos/index.php?lang=en) which is a sgf web player similar to eidogo. MaxiGos has not this vulnerability. Maybe this can help people that cannot patch eidogo easily themselves. |
Author: | RobertJasiek [ Fri Feb 12, 2016 8:05 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
How to avoid the vulnerability as the programmer? |
Author: | uPWarrior [ Fri Feb 12, 2016 8:33 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
Are you asking from the point of view of someone who develops eidogo-like applications, or from the perspective of someone who includes eidogo in their own website? I.e., is this about preventing XSS or about going around it in a case like this? |
Author: | Uberdude [ Fri Feb 12, 2016 8:50 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
RobertJasiek wrote: How to avoid the vulnerability as the programmer? There's a lot of details and quirks, but it basically comes down to encoding things properly: if the user gives you some text don't give it verbatim to a browser which will interpret it as html. https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet |
Author: | fanfan [ Fri Feb 12, 2016 9:57 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
As a programmer, here are a couple of relatively simple things you can do: 1st possibility: When parsing sgf data, remove html tag if any. The drawback is that some information will be lost. Some strings like <a> will be erased during the process even if they were not actually html tags (in the author mind). Note that removing <script> tags only is not enough since some javascript can be inserted as value of event attributes in other tags such as img (but not only). Note that some authors included such (non malicious) tags in sgf properties especially in C property to format the text or to display a link. But in theory, there is nothing in sgf specs that mention that sgf players have to render such html code as html. If you want to keep these tags, you have to use more sophisticated parsing methods. 2nd possibility: Before displaying sgf data (i.e. when using document.write() or document.getElementById(id).innerHTML=... or any other methods that render html in a page), replace html entities by their html equivalent (i.e < replaced by <, > replaced by >, & replaced by &, ...). In practice, replacing only < and > probably could do the job. The drawback is that the tags will be displayed as is, and sometimes, this can be unwanted. For instance, if an author used a <b>...</b> tag to add a bold effect on a text, the <b> and </b> will be visible in the text by the end user. There are many other possibilities. Everything is possible. EDIT: and of course, never use eval() javascript function on sgf data as is, and remove any data in sgf that does nothing (such as characters before the first parenthesis). |
Author: | RobertJasiek [ Fri Feb 12, 2016 11:13 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
Uberdude, fanfan, thank you. uPWarrior, I ask to better understand surfing risks, webpage management, responsibility of webpage managers and as a potential programmer. |
Author: | YeGO [ Tue Apr 05, 2016 5:10 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
Bonobo wrote: Since I see links to EidoGo all the time … is there any news about this? EidoGo appears to be an abandoned project. My issue report and pull request (patch submission) still remain open and unacknowledged by the developer. The last I heard from the developer was on May 5, 2015, where he simply said via email "A pull request on github would be much appreciated. Thanks". EidoGo.com remains vulnerable. http://eidogo.com/#AKilSuG4 Several websites (including LifeIn19x19.com) were notified prior to the public disclosure. The following sites have incorporated the patch to fix the vulnerability: https://forums.online-go.com/ https://gtl.xmp.net/ http://gokifu.com/ LifeIn19x19.com continues to use the vulnerable version of EidoGo. |
Author: | DrStraw [ Tue Apr 05, 2016 5:27 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
Does this just affect material read on the site or does it have potential to corrupt the users machine? |
Author: | uPWarrior [ Tue Apr 05, 2016 5:56 am ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
It has the potential to corrupt the users machine, but I would think that unlikely. The potential exists. A XSS vulnerability allows an attacker to run arbitrary javascript code on the user's browser. This implies that any information on the website can be modified/accessed (e.g. authentication tokens that could allow an attacker to pose as the user on that website), but in principle it shouldn't affect the user's machine itself. However, vulnerabilities on web browsers sometimes allow permissions to escalate and arbitrary machine code to be executed (e.g., Remote code execution in IE10, Execute Code-vulnerabilities in Chrome, etc.). While these remote-code executions typically require an user to view a specifically crafted webpage, if an attacker is able to run scripts on a remote host (e.g., lifein19x19), then no amount of common sense can protect the end user. I think this is unlikely because it would require a) a random attacker to target eidogo, b) a knowledgeable attacker to target a site where XSS is possible (e.g., this site), c) unpatched browsers. I don't think this is a tempting enough target given the amount of work required, but is it possible? I would say definitely. |
Author: | Bonobo [ Tue Apr 05, 2016 2:12 pm ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
Thanks for your efforts, YeGo! YeGO wrote: EidoGo appears to be an abandoned project. My issue report and pull request (patch submission) still remain open and unacknowledged by the developer. The last I heard from the developer was on May 5, 2015, where he simply said via email "A pull request on github would be much appreciated. Thanks". ![]() If it has been abandoned, couldn’t you then just grab it and make “ZweidoGo” out of it? (“eins” is German for “one”, “zwei” is German for “two” ![]() Would there be moral objections? Or would it rather be technical problems? (I understand nothing of these things.) Quote: EidoGo.com remains vulnerable. http://eidogo.com/#AKilSuG4 Several websites (including LifeIn19x19.com) were notified prior to the public disclosure. The following sites have incorporated the patch to fix the vulnerability: https://forums.online-go.com/ https://gtl.xmp.net/ http://gokifu.com/ ![]() Quote: LifeIn19x19.com continues to use the vulnerable version of EidoGo. ![]() Quote: [sgf … /sgf] Nicely done ![]() For our L19 Thanks for the edutainment ![]() |
Author: | sybob [ Tue Apr 05, 2016 2:54 pm ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
uPWarrior wrote: It has the potential to corrupt the users machine, but I would think that unlikely. The potential exists. ... I think this is unlikely because it would require a) a random attacker to target eidogo, b) a knowledgeable attacker to target a site where XSS is possible (e.g., this site), c) unpatched browsers. I don't think this is a tempting enough target given the amount of work required, but is it possible? I would say definitely. Well, it may be unlikely, but I am not interested in likelyhood and probabilities, and want to know what it means to me in my actual situation. Chances about recovery from a disease may be true, but if I'm the patient, I wonder what it does TO ME, having a 50/50 chance of recovery or not. And because I operate in a very delicate line of business, I don't like this very much. AT ALL! More exotic targets than go players were under attack. But if you don't know the user base of this forum, extensive and in detail, this still sounds to me to be a major thing. |
Author: | sybob [ Tue Apr 05, 2016 2:58 pm ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
Bonobo wrote: For our L19 Thanks for the edutainment ![]() Kosmonaut has been very busy developing his web go board, which is very much appreciated. Perhaps because of that, he still has not been able to answer some vulnerability/security questions I asked him long time ago. |
Author: | sybob [ Tue Apr 05, 2016 3:04 pm ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
Does this vulnerability occur if you just browse this forum? Or is it necessary that Eidogo runs within the browser (either from within this site or as a separate instance) for this vulnerability to become apparent? Anyone knows? |
Author: | sybob [ Tue Apr 05, 2016 3:09 pm ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
uPWarrior wrote: ... then no amount of common sense can protect the end user. So, this is my last visit here. Thank you all, bye. |
Author: | DrStraw [ Tue Apr 05, 2016 3:21 pm ] |
Post subject: | Re: EidoGo Security Vulnerability Alert |
sybob wrote: uPWarrior wrote: ... then no amount of common sense can protect the end user. So, this is my last visit here. Thank you all, bye. What are you worried about if you don't click on any eidogo links? |
Page 1 of 3 | All times are UTC - 8 hours [ DST ] |
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group http://www.phpbb.com/ |