Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Prevent potentially dangerous behaviour within proxy script #754

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

timoles
Copy link

@timoles timoles commented Jun 5, 2021

Whenever a user supplies a custom "@context": "http://schema.org/" within the json-ld playground a call to a proxy script is made.

This proxy script is implemented in an unsafe manner, allowing an attacker to perform XSS or CSRF attacks against the server.
I didn't find a private contact method for reporting the vulnerability, so here's directly the pull request which should harden the proxy script.

Long-term it's probably advisable to perform requests to hosts defined within @context completely client-side via JavaScript.

@gkellogg
Copy link
Member

gkellogg commented Jun 1, 2022

@davidlehn This PR addresses a reasonable concern and has been languishing. Could you comment or commit?

# for free to join this conversation on GitHub. Already have an account? # to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants