Impact
An attacker can craft a malicious pass-challenge page that causes a user to execute arbitrary JavaScript code or trigger other nonstandard schemes.
Notes
An incomplete version of this fix was tagged at v1.21.2 and then the release process was aborted upon final testing. Do not package or use v1.21.2.
Patches
This issue was patched in commit d40e9056bc75dec24b45b2892037b62f6e5a1428 and released as v1.21.3.
Workarounds
To work around this issue: block any requests to the /.within.website/x/cmd/anubis/api/pass-challenge
route with the ?redir=
parameter set to anything that doesn't start with the URL scheme http
, https
, or no scheme (local path redirect).
References
Thanks to Ertugrul for reporting this issue to the security address.
Impact
An attacker can craft a malicious pass-challenge page that causes a user to execute arbitrary JavaScript code or trigger other nonstandard schemes.
Notes
An incomplete version of this fix was tagged at v1.21.2 and then the release process was aborted upon final testing. Do not package or use v1.21.2.
Patches
This issue was patched in commit d40e9056bc75dec24b45b2892037b62f6e5a1428 and released as v1.21.3.
Workarounds
To work around this issue: block any requests to the
/.within.website/x/cmd/anubis/api/pass-challenge
route with the?redir=
parameter set to anything that doesn't start with the URL schemehttp
,https
, or no scheme (local path redirect).References
Thanks to Ertugrul for reporting this issue to the security address.