aboutsummaryrefslogtreecommitdiff
path: root/doc/security.mdwn
Commit message (Collapse)AuthorAge
* ikiwiki-mass-rebuild: Fix tty hijacking vulnerability by using su. (Once ↵Joey Hess2011-06-08
| | | | su's related bug #628843 is fixed.) Thanks, Ludwig Nussel. (CVE-2011-1408)
* 404 automatically loads gotoJoey Hess2011-06-08
|
* CVE assignedJoey Hess2011-03-28
|
* use real nameGiuseppe Bilotta2011-03-28
|
* severity analysis updateJoey Hess2011-03-28
|
* releasing version 3.20110328Joey Hess2011-03-28
|
* meta: Security fix; don't allow alternative stylesheets to be added on pages ↵Joey Hess2011-03-28
| | | | where the htmlscrubber is enabled.
* Fix typo: s/insertation/insertion/gJosh Triplett2011-03-09
|
* backportJoey Hess2011-01-22
|
* releasing version 3.20110122Joey Hess2011-01-22
|
* document XSSJoey Hess2011-01-22
|
* CVE idJoey Hess2010-11-12
|
* releasing version 3.20101112Joey Hess2010-11-12
|
* security issueJoey Hess2010-11-12
|
* update re template changeJoey Hess2010-04-23
|
* Despam, again. Someone ban adrianna please?Simon McVittie2010-04-02
|
* (no commit message)adrianna2010-04-02
|
* htmlscrubber: Security fix: In data:image/* uris, only allow a few ↵Joey Hess2010-03-12
| | | | whitelisted image types. No svg.
* CVEJoey Hess2009-08-30
|
* still mispelling josh's name..Joey Hess2009-08-30
|
* teximg security problemJoey Hess2009-08-30
|
* Fix version.JoshTriplett2008-12-31
|
* note fix versionsJoey Hess2008-11-12
|
* check for invalid utf-8, and toss it back to avoid crashesJoey Hess2008-11-12
| | | | | | | | | | | | | | | | | | | | | | Since ikiwiki uses open :utf8, perl assumes that files contain valid utf-8. If it turns out to be malformed it may later crash while processing strings read from them, with 'Malformed UTF-8 character (fatal)'. As at least a quick fix, use utf8::valid as soon as data is read, and if it's not valid, call encode_utf8 on the string, thus clearing the utf-8 flag. This may cause follow-on encoding problems, but will avoid this crash, and the input file was broken anyway, so GIGO is a reasonable response. (I looked at calling decode_utf8 after, but it seemed to cause more trouble than it was worth. BTW, use open ':encoding(utf8)' avaoids this problem, but the corrupted data later causes Storable to crash when writing the index.) This is a quick fix, clearly imperfect: - It might be better to explicitly call decode_utf8 when reading files, rather than using the IO layer. - Data read other than by readfile() can still sneak in bad utf-8. While ikiwiki does very little file input not using it, stdin for the CGI would be one way.
* remove ikiwiki.setupJoey Hess2008-07-26
| | | | | | To generate your own, use ikiwiki -dumpsetup ikiwiki.setup Update docs.
* Migrate everything else via prefix_directivesSimon McVittie2008-07-21
| | | | | | This is a partial commit of: egrep -rl '\[\[[a-z]+ ' doc | xargs --max-args 1 ./ikiwiki-transition prefix_directives
* updateJoey Hess2008-07-02
|
* cve idJoey Hess2008-05-31
|
* fix linkJoey Hess2008-05-30
|
* more on the security holeJoey Hess2008-05-30
|
* documentation for use of hashed passwordsJoey Hess2008-05-29
| | | | Everything but the actual coding to support them.
* add CVE linkJoey Hess2008-04-20
|
* releasing version 2.42Joey Hess2008-04-10
|
* Fix CSRF attacks against the preferences and edit forms. Closes: #475445Joey Hess2008-04-10
| | | | | | | | | | | | | | | | | | | | | | | | | The fix involved embedding the session id in the forms, and not allowing the forms to be submitted if the embedded id does not match the session id. In the case of the preferences form, if the session id is not embedded, then the CGI parameters are cleared. This avoids a secondary attack where the link to the preferences form prefills password or other fields, and the user hits "submit" without noticing these prefilled values. In the case of the editpage form, the anonok plugin can allow anyone to edit, and so I chose not to guard against CSRF attacks against users who are not logged in. Otherwise, it also embeds the session id and checks it. For page editing, I assume that the user will notice if content or commit message is changed because of CGI parameters, and won't blndly hit save page. So I didn't block those CGI paramters. (It's even possible to use those CGI parameters, for good, not for evil, I guess..) The only other CSRF attack I can think of in ikiwiki involves the poll plugin. It's certianly possible to set up a link that causes the user to unknowingly vote in a poll. However, the poll plugin is not intended to be used for things that people would want to attack, since anyone can after all edit the poll page and fill in any values they like. So this "attack" is ignorable.
* fix what I think is a typoJoey Hess2008-04-10
|
* add CVE idsJoey Hess2008-02-20
|
* some updates about the recent holeJoey Hess2008-02-10
|
* a few thoughts on data: securityJoey Hess2008-02-10
|
* document security fixJoey Hess2008-02-10
| | | | | The backported fix for stable is tagged and waiting for the security team to upload.
* typoJoey Hess2007-12-22
|
* moreJoey Hess2007-11-27
|
* remove svn-ismsJoey Hess2007-11-27
|
* add some documentation about how to safely allow multiple committers to anJoey Hess2007-11-27
| | | | ikiwiki git repository
* releasing version 2.14Joey Hess2007-11-26
|
* * Fix a security hole that allowed insertion of unsafe content via the metajoey2007-03-21
| | | | | | | | | | plugins's support for inserting html link and meta tags. Now such content is passed through the htmlscrubber like everything else. * Unfortunatly, that means that some valid uses of those tags are no longer usable, and special case methods needed to be added for including stylesheets, and for doing openid delegation. If you use either of these in your wiki, it will need to be modified. See the meta plugin docs for details.
* * Fix a few bugs around page titles containing html. The worst of thesejoey2007-03-21
| | | | | is an actual security hole as it allows insertion of html into the title element of a page, which is not processed by the htmlscrubber.
* document recent security holejoey2007-02-14
|
* web commit by JeremyReed: typo fixjoey2006-12-27
|
* web commit by http://id.kurokatta.org/david: Copyedit.joey2006-11-21
|
* some notes about the security (or lack thereof) of pluginsjoey2006-10-22
|