On Thursday, February 6, 2020 at 3:54:34 PM UTC+1, Mark S. wrote:
>
> Is it possible the "receiving" portion of this plugin could make it into 
> the core, so that any TW could receive tiddlers?
>

In a recent post 
<https://groups.google.com/d/msg/tiddlywiki/21BnNYG30eM/iClNnJ5EBAAJ>, 
Jeremy pointed out, that the receiving part of the plugin *is* a "cross 
site scripting" attack vector. .. Without the need to use executable code.

On Thursday, February 6, 2020 at 12:29:21 AM UTC+1, Jeremy Ruston wrote:
> ...
>
>> For example, I could craft a link to tiddlywiki.com that changes the 
>> wiki so that the download button downloads malware. It's actually a 'cross 
>> site scripting' attack.
>>
>
More info at Wikipedia: https://en.wikipedia.org/wiki/Cross-site_scripting

The usecase you describe allows everyone to impersonate every existing 
plugin. It will be easy to create an evil copy of a plugin and post it 
within a link. 

With this link you want to point to a 3rd party but "friendly" tiddlywiki 
edition, that will in turn allow a naive user to download maleware from a 
4th party site. 

The cool thing now is, that the "friendly" repository will get all the fame 
and will probably be blocked by its hosting agency. ... That's a very nice 
move!
I'd really like to enable this behavioural pattern for all of my sites. ... 
Jokes aside. 

I think with this "functionality" tiddlywiki will easily make it into every 
browsers black list. 

having not much fun atm
-mario

-- 
You received this message because you are subscribed to the Google Groups 
"TiddlyWiki" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to tiddlywiki+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/tiddlywiki/8b088a6b-2720-426e-b4ba-f0e2d882ba61%40googlegroups.com.

Reply via email to