On Thursday, April 22, 2021 at 1:38:35 PM UTC+2 [email protected] wrote:

> Interesting. So what’s stopping a TW owner from injecting a malicious 
> script into a tiddler? On a side note, PAT’s May be more safely stored by 
> using the CryptoJS library (AES) which requires a password to decode the 
> PAT. I did something similar in my repo at GitHub.com/flancast90/lockifyJS, 
> which could be simply adapted. 
>

Hi, 
I did have a short look at your code. .. There are several problems, that 
immediately jumped into my face. 

1st: jquery dependency. about 9000 lines of code
2nd: crypto-js an other 3000+ lines of code

add1) Just to use $.ajax() and $get from jquery. ... Have a closer look at 
the browser fetch API 
<https://developer.mozilla.org/en-US/docs/Web/API/Fetch_API>, which is 
built into every browser now. 
add2) have a closer look at the browser crypto api 
<https://developer.mozilla.org/en-US/docs/Web/API/Crypto> 

At https://github.com/flancast90/lockifyJS/blob/main/Login/js/auth.js#L2 it 
seems you directly load code from an untrusted source into html.innerHTML, 
without any sanitation. *This is  cross site scripting 
<https://developer.mozilla.org/en-US/docs/Glossary/Cross-site_scripting> !* 
That's extremely unsecure! ... Search the web for .innerHTML, code 
sanitaiton  and security best practice!

See: https://developer.mozilla.org/en-US/docs/Web/Security

Sorry, but I didn't look further. ... 

There are 3 important rules about security. 

 - The less code involved, the better!
 - Only use code that you really trust .... even better: That you 
understand!
 - Security done right is hard!

Just my thoughts
-mario


-- 
You received this message because you are subscribed to the Google Groups 
"TiddlyWiki" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/tiddlywiki/6803d010-a26c-4194-a532-445d05253118n%40googlegroups.com.

Reply via email to