Summary
Due to a weak Content Security Policy on the /proxy/*
route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window.
Impact
A malicious feed added to Miniflux can execute arbitrary JavaScript in the user's browser when opening external resources, such as proxified images, in a new tab or window.
Mitigation
The CSP for the media proxy has been changed from default-src 'self'
to default-src 'none'; form-action 'none'; sandbox;
.
Upgrade to Miniflux >= 2.2.7
Credit
RyotaK (GMO Flatt Security Inc.) with takumi-san.ai
Summary
Due to a weak Content Security Policy on the
/proxy/*
route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window.Impact
A malicious feed added to Miniflux can execute arbitrary JavaScript in the user's browser when opening external resources, such as proxified images, in a new tab or window.
Mitigation
The CSP for the media proxy has been changed from
default-src 'self'
todefault-src 'none'; form-action 'none'; sandbox;
.Upgrade to Miniflux >= 2.2.7
Credit
RyotaK (GMO Flatt Security Inc.) with takumi-san.ai