From: david-sarah Date: Fri, 18 Nov 2011 00:20:13 +0000 (+0000) Subject: docs/known_issues.rst: describe when the unauthorized access attack is known to be... X-Git-Url: https://git.rkrishnan.org/uri/frontends//%22%3C?a=commitdiff_plain;h=b73aba98de93c4c0b0013f1dd435c64e73e48f4c;p=tahoe-lafs%2Ftahoe-lafs.git docs/known_issues.rst: describe when the unauthorized access attack is known to be possible, and fix a link. --- diff --git a/docs/known_issues.rst b/docs/known_issues.rst index 386ab88d..25c0f843 100644 --- a/docs/known_issues.rst +++ b/docs/known_issues.rst @@ -17,8 +17,8 @@ want to read `the "historical known issues" document`_. Known Issues in Tahoe-LAFS v1.9.0, released 31-Oct-2011 ======================================================= - * `Potential unauthorized access by JavaScript in unrelated files`_ - * `Potential disclosure of file through embedded hyperlinks or JavaScript in that file`_ + * `Unauthorized access by JavaScript in unrelated files`_ + * `Disclosure of file through embedded hyperlinks or JavaScript in that file`_ * `Command-line arguments are leaked to other local users`_ * `Capabilities may be leaked to web browser phishing filter / "safe browsing" servers`_ * `Known issues in the FTP and SFTP frontends`_ @@ -27,7 +27,7 @@ Known Issues in Tahoe-LAFS v1.9.0, released 31-Oct-2011 ---- Unauthorized access by JavaScript in unrelated files --------------------------------------------------------------- +---------------------------------------------------- If you view a file stored in Tahoe-LAFS through a web user interface, JavaScript embedded in that file can, in some circumstances, access other @@ -37,6 +37,12 @@ those other files or directories to the author of the script, and if you have the ability to modify the contents of those files or directories, then that script could modify or delete those files or directories. +This attack is known to be possible when an attacking tab or window could +reach a tab or window containing a Tahoe URI by navigating back or forward +in the history, either from itself or from any frame with a known name (as +specified by the "target" attribute of an HTML link). It might be possible +in other cases depending on the browser. + *how to manage it* For future versions of Tahoe-LAFS, we are considering ways to close off @@ -53,8 +59,8 @@ malicious JavaScript. ---- -Potential disclosure of file through embedded hyperlinks or JavaScript in that file ------------------------------------------------------------------------------------ +Disclosure of file through embedded hyperlinks or JavaScript in that file +------------------------------------------------------------------------- If there is a file stored on a Tahoe-LAFS storage grid, and that file gets downloaded and displayed in a web browser, then JavaScript or