Skip to content

Conversation

@timoles
Copy link

@timoles timoles commented Jun 5, 2021

Whenever a user supplies a custom "@context": "http://schema.org/" within the json-ld playground a call to a proxy script is made.

This proxy script is implemented in an unsafe manner, allowing an attacker to perform XSS or CSRF attacks against the server.
I didn't find a private contact method for reporting the vulnerability, so here's directly the pull request which should harden the proxy script.

Long-term it's probably advisable to perform requests to hosts defined within @context completely client-side via JavaScript.

@gkellogg
Copy link
Member

gkellogg commented Jun 1, 2022

@davidlehn This PR addresses a reasonable concern and has been languishing. Could you comment or commit?

@BigBlueHat
Copy link
Member

We're no longer using the PHP proxy code, so I think this is avoided now.

@BigBlueHat BigBlueHat closed this Dec 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants