Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20180205120720.GB21315@perpetual.pseudorandom.co.uk>
Date: Mon, 5 Feb 2018 13:07:20 +0100
From: Simon McVittie <smcv@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: KDE Notification URI Loading Issues

On Mon, 05 Feb 2018 at 01:01:30 +0100, Jason A. Donenfeld wrote:
> Essentially, chat programs or the like that render remote data into
> notifications allow remote users to inject some limited subset of
> HTML, which is then rendered by the KDE notification UI.

I think this is for the chat programs to fix, really: they're the
boundary between untrusted and trusted content. The Notifications
implementation can't be expected to know which applications generate
notifications internally from trusted code, and which applications
interpolate untrusted content into notifications.

Arguably the chat programs should be parsing messages into an internal
representation that is designed to be unable to represent anything
potentially malicious, then re-serializing that internal representation
to HTML for the notification.

A minimal implementation would be to strip all HTML from the version of
the chat message that goes to the notifications API, and only include
the text content. That probably doesn't work for protocols whose users
make extensive use of image-based "custom smilies" and pseudo-emoji, though.

> Aside from the fact that this places a great deal of faith in QUrl

Which other URL parser would you have used in Qt-based programs? If QUrl
isn't correctly implemented, the solution would seem to be to fix it,
not to implement a parallel URL parser with different bugs?

> it also very explicitly allows for
> local files to be specified. I'm told that this is intended by the
> spec, and changing the behavior would be a violation of the spec. Is
> the spec then broken? The developers think not, and believe that
> programs using the global notification mechanism should be responsible
> for supplying their own whitelist sanitization.

Presumably these global notifications are either an implementation of
the freedesktop.org Notifications API, or something very similar. If so,
they're intended for many uses, not just chat - for instance my GNOME
desktop uses notifications for "low disk space on /home", "you have a
meeting in 15 minutes" and "now playing: <song title>", among others.
Chat clients are interesting because they process untrusted content,
not because they are the only user of this API.

My understanding is that, if a local application that is not chat and
does not process untrusted data wants to include an icon or image in
its notifications, the intention of the spec is that it can do so;
for instance media players that show "now playing:" notifications
often include the album cover from the user's music library in the
notification. Forbidding that would remove functionality from all
notification clients, not just chat programs.

Similarly, if a chat client translates ":-)" into an <img> that
references an icon from the user's icon theme (for example it might be
file:///usr/share/icons/Adwaita/48x48/emotes/face-smile.png on GNOME) then
that's something we can trust not to be malicious (if there's malicious
content in /usr/share we have much bigger problems). I personally don't
want text smilies translated to images, but some people do.

> - Should we audit all consumers of it and duplicate the whitelist
> parsing situation and open various bug reports?

The consumers that process untrusted data (chat clients etc.) and
send HTML in their notifications, yes; all consumers of the same API,
probably not, because many of them don't process untrusted data.

If a chat client sends partially or fully attacker-supplied HTML in
its notifications then it's almost certainly passing the same HTML to
a WebKit WebView or a similar general-purpose HTML renderer to display
the message in its own window, for which it will need to take very
similar precautions anyway.

> - Should we just live with IRC clients that allow remote users to load
> arbitrary files into memory

If the text-only IRC protocol can do this then something has gone very
wrong. There's a de facto standard for mIRC-compatible colours, bold
and italic in IRC (which would be translated into very simple HTML for
clients that use HTML notifications or a WebView to render messages),
but I'm not aware of anything that would be translated into an <img>,
except for possibly translating text smilies like ":-)" or emoji into
a file:/// reference to a trusted, local icon from the icon theme.

    smcv

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.