Inline scripts are executed when Javascript is parsed via a paste action.
<img src=null onerror=alert('hello')> into the
chat field. ⋮ 13 │ // Content security policy
⋮ 14 │ csp := []string{
⋮ 15 │ "script-src 'self' 'sha256-2HPCfJIJHnY0NrRDPTOdC7AOSJIcQyNxzUuut3TsYRY='",
⋮ 16 │ "worker-src 'self' blob:", // No single quotes around blob:
⋮ 17 │ }
Will be patched in 0.0.9 by blocking unsafe-inline Content Security Policy and specifying the script-src. The worker-src is required to be set to blob for the video player.
If you have any questions or comments about this advisory: * Open an issue in owncast/owncast * Email us at gabek@real-ity.com
{
"nvd_published_at": "2021-12-14T20:15:00Z",
"severity": "HIGH",
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2021-12-14T20:16:10Z"
}