Inline scripts are executed when Javascript is parsed via a paste action.
<img src=null onerror=alert('hello')>
into the
chat field. ⋮ 13 │ // Content security policy
⋮ 14 │ csp := []string{
⋮ 15 │ "script-src 'self' 'sha256-2HPCfJIJHnY0NrRDPTOdC7AOSJIcQyNxzUuut3TsYRY='",
⋮ 16 │ "worker-src 'self' blob:", // No single quotes around blob:
⋮ 17 │ }
Will be patched in 0.0.9 by blocking unsafe-inline
Content Security Policy and specifying the script-src
. The worker-src
is required to be set to blob
for the video player.
If you have any questions or comments about this advisory: * Open an issue in owncast/owncast * Email us at gabek@real-ity.com
{ "nvd_published_at": "2021-12-14T20:15:00Z", "github_reviewed_at": "2021-12-14T20:16:10Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-79" ] }