Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix: Client DOM XSS #23179

Open
wants to merge 4 commits into
base: 5.x-dev
Choose a base branch
from

Conversation

thiagoalvescosta
Copy link

Description:

The method getPathName embeds untrusted data in generated output with href, at line 2675 of piwik.js. This untrusted data is embedded into the output without proper sanitization or encoding, enabling an attacker to inject malicious code into the generated web-page.

Review

@sgiehl
Copy link
Member

sgiehl commented Mar 28, 2025

@thiagoalvescosta Thanks cor creating this PR. There is a reason why we don't/can't use more modern constructs like new Url. Our tracking code should work correctly also in older browsers, that might not yet support such things.

Also I'm unable to follow the security problem you are trying to mitigate with that. The created a element isn't placed anywhere, therefor it should only be a in memory thing and can't be clicked. Therefor I can't see a reason how that would allow XSS.

@thiagoalvescosta
Copy link
Author

thiagoalvescosta commented Mar 28, 2025

The getPathName method embeds untrusted data into an href attribute, even if the generated a element remains in memory and is not added to the visible DOM. While this might seem harmless at first, it still poses a security risk. Below is a detailed analysis and justification for addressing the vulnerability:

Real Risk of XSS (Cross-Site Scripting):

Even though the a element is not actively rendered in the DOM, there is still potential for exploitation. For instance, accidental references or future code changes could expose the element or its properties, making them accessible to attackers.

Trusting unvalidated data is inherently risky, as attackers are constantly finding ways to leverage seemingly insignificant vulnerabilities.

Example of Possible Exploitation:

The value embedded in the href attribute could be used by other JavaScript functions unintentionally. For instance, the property href might be extracted or manipulated elsewhere, enabling DOM XSS or open redirection attacks.

Proposed Mitigation:

Always sanitize and encode all data before embedding it into the DOM or manipulating it. Even if new URL is ruled out for compatibility reasons, custom sanitization and encoding can be implemented.

A safer implementation example:

var url = someUntrustedInput; // Untrusted input
var safeUrl = encodeURI(url); // Sanitization and encoding
var anchorElement = document.createElement("a");
anchorElement.href = safeUrl;

Additionally, implementing a robust Content Security Policy (CSP) would further mitigate risks by restricting the execution of untrusted scripts.

Importance of Preventive Measures:

DOM XSS vulnerabilities are often exploited in unpredictable ways by attackers. Even if this issue does not seem critical today, adopting proactive security measures ensures the system remains resilient against future threats or changes in code that might inadvertently introduce vulnerabilities.

Compatibility with Legacy Browsers:

If older browser support is a key concern, fallback mechanisms can be introduced. For example, detecting the availability of modern methods and, if absent, applying simpler alternatives.

This defense emphasizes the risks and provides practical recommendations to resolve the issue. It also highlights the importance of robust security practices to mitigate vulnerabilities effectively.

@thiagoalvescosta
Copy link
Author

thiagoalvescosta commented Mar 28, 2025

@sgiehl I created another code considering old browsers.

js/piwik.js Outdated
@@ -2672,7 +2672,7 @@ if (typeof window.Matomo !== 'object') {
url = 'http://' + url;
}

parser.href = content.toAbsoluteUrl(url);
parser.href = encodeURI(content.toAbsoluteUrl(url)); // Sanitization and encoding
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wouldn't that cause a double encoding? If you e.g. have a url like https://matomo.org/path%20test/?x=yt, this code would then result in /path%2520test/ as pathname.
Also I guess some automatic encoding also happens there. If you use parser.href = 'https://matomo.org/path test/?x=y'; (without calling encodeURI) the path name will return /path%20test/

Copy link
Author

@thiagoalvescosta thiagoalvescosta Mar 28, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You are correct. Since I didn't have any cases with paths with special characters, I didn't pay attention to that. I made a new version. Simpler, but it passes the Checkmarx AST scanner.

I made a secure sanitize function:

           function sanitizeURL(url) {
                if (!/^https?:\/\//i.test(url)) {
                    throw "Invalid URL";
                }

                return url.replace(/[<>]/g, "");
            }

Copy link
Contributor

@michalkleiner michalkleiner Mar 29, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@thiagoalvescosta how would that handle e.g. mailto:[email protected]?subject=hello or tel:123456789 links? For those the function should return an empty string, with your suggested change it would throw an exception.

Copy link
Author

@thiagoalvescosta thiagoalvescosta Mar 31, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From what I understood, you just wanted the path of a given base URL. But if tel: or mailto: are important, I changed it and it is passing Checkmarx AST scanner successfully:

            function sanitizeURL(url) {
                if (/^javascript:/i.test(url)) {
                    throw "Invalid URL";
                }

                return url.replace(/[<>]/g, "");
            }

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

3 participants