@adiz It appears only pleroma+forks are affected. Not that there aren't other zerodays or attack vectors for the other softwares.

@splitshockvirus @adiz as pete said its a nginx issuse, but their is also the rich text thing thats geting fixed though
@splitshockvirus @adiz i just checked and they are not lol, they are on pleroma though

@dcc @adiz

mf I've been over this with you in the past, the CSPs on mastodon are the reason seamonkey didn't work on my website. the CSPs are in the ruby code.

@splitshockvirus @dcc @adiz Was bloat vulnerable to this attack, or just Pleroma-FE and Soapbox?
@james @dcc @splitshockvirus @adiz just pleromafe
lain gaive the rundown

pretty much a exploit in how pleroma renders link previews

@theorytoe @dcc @james @adiz

:facebook_frog:​ turn this off, do the csp thing, 403 any .js .svg .exe .html .sh .askdfa;dka;sdfkjasldfj files

and then wait for pleroma to give an actual patch.

@splitshockvirus
So what's this fuss is all about? I don't use media proxy and my Pleroma user doesn't even have admin access. Do I have anything to worry about?
@theorytoe @dcc @james @adiz

Follow

@splitshockvirus @theorytoe @dcc @james @adiz
Well, this one looks like a good enough guide: arachnid.town/objects/cb0605dd
I still don't get why do I have to reconfigure Pleroma to use the subdomain to uploads and mediaproxy if I set up a redirect, but did that anyway 🀷

Β· Web Β· 0 Β· 0 Β· 1
Sign in to participate in the conversation
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml