-
xmr-pr
rating89us opened pull request #2903: Wallet: add isTrezor() function
-
xmr-pr
-
xmr-pr
rating89us opened pull request #2904: StandardDialog: new design
-
xmr-pr
-
selsta
.merge+ #2896 #2894 #2896 #2897 #2899 #2901 #2903
-
xmr-pr
Added
-
xmr-pr
xiphon opened pull request #2906: cmake: rename monero-gui binary to monero-wallet-gui
-
xmr-pr
-
xmr-pr
xiphon opened pull request #2905: cmake: drop '-std=c++0x' compiler flag
-
xmr-pr
-
selsta
.merge+ #2905 #2906
-
xmr-pr
Added
-
sarang
I assume this channel has seen this issue?
monero-project/monero-gui #2902
-
selsta
I have not.
-
sarang
Ah ok
-
sarang
Well. There it is
-
sarang
Was reported (not via responsible disclosure) via twitter
-
sarang
Someone else posted as an issue
-
selsta
Looks like the fix she suggested is deprecated in Qt 5.15 and I can’t find a different method to disable this.
-
selsta
I’ll let xiphon take a look at this.
-
sarang
Worth mentioning to her on twitter? (I do not have an account, and do not want one)
-
sarang
It would show that the maintainers are aware of the issue now
-
selsta
I commented on Twitter.
-
sarang
Link?
-
selsta
-
sarang
ty
-
sarang
Does it seem like a problem in practice?
-
xiphon
sarang: i wouldn't say is a big issue (as big as it is promoted in the twitter post)
-
xiphon
no, it does seem like a bs to me
-
sarang
Too bad that the twitter poster feels responsible disclosure is not worth it
-
xiphon
although we can and probably will "fix" it (just in case)
-
sarang
(I wholeheartedly disagree with her mentality on this)
-
xiphon
i still don't agree that it is a big issue
-
sarang
She does say that it's unlikely to be remotely exploitable
-
xiphon
to do this, a user might explicitly want to "inject" some html code where it is not intended to be
-
sarang
but even so
-
xiphon
sure, it is unlikely to be exploitable by anyone
-
selsta
Electrum had problems were nodes were able to send html responses which resulted in fake update client dialogs
-
selsta
but I don’t think this is possible here
-
xiphon
i still would say that it is not a vulnerability at all
-
xiphon
it is like a user entering "rm -rf" in the console
-
sarang
Perhaps a comment on the github issue would also be helpful
-
xiphon
but is a bug, though. So we probably could sanitize a user's input
-
selsta
I think her Twitter post was more general and someone asked if this is possible with monero GUI, it didn’t seem like a vulnerability disclosure to me
-
xiphon
just in case the user want to do something really dumb
-
sarang
selsta: perhaps, but the thread basically indicated that she didn't intent to responsibly disclose future flaws
-
sarang
a mentality that I think is reckless and unprofessional
-
sarang
but that is unrelated to this particular issue
-
selsta
sarang: read up on her previous tweets now, agree with you
-
moneromooo
The "I'm an asshole, look at me" mentality is prevalent among those who style themselves security researchers (no idea about this particular case). The apparent glory attracts that type of people.
-
sarang
I don't doubt that this researcher knows her stuff, FWIW
-
sarang
I just disagree with the conclusion that because some projects/companies don't respond well to disclosures, that responsible disclosure isn't still the right thing to do
-
sarang
But again, that's somewhat separate from this particular issue
-
moneromooo
"Some dude laughed at me when I said please, I won't say please to anyone ever again"
-
moneromooo
Granted, it's satisfying on the spot.
-
» moneromooo feels a sudden urge to be an asshole to someone...
-
sarang
nooo
-
dsc_
been aware of QMLs behaviour on this for quite a while, I committed this on Dec 12 2018;
monero-project/monero-gui fe6ce68
-
dsc_
AFAIK. QML's default text component is RichText which automagically resolves, for example, <img> tags. This can be problematic with user-input. The attack that I came up with: 1) Create a wallet 2) Create a new contact 3) You give it a name with some HTML in it (had to use some modified monero-core code for this 4) It saves to wallet cache. 5) You send your wallet + wallet cache to victim 6) Victim opens
-
dsc_
wallet in GUI which will ping back to you upon rendering. 7) You have his IP (h0h0h0)
-
dsc_
I think we also discussed this around Dec 12 2018, specifically how Qt automagically resolves HTML tags in richtext components. Then 1.5 weeks later we get this:
zdnet.com/article/users-report-losi…-in-clever-hack-of-electrum-wallets
-
dsc_
My conspiracy theory is that someone here read that.
-
dsc_
<8')
-
selsta
-
dsc_
hahaha
-
dsc_
but like xiphon mentioned, no way to trigger this remotely
-
dsc_
so its not really a vuln
-
dsc_
but we have to be careful on where we place RichTexts