mirror of
https://github.com/chylex/Nextcloud-News.git
synced 2025-04-25 20:15:47 +02:00
Add missing comma
Signed-off-by: Dario Cambié <dario.cambie@glasgow.ac.uk>
This commit is contained in:
parent
2eaf8c81ba
commit
066fe69219
@ -27,7 +27,7 @@ Since an attacker can not execute code in contrast to mixed active content, but
|
||||
|
||||
#### Why don't you simply use an HTTPS image/audio/video proxy
|
||||
|
||||
For the same reason that we can't fix non HTTPS websites: It does not fix the underlying issue but only silences it. If you are using an image HTTPS proxy, an attacker can simply attack your image proxy since the proxy fetches insecure content. **Even worse**: if your image proxy serves these images from the same domain as your Nextcloud installation you [are vulnerable to XSS via SVG images](https://www.owasp.org/images/0/03/Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf). In addition people feel safe when essentially they are not.
|
||||
For the same reason that we can't fix non HTTPS websites: It does not fix the underlying issue but only silences it. If you are using an image HTTPS proxy, an attacker can simply attack your image proxy since the proxy fetches insecure content. **Even worse**: if your image proxy serves these images from the same domain as your Nextcloud installation you [are vulnerable to XSS via SVG images](https://www.owasp.org/images/0/03/Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf). In addition, people feel safe when essentially they are not.
|
||||
|
||||
Since most people don't understand mixed content and don't have two domains and a standalone server for the image proxy, it is very likely they will choose to host it under the same domain.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user