Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

file-preview: make sure sharing files is secure #603

Open
mdonadoni opened this issue Sep 19, 2024 · 1 comment
Open

file-preview: make sure sharing files is secure #603

mdonadoni opened this issue Sep 19, 2024 · 1 comment

Comments

@mdonadoni
Copy link
Member

mdonadoni commented Sep 19, 2024

REANA allows to preview some files directly from the web UI.

In particular, reana-workflow-controller can set the following content types when returning the contents of a file:

PREVIEWABLE_MIME_TYPE_PREFIXES = ["image/", "text/html", "application/pdf"]
"""List of file mime-type prefixes that can be previewed directly from the server."""

This can become a problem in case of shared workflows, as now the user creating the file can be different from the one previewing them. Consider for example text/html files: there is now a risk of XSS, as the HTML page might contain harmful Javascript code. Not only that, the page is also served from the same domain as the main REANA web interface, so HTTP requests sent from these shared files are not stopped by security mechanisms such as same-origin policy.

We should investigate whether sharing files between users is vulnerable (XSS, others) with the current setup, and if so we should look into possible solutions like (even multiples at the same time):

  • disallowing the preview of dangerous files from shared workflows (but some HTML files might be useful, like Snakemake reports)
  • tighter Content Security Policy (CSP) (e.g. do we need to run Javascript?)
  • serving files from a separate domain
  • DOMPurify (for HTML pages)
  • other?

We should also consider that files might be used to share viruses/malwares.

@mdonadoni
Copy link
Member Author

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Backlog
Development

No branches or pull requests

1 participant