RTC Language Change bug PR-5.1-dev Pending

User tests: Successful: Unsuccessful:

avatar bembelimen
bembelimen
27 Jun 2024

Pull Request for Issue #43407 & #43365 .

Summary of Changes

The security hardening adds an empty "sandbox" attribute to every iframe (read more). This prevents PDFs insert by the media manager loaded (it needs more fine granulated sandbox values)

With TinyMCE 7 you can whitelist certain domains, which will overcome this problem, but till then, this filter is super strict and not usable.

Testing Instructions

Use the media manager to embed a PDF. Save the article and open article in frontpage.

Actual result BEFORE applying this Pull Request

  • PDF is blocked

Expected result AFTER applying this Pull Request

  • Go to the TinyMCE configuration and disable the following option:
    grafik

  • PDF is visible

Votes

# of Users Experiencing Issue
1/1
Average Importance Score
5.00

avatar bembelimen bembelimen - open - 27 Jun 2024
avatar bembelimen bembelimen - change - 27 Jun 2024
Status New Pending
avatar joomla-cms-bot joomla-cms-bot - change - 27 Jun 2024
Category Front End Plugins
avatar bembelimen bembelimen - change - 27 Jun 2024
The description was changed
avatar bembelimen bembelimen - edited - 27 Jun 2024
avatar drmenzelit drmenzelit - test_item - 28 Jun 2024 - Tested successfully
avatar drmenzelit
drmenzelit - comment - 28 Jun 2024

I have tested this item ✅ successfully on 46a404f

Thank you


This comment was created with the J!Tracker Application at issues.joomla.org/tracker/joomla-cms/43716.

avatar SniperSister
SniperSister - comment - 28 Jun 2024

Revert broken security fix

It's not broken and it's not a "bug". It's exactly doing what it's supposed to do: it limits the possible actions that an iframe can perform to protect the user from unexpected script execution.

So, the question actually is: does the CMS want to enforce the strictest possible security configuration for the editor, at least by default? Or is the comfort in the content creation process more important?

That's a question that's probably worth a vote in the production department meeting.

avatar drmenzelit
drmenzelit - comment - 28 Jun 2024

I'm for security, of course, but it should at least be possible to embed a local PDF ...
#43407 (comment)

avatar RickR2H RickR2H - test_item - 28 Jun 2024 - Tested successfully
avatar RickR2H
RickR2H - comment - 28 Jun 2024

I have tested this item ✅ successfully on 46a404f


This comment was created with the J!Tracker Application at issues.joomla.org/tracker/joomla-cms/43716.

avatar RickR2H RickR2H - change - 28 Jun 2024
Status Pending Ready to Commit
avatar RickR2H
RickR2H - comment - 28 Jun 2024

RTC


This comment was created with the J!Tracker Application at issues.joomla.org/tracker/joomla-cms/43716.

avatar Fedik
Fedik - comment - 28 Jun 2024

TBH, I have no idea why it is called security,
Crossorigin is not easy to bypass without extra effort, by just embed iframe,
And all local embendings, well, they will be need to be enabled in one or in another way.

We just making life for average User more complicated. They can just switch to codemirror, or none editor, and all this "theorethical security" will disapears.

avatar SniperSister
SniperSister - comment - 28 Jun 2024

We are not talking about a CORS but about user experience and perception. Imagine an editor copy&pasting an iframe tag to an external site into the editor window of his companies intranet. On paste, the iframe will be loaded automatically - and without sandboxing, that iframe could i.e. trigger a file download. The user is now under the impression that this download is triggered by a trusted source, which is the Joomla administrator interface of his intranet - whereas the download is actually triggered by the untrusted iframe site.

I'm not necessarily saying, that this is an important threat scenario for the average user, I just want to point out that the issue is not related to crossorigin or samesite policies.

avatar Fedik
Fedik - comment - 28 Jun 2024

We can make a TinyMCE plugin, that shows an alert for potentialy dangerous iframe (and let User decide what to do), when User insert something in the editor. instead of totaly blocking everything.

avatar RickR2H
RickR2H - comment - 28 Jun 2024

Maybe its an option to extend the TinyMCE plugin with the basic configuration for the sandbox parameters so a domain could be added to allow the PDF iframe?

avatar Quy Quy - change - 29 Jun 2024
Status Ready to Commit Pending
avatar Quy Quy - change - 29 Jun 2024
Labels Added: bug PR-5.1-dev
avatar joomla-cms-bot joomla-cms-bot - change - 29 Jun 2024
Category Front End Plugins Administration Language & Strings Front End Plugins
avatar bembelimen bembelimen - change - 29 Jun 2024
Labels Added: Language Change
avatar bembelimen
bembelimen - comment - 29 Jun 2024

Now with parameter. Ready to test again :)

avatar bembelimen bembelimen - change - 29 Jun 2024
Title
[5.1] Revert broken security fix preventing PDF embeding
[5.1] Allow PDF embeding again
avatar bembelimen bembelimen - edited - 29 Jun 2024
avatar RickR2H RickR2H - test_item - 29 Jun 2024 - Tested successfully
avatar RickR2H
RickR2H - comment - 29 Jun 2024

I have tested this item ✅ successfully on 12ac335


This comment was created with the J!Tracker Application at issues.joomla.org/tracker/joomla-cms/43716.

avatar SniperSister SniperSister - test_item - 1 Jul 2024 - Tested successfully
avatar SniperSister
SniperSister - comment - 1 Jul 2024

I have tested this item ✅ successfully on 12ac335


This comment was created with the J!Tracker Application at issues.joomla.org/tracker/joomla-cms/43716.

avatar chmst chmst - change - 1 Jul 2024
Status Pending Ready to Commit
avatar chmst
chmst - comment - 1 Jul 2024

RTC


This comment was created with the J!Tracker Application at issues.joomla.org/tracker/joomla-cms/43716.

avatar LadySolveig LadySolveig - change - 1 Jul 2024
Labels Added: RTC
avatar LadySolveig LadySolveig - change - 2 Jul 2024
Status Ready to Commit Fixed in Code Base
Closed_Date 0000-00-00 00:00:00 2024-07-02 05:50:04
Closed_By LadySolveig
avatar LadySolveig LadySolveig - close - 2 Jul 2024
avatar LadySolveig LadySolveig - merge - 2 Jul 2024
avatar LadySolveig
LadySolveig - comment - 2 Jul 2024

Thank you @bembelimen and also for testing and review @drmenzelit @SniperSister @RickR2H @Fedik @brianteeman

avatar bembelimen bembelimen - change - 10 Jul 2024
The description was changed
avatar bembelimen bembelimen - edited - 10 Jul 2024

Add a Comment

Login with GitHub to post a comment