Unverified Commit 2da3f392 authored by Robert Speicher's avatar Robert Speicher Committed by Tomasz Maczukin

Merge branch '17298-wiki-xss' into 'master'

Forbid scripting for wiki files

Wiki files (not pages - files in the repo) are just sent to the browser
with whatever content-type the mime_types gem assigns to them based on
their extension. As this is from the same domain as the GitLab
application, this is an XSS vulnerability.

Set a CSP forbidding all sources for scripting, CSS, XHR, etc. on these

Fixes https://gitlab.com/gitlab-org/gitlab-ce/issues/17298.

See merge request !1969
parent 6a513927
......@@ -8,6 +8,7 @@ v 8.8.5
- Adjust the SAML control flow to allow LDAP identities to be added to an existing SAML user
- Fix incremental trace upload API when using multi-byte UTF-8 chars in trace
- Prevent unauthorized access for projects build traces
- Forbid scripting for wiki files
v 8.8.4
- Fix LDAP-based login for users with 2FA enabled. !4493
......@@ -16,6 +16,9 @@ class Projects::WikisController < Projects::ApplicationController
if @page
render 'show'
elsif file = @project_wiki.find_file(params[:id], params[:version_id])
response.headers['Content-Security-Policy'] = "default-src 'none'"
response.headers['X-Content-Security-Policy'] = "default-src 'none'"
if file.on_disk?
send_file file.on_disk_path, disposition: 'inline'
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment