Impact
The CORS Access-Control-Allow-Origin
header set by nginz
is set for all subdomains of .wire.com
(including wire.com
). This means that if somebody were to find an XSS vector in any of our subdomains, they could use it to talk to the Wire API using the user's Cookie. To make sure that a compromise of say xyz.wire.com
does not yield access to the cookie of prod-nginz-https.wire.com
we should only limit the Access-Control-Allow-Origin
header to apps that actually require the cookie.
As far as I know those are: account-pages, team-settings and the webapp
Patches
Has the problem been patched? What versions should users upgrade to?
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
References
Are there any links users can visit to find out more?
For more information
If you have any questions or comments about this advisory:
Impact
The CORS
Access-Control-Allow-Origin
header set bynginz
is set for all subdomains of.wire.com
(includingwire.com
). This means that if somebody were to find an XSS vector in any of our subdomains, they could use it to talk to the Wire API using the user's Cookie. To make sure that a compromise of sayxyz.wire.com
does not yield access to the cookie ofprod-nginz-https.wire.com
we should only limit theAccess-Control-Allow-Origin
header to apps that actually require the cookie.As far as I know those are: account-pages, team-settings and the webapp
Patches
Has the problem been patched? What versions should users upgrade to?
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
References
Are there any links users can visit to find out more?
For more information
If you have any questions or comments about this advisory: