Cure53 🏳️‍🌈
cure53.infosec.exchange.ap.brid.gy
Cure53 🏳️‍🌈
@cure53.infosec.exchange.ap.brid.gy
And there is fire where we walk.

[bridged from https://infosec.exchange/@cure53 on the fediverse by https://fed.brid.gy/ ]
DOMPurify 3.3.0 is out. You can now configure which tags can have which attributes much more easily.

https://github.com/cure53/DOMPurify/releases/tag/3.3.0

Thanks again to everyone who contributed to and supported the project. ❤️
Release DOMPurify 3.3.0 · cure53/DOMPurify
Added the SVG mask-type attribute to default allow-list, thanks @prasadrajandran Added support for ADD_ATTR and ADD_TAGS to accept functions, thanks @nelstrom Fixed an issue with the slot element b...
github.com
October 15, 2025 at 10:12 AM
DOMPurify 3.3.0 will soon be released, with this likely being the most important change in a long time:

https://github.com/cure53/DOMPurify/pull/1150
Allow ADD_ATTR and ADD_TAGS to accept a function by nelstrom · Pull Request #1150 · cure53/DOMPurify
Summary This PR addresses issue #1149 by allowing ADD_ATTR to accept a function for tag-specific attribute validation. Background & Context Currently, ADD_ATTR only accepts a string array, crea...
github.com
October 9, 2025 at 8:05 PM
How do you like our new website we learned about just today?

https://dompurify.com/

Please make sure to run dompurify.exe on Windows 11 for best possible experience and Full HD.
DOMPurify – Fast & Secure XSS Sanitizer for HTML
DOMPurify is a powerful and widely adopted JavaScript library designed to sanitize HTML, SVG, and MathML content on the client side.
dompurify.com
September 30, 2025 at 8:26 AM
DOMPurify 3.2.7 has been released today, adding several fixes and improvements.

https://github.com/cure53/DOMPurify/releases/tag/3.2.7

Thanks to all folks who contributed 💕
Release DOMPurify 3.2.7 · cure53/DOMPurify
Added new attributes and elements to default allow-list, thanks @elrion018 Added tagName parameter to custom element attributeNameCheck, thanks @nelstrom Added better check for animated href attrib...
github.com
September 17, 2025 at 12:15 PM
Reposted by Cure53 🏳️‍🌈
Somebody on the internet is very good at subtle humor.

#startrektng
#humor
June 26, 2025 at 6:01 PM
Reposted by Cure53 🏳️‍🌈
In the last five years, we've gone from "employees will never have to go into an office" to "employees need to be in the office because creative and innovative work can only be done face-to-face between humans" to "lol we don't need humans"
June 26, 2025 at 4:17 PM
Reposted by Cure53 🏳️‍🌈
libxslt project maintainer steps down, citing the amount of time it takes to triage embargoed security issues.

“I’ve been doing this long enough to know that most of the secrecy around security issues is just theater. All the ‘best practices’ like OpenSSF Scorecards are just an attempt by big […]
Original post on phpc.social
phpc.social
June 18, 2025 at 2:12 PM
From a pure penetration testing perspective, ZUGFeRD has been such a gift in 2025... thank you so much, German government 😅
June 19, 2025 at 11:50 AM
Remember this tiny change to the HTML spec?

It just prevented a critical bug in an application we are currently testing.

https://github.com/whatwg/html/commit/e21bd3b4a94bfdbc23d863128e0b207be9821a0f

❤️ cc @freddy @securitymb
Escape "<" and ">" when serializing attribute values · whatwg/html@e21bd3b
Avoid a class of XSS attacks where markup goes through a lossy parse-serialize-parse roundtrip and the original attribute value is parsed in the data state. This reverts 4eeb8a1706c9545d5aedb5d569...
github.com
June 3, 2025 at 11:36 AM
DOMPurify 3.2.6 has been release with several smaller fixes and improvements, thanks to all who contributed 💕

https://github.com/cure53/DOMPurify/releases/tag/3.2.6

Hopefully this will also help with the CI/CD issues that arose after the fake CVE was posted last week.
Release DOMPurify 3.2.6 · cure53/DOMPurify
Fixed several typos and removed clutter from our documentation, thanks @Rotzbua Added matrix: as an allowed URI scheme, thanks @kleinesfilmroellchen Added better config hardening against prototype ...
github.com
May 19, 2025 at 3:28 PM
Reposted by Cure53 🏳️‍🌈
Detecting malicious Unicode
In a recent educational trick, curl contributor James Fuller submitted a pull-request to the project in which he suggested a larger cleanup of a set of scripts. In a later presentation, he could show us how not a single human reviewer in the team nor any CI job had spotted or remarked on one of the changes he included: he replaced an ASCII letter with a Unicode alternative in a URL. This was an eye-opener to several of us and we decided we needed to up our game. We are the curl project. We can do better. ## GitHub The replacement symbol looked identical to the ASCII version so it was not possible to visually spot this, but the diff viewer knows there is a difference. In this GitHub website screenshot below I reproduced a similar case. The right-side version has the Latin letter ‘g’ replaced with the Armenian letter co. They appear to be the same. GitHub shows a diff. But what is actually the difference? The diff viewer says there is a difference but as a human it isn’t possible to detect what it is. Is it a flaw? Does it matter? If done “correctly”, it would be done together with a _real_ and expected fix. The impact of changing one or more letters in a URL can of course be devastating depending on conditions. When I flagged about this rather big omission to GitHub people, I got barely no responses at all and I get the feeling the impact of this flaw is not understood and acknowledged. Or perhaps they are all just too busy implementing the next AI feature we don’t want. ## Warnings When we discussed this problem on Mastodon earlier this week, Viktor Szakats provided me with an example screenshot of doing a similar stunt with Gitea which quite helpfully highlights that there is something special about the replacement: Gitea warns that the replacement is using “ambiguous Unicode characters” I have been told that some of the other source code hosting services also show similar warnings. As a user, I would actually like to know even more than this, but at least this warns about the proposed change clearly enough so that if this happens I would get the code manually and investigate before accepting such a change. ## Detect While we wait for GitHub to wake up and react (which I have no expectation will actually happen anytime soon), we have implemented checks to help us poor humans spot things like this. _To detect malicious Unicode._ We have added a CI job that scans all files and validates every UTF-8 sequence in the git repository. In the curl git repository most files and most content are plain old ASCII so we can “easily” whitelist a small set of UTF-8 sequences and some specific files, the rest of the files are simply not allowed to use UTF-8 at all as they will then fail the CI job and turn up red. In order to drive this change home, we went through all the test files in the curl repository and made sure that all the UTF-8 occurrences were instead replaced by other kind of escape sequences and similar. Some of them were also used more or less by mistake and could easily be replaced by their ASCII counterparts. The next time someone tries this stunt on us it could be someone with less good intentions, but now ideally our CI will tell us. ## Confusables There are plenty of tools to find similar-looking characters in different Unicode sets. One of them is provided by the Unicode consortium themselves: https://util.unicode.org/UnicodeJsps/confusables.jsp ## Reactive This was yet another security-related fix _reacting_ on a demonstrated problem. I am sure there are plenty more problems which we have not yet thought about nor been shown and therefore we do not have adequate means to detect and act on automatically. We want and strive to be proactive and tighten everything _before_ malicious people exploit some weakness somewhere but security remains this never-ending race where we can only do the best we can and while _the other side_ is working in silence and might at some future point attack us in new creative ways we had not anticipated. That future unknown attack is a tricky thing.
daniel.haxx.se
May 16, 2025 at 7:10 AM
Sadly, someone dropped a nonsense CVE on DOMPurify and now people are panicking and send us emails asking when the "fix" will be released.

https://security.snyk.io/vuln/SNYK-JS-DOMPURIFY-10176060

Does anyone here has a personal contact at Snyk who might be able to help with getting rid of this?
Snyk Vulnerability Database | Snyk
High severity (7.8) Directory Traversal in dompurify | CVE-2025-48050
security.snyk.io
May 16, 2025 at 1:32 PM
Scientists recently visualized it, can you finally see how insecure Linux really is?

Just use Windows and set AI=On and all this will go away #securitytips #youarewelcome
April 23, 2025 at 3:17 PM
DOMPurify 3.2.5 has been released, adding several fixes and improvements.

https://github.com/cure53/DOMPurify/releases/tag/3.2.5

Thanks to all folks who contributed 💕
Release DOMPurify 3.2.5 · cure53/DOMPurify
Added a check to the mXSS detection regex to be more strict, thanks @masatokinugawa Added ESM type imports in source, removes patch function, thanks @donmccurdy Added script to verify various TypeS...
github.com
April 3, 2025 at 5:20 PM
DOMPurify 3.2.4 has been released, adding some smaller fixes and convenience features...

And, also fixing a conditional, config-depended and very smart bypass - related to the SAFE_FOR_TEMPLATES mode, thanks @nsysean 😍

https://github.com/cure53/DOMPurify/releases/tag/3.2.4

If you don't use […]
Original post on infosec.exchange
infosec.exchange
January 30, 2025 at 9:45 AM