• redjard@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    6
    ·
    edit-2
    1 month ago

    svg are treated the same as webpages by modern browsers. Either integrated into the dom directly, or as a sort of sub page. Not much potential for exploits you couldn’t do in html.

    This should mostly be about injection, so someone else uploading a picture to a page and taking it over for other users. Just loading that image might make your account follow some profile there, or even do some action like press a share button.

      • redjard@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        1
        ·
        1 month ago

        risk of them being abused for a range of attacks, including cross-site scripting, HTML injection, and denial of service.

          • redjard@lemmy.dbzer0.com
            link
            fedilink
            arrow-up
            1
            ·
            1 month ago

            xss not css. css are the style sheets :)

            But yeah, the article isn’t very clear on what it means.
            dos I could see via just provoking a ton of same domain requests in the svg, like loading a lot of images from the same domain. Then every user seeing it would take part in dosing that page.

            XSS could mean data exfiltration, which should still pass most restrictions currently.