Thinking Elixir Podcast cover image

131: Start Securing Elixir and Phoenix

Thinking Elixir Podcast

00:00

What Is the Best Way to Block IP Addresses?

In many insecure implementations, if you allow users to set the content type of what they're uploading, then somebody uploads an HTML document. And when the image gets rendered back, it's not rendered as an image, it's actually a piece of HTML. So the vulnerability described here is on profile upload with photos and they upload their malicious example which can be stolen by attacker or something like that. It was also used in Sami worm where MySpace was completely taken over by this cross site scripting site Worm. Proact has been able to publish Elixir code demonstrating these patterns so there will be more information coming out about them soon.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app