Age | Commit message (Collapse) | Author |
|
Signed-off-by: marcin mikołajczak <git@mkljczk.pl>
|
|
|
|
# Conflicts:
# .gitlab-ci.yml
# lib/pleroma/web/common_api/utils.ex
# lib/pleroma/web/xml.ex
# mix.exs
# test/pleroma/web/activity_pub/transmogrifier/emoji_react_handling_test.exs
# test/pleroma/web/common_api/utils_test.exs
# test/pleroma/web/mastodon_api/update_credentials_test.exs
# test/pleroma/web/xml_test.exs
|
|
|
|
|
|
|
|
|
|
|
|
commit 1afde067b12ad0062c1820091ea9b0a680819281 upstream.
|
|
|
|
|
|
allow https: so that flash works across instances without need for media proxy
See merge request pleroma/pleroma!3879
|
|
Signed-off-by: marcin mikołajczak <git@mkljczk.pl>
|
|
Fix config ownership in dockerfile to pass restriction test
See merge request pleroma/pleroma!3931
|
|
|
|
|
|
gentoo_otp_en.md: Indicate which install method it covers
See merge request pleroma/pleroma!3928
|
|
|
|
|
|
https://vuln.be/post/xxe-in-erlang-and-elixir/
|
|
https://vuln.be/post/xxe-in-erlang-and-elixir/
|
|
|
|
Closes: https://git.pleroma.social/pleroma/pleroma/-/issues/3135
|
|
Closes: https://git.pleroma.social/pleroma/pleroma/-/issues/3135
|
|
download endpoint
The pack name has been sanitized so an attacker cannot upload a media
file called pack.json with their own handcrafted list of emoji files as
arbitrary files on the filesystem and then call the emoji pack archive
download endpoint with a pack name crafted to the location of the media
file they uploaded which tricks Pleroma into generating a zip file of
the target files the attacker wants to download.
The attack only works if the Pleroma instance does not have the
AnonymizeFilename upload filter enabled, which is currently the default.
Reported by: graf@poast.org
|
|
download endpoint
The pack name has been sanitized so an attacker cannot upload a media
file called pack.json with their own handcrafted list of emoji files as
arbitrary files on the filesystem and then call the emoji pack archive
download endpoint with a pack name crafted to the location of the media
file they uploaded which tricks Pleroma into generating a zip file of
the target files the attacker wants to download.
The attack only works if the Pleroma instance does not have the
AnonymizeFilename upload filter enabled, which is currently the default.
Reported by: graf@poast.org
|
|
Restrict attachments to only uploaded files only
Closes #3154
See merge request pleroma/pleroma!3923
|
|
|
|
|
|
2023-06 deps update + de-override plug
See merge request pleroma/pleroma!3911
|
|
|
|
Deprecate audio scrobbling
See merge request pleroma/pleroma!3919
|
|
|
|
CI: Fix pipeline tokens & exit status
See merge request pleroma/pleroma!3918
|
|
|
|
|
|
Packaged installation guide for gentoo
See merge request pleroma/pleroma!3906
|
|
Add instructions to serve media on another domain
See merge request pleroma/pleroma!3892
|
|
release_runtime_provider_test: Explicitely use non-existant config file
See merge request pleroma/pleroma!3910
|
|
Fix handling report from a deactivated user
Closes #3131
See merge request pleroma/pleroma!3915
|
|
into 'develop'
Fix user fetch completely broken if featured collection is not in a supported form
See merge request pleroma/pleroma!3914
|
|
|
|
supported form
|
|
|
|
Merge Revert "Merge branch 'validate-host' into 'develop'"
Closes #3136
See merge request pleroma/pleroma!3909
|
|
Show more informative errors when profile exceeds char limits
Closes #3119
See merge request pleroma/pleroma!3886
|
|
this fixes compatibility with Erlang OTP 26
Related: https://git.pleroma.social/pleroma/pleroma/-/issues/2913
|
|
|
|
This reverts commit d998a114e26033e98e87778e5ca659aff91831bf, reversing
changes made to da6b4003acad84b0f60ad8da6d08cfe13564b058.
|
|
|