| ▲ | gdulli 21 hours ago | ||||||||||||||||||||||||||||||||||||||||
I don't use XSLT and don't object to this, but seeing "security" cited made me realize how reflexively distrustful I've become of them using that justification for a given decision. Is this one actually about security? Who knows! | |||||||||||||||||||||||||||||||||||||||||
| ▲ | masfuerte 19 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||
There are security issues in the C implementation they currently use. They could remove this without breaking anything by incorporating the JS XSLT polyfill into the browser. But they won't because money. | |||||||||||||||||||||||||||||||||||||||||
| ▲ | bawolff 20 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
Didn't this come pretty directly after someone found some security vulns? I think the logic was, this is a huge chunk of code that is really complex which almost nobody uses outside of toy examples (and rss feeds). Sure, we fixed the issue just reported, but who knows what else is lurking here, it doesn't seem worth it. As a general rule, simplifying and removing code is one of the best things you can do for security. Sure you have to balance that with doing useful things. The most secure computer is an unplugged computer but it wouldn't be a very useful one; security is about tradeoffs. There is a reason though that security is almost always cited - to some degree or another, deleting code is always good for security. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| ▲ | JimDabell 20 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
> Finding and exploiting 20-year-old bugs in web browsers > Although XSLT in web browsers has been a known attack surface for some time, there are still plenty of bugs to be found in it, when viewing it through the lens of modern vulnerability discovery techniques. In this presentation, we will talk about how we found multiple vulnerabilities in XSLT implementations across all major web browsers. We will showcase vulnerabilities that remained undiscovered for 20+ years, difficult to fix bug classes with many variants as well as instances of less well-known bug classes that break memory safety in unexpected ways. We will show a working exploit against at least one web browser using these bugs. — https://www.offensivecon.org/speakers/2025/ivan-fratric.html — https://www.youtube.com/watch?v=U1kc7fcF5Ao > libxslt -- unmaintained, with multiple unfixed vulnerabilities — https://vuxml.freebsd.org/freebsd/b0a3466f-5efc-11f0-ae84-99... | |||||||||||||||||||||||||||||||||||||||||
| ▲ | willseth 15 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
It's true that there are security issues, but it's also true that they don't want to put any resources into making their XSLT implementation secure. There is strong unstated subtext that a huge motivation is that they simply want to rip this out of Chrome so they don't have to maintain it at all. | |||||||||||||||||||||||||||||||||||||||||
| ▲ | throw_m239339 14 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
Especially when Google largely has the money to maintain the alleged unsecure library... of course it's an excuse to break the web once again. XSLT is fantastic. You just feed it an XML file and it can change it into HTML, without any need for javascript. | |||||||||||||||||||||||||||||||||||||||||
| ▲ | chrismorgan 18 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
> example.com needs to review the security of your connection before proceeding. This text from Cloudflare challenge pages is just a flat-out lie. | |||||||||||||||||||||||||||||||||||||||||
| ▲ | Devasta 21 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||
Its "Security" when they want to do a thing, its "WebCompat" when they don't. | |||||||||||||||||||||||||||||||||||||||||