• ReversalHatchery@beehaw.org
    link
    fedilink
    arrow-up
    6
    ·
    22 days ago

    I clicked through the source article, and it sounds like this is specifically a windows thing: original article says that when a windows machine loads the malicious SVG, the malicious JS is parsed in a Microsoft Edge browser process, regardless of the browser a user visited the porn site with (apparently all Windows SVGs load through Edge).

    what the actual fuck? does that mean that even if I only use firefox, edge is involved in loading SVGs? how??

      • ReversalHatchery@beehaw.org
        link
        fedilink
        arrow-up
        3
        ·
        22 days ago

        that does not explain how does it happen when the svg appears on a page in firefox. firefox won’t try to open all embedded assets with the default file handler in the OS, it will directly use its built in tools to handle it.

    • purplemonkeymad@programming.dev
      link
      fedilink
      arrow-up
      3
      ·
      22 days ago

      I think it’s saying that the default association for SVG is edge, as setting a default browser does not change that. If you use another image viewer for SVG it might behave differently.

      • ReversalHatchery@beehaw.org
        link
        fedilink
        arrow-up
        2
        ·
        22 days ago

        but how does edge get opened? firefox, and pretty sure chrome too, aren’t searching the OS file associations for each asset they received from the site. they won’t decode the png images with Windows Photos or whatever, they will use their internal tools to process it.

        file associations would only affect if you open an svg file in the filesystem with a file manager. but I don’t see how edge gets into the picture when the user is just using another browser, because it’s rare that a user saves an SVG