Do not report security vulnerabilities through public GitHub issues.
Please use the Private Vulnerability Disclosure feature of GitHub.
Include as much of the following information:
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- The distribution affected or used to help us with reproduction of the issue
- Step-by-step instructions to reproduce the issue
- Ideally a reproduction repository
- Impact of the issue, including how an attacker might exploit the issue
We prefer to receive reports in English.
Please disclose a vulnerability or security relevant issue here: https://github.com/tauri-apps/plugins-workspace/security/advisories/new.
Alternatively, you can also contact us by email via [email protected].
As there are only the scan
and cancel
commands exposed to the frontend,
there is no additional risk or exposure of additional information.
Only barcodes are passed and no raw camera access is used, which means no images are available to the frontend.
The application is only usable on iOS and Android and therefore the specific mobile operating system security boundaries need to be considered.
- The QR code parsing into a link/text is trusted and correctly handled by the mobile operating system
- The link itself is untrusted and additional validation/sanitization needs to be handled by the app developer
- The camera is not passing images to the app
- The camera permission is granted at first use by the user and can be revoked at any time
- The Android manifest also states that the camera permission is required
The following threat is either caused by a malicious developer, which has further implications and should be considered as a full compromise of an application or system, or by compromise of the application frontend. In the second case there are several impact minimization methods (e.g. the CSP) and if all of these fail the possible risk could occur. Therefore it is unlikely to occur in most cases but should be considered when using this plugin.
The camera has two modes. The first one is where the user can see the background camera image and no further interaction is possible. The second mode allows the developer to assist the user and add a transparent overlay to the image, providing hints or additional information (like a link preview). The overlay could be made non-transparent by the application frontend and as long as the app is open (and in some cases) it could read QR codes in range of the camera lense.
- Exploits in the operating system QR code parsing functionality
- Exploits based on the string passed to the application using this plugin
- Continous camera/QR scan usage even when application is in background
There is no additional exposure aside from reading barcodes in the webview and there are no specific best practices for secure usage.