Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Induce Bitwarden to autofill a password as an extraction code in the PsiTransfer web page. #238

Open
YamatoRyou opened this issue Aug 29, 2022 · 1 comment

Comments

@YamatoRyou
Copy link

YamatoRyou commented Aug 29, 2022

I deployed a PsiTransfer instance in Docker, the web address is http://192.168.0.x:21xxx. At the same time, http://192.168.0.x:5xxx is the address of Synology's web desktop. The browser uses Bitwarden is used to automatically fill in the password when logging in. But this caused a problem: Bitwarden found the text box with the element ID password in the PsiTransfer web page, and automatically filled the password here. The password here is used to log in http://192.168.0.x:5xxx, my password will be leaked a little accidentally.

Under the premise of refusing to give up the autofill password, the current temporary solution is: use Tampermonky to inject code into the PsiTransfer web page, the purpose is to modify the element ID of the extraction code text box to other, to avoid Bitwarden autofill.

{9E17C55F-D225-D5BE-474D-0D44661E4F9F}

@YamatoRyou
Copy link
Author

I switched to another method: modify upload.js and mount it inside the container /app/public/app/ Replace the file with the same name.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant