Closed
Bug 163768
Opened 22 years ago
Closed 22 years ago
Prevent web content from accessing non-XBL anonymous content
Categories
(Core :: Security, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 164086
People
(Reporter: john, Assigned: john)
References
Details
Some of our inputs use anonymous content, particularly input type=text input
type=file. It is a Bad Thing when users access this stuff. We should put a
check in the JS wrapper / classinfo code that prevents creation of a wrapper if:
(1) the content is anonymous (this could be a bit in mFlags for efficient checking)
(2) the content is non-XBL (we think bindingParent will tell us this--need to
ensure that bindingParent is null in the case of anonymous children of an input
type=file that is itself an anonymous child of XBL)
(3) web content is accessing it
This preemptively strikes a whole class of input type=file exploits and prevents
users from meddling where they aren't wanted. Chrome could create a JS wrapper
and hand it to web content, but that is a less likely situation (at least in the
current world).
Assignee | ||
Comment 1•22 years ago
|
||
Also, when this gets fixed we should get rid of the fix for bug 163598 since it
will be redundant.
Status: NEW → ASSIGNED
Depends on: 163598
Comment 2•22 years ago
|
||
Since this alludes to what the fix is for 163598 (and thus making guessing the
security bug easier), marking this security sensitive to be on the safe side.
Group: security?
Assignee | ||
Comment 3•22 years ago
|
||
We went with this solution for bug 164086.
*** This bug has been marked as a duplicate of 164086 ***
Status: ASSIGNED → RESOLVED
Closed: 22 years ago
Resolution: --- → DUPLICATE
Updated•22 years ago
|
Group: security
You need to log in
before you can comment on or make changes to this bug.
Description
•