Closed Bug 163768 Opened 22 years ago Closed 22 years ago

Prevent web content from accessing non-XBL anonymous content

Categories

(Core :: Security, defect)

x86
Linux
defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 164086

People

(Reporter: john, Assigned: john)

References

Details

Some of our inputs use anonymous content, particularly input type=text input type=file. It is a Bad Thing when users access this stuff. We should put a check in the JS wrapper / classinfo code that prevents creation of a wrapper if: (1) the content is anonymous (this could be a bit in mFlags for efficient checking) (2) the content is non-XBL (we think bindingParent will tell us this--need to ensure that bindingParent is null in the case of anonymous children of an input type=file that is itself an anonymous child of XBL) (3) web content is accessing it This preemptively strikes a whole class of input type=file exploits and prevents users from meddling where they aren't wanted. Chrome could create a JS wrapper and hand it to web content, but that is a less likely situation (at least in the current world).
Also, when this gets fixed we should get rid of the fix for bug 163598 since it will be redundant.
Status: NEW → ASSIGNED
Depends on: 163598
Since this alludes to what the fix is for 163598 (and thus making guessing the security bug easier), marking this security sensitive to be on the safe side.
Group: security?
We went with this solution for bug 164086. *** This bug has been marked as a duplicate of 164086 ***
Status: ASSIGNED → RESOLVED
Closed: 22 years ago
Resolution: --- → DUPLICATE
Group: security
You need to log in before you can comment on or make changes to this bug.