Strip "javascript:" scheme when pasting/dropping into the address bar to prevent socially engineered self-XSS
Categories
(Focus :: General, defect)
Tracking
(Not tracked)
People
(Reporter: dveditz, Unassigned)
References
Details
(Keywords: sec-low)
+++ This bug was initially created as a clone of Bug #1725626 +++
Steps to reproduce:
Self UXSS have been identified in firefox andriod browser
,Normally while pasting javascript:URI in firefox desktop URLBAR/OMNIBOX the Javascript word is removed and also if we type also the XSS won't happen
.But in andriod browser it can be pasted and xss can done
1.Go to any website in firefox
2.Pase the url javascript:alert(1) or javascript:alert(document.cookie)
Actual results:
SELF UXSS
Expected results:
SELF UXSS
Reporter | ||
Comment 1•3 years ago
|
||
Unlike Fenix, Javascript:alert(1)
with a capital-J does not work, it has to be javascript:alert(1)
with an all lower-case scheme. Clearly there is different normalization going on in Focus. Or zero normalization and then a whitelist of allowed schemes?
Given the single-task nature of Focus it might be simplest to drop support for javascript:
in the addressbar entirely -- this is not exactly a power-user browser. It still does need to be supported in content since this is both valid and still common on sites.
In focus this issue has been fixed,Any updates about fix on firefox andriod browser?
Reporter | ||
Comment 3•3 years ago
|
||
This has not been fixed in Focus.
Reporter | ||
Updated•3 years ago
|
Comment hidden (duplicate) |
Comment 6•3 years ago
|
||
Cc to Amedyne to delegate to the Focus Android engineering team.
Comment hidden (duplicate) |
Comment 8•3 years ago
|
||
Working with the Focus Android team to evaluate this.
Comment 9•3 years ago
|
||
Focus uses the same browser toolbar as Fenix, from AC. This issue should be fixed by the same AC PR as Fenix.
Comment 10•3 years ago
|
||
This has been resolved.
Updated•3 years ago
|
Updated•3 years ago
|
Reporter | ||
Comment 11•3 years ago
|
||
As a MoCo employee I'm not eligible for a bug bounty. Essentially this is a dupe of the reporter's bug 1725626, which was a bug in the shared Android Components. I filed this dupe as a release-tracking placeholder.
Reporter | ||
Updated•3 years ago
|
Updated•2 years ago
|
Description
•