Closed Bug 1040684 Opened 11 years ago Closed 11 years ago

Thimble xss

Categories

(Webmaker Graveyard :: Thimble, defect, P1)

x86_64
Windows 7

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 765340

People

(Reporter: vergil901, Unassigned)

Details

Attachments

(4 files)

Attached image thimble.mozilla.png
thimble.mozilla is vulnerable to xss. Please confirm me whether its a valid vulnerability or the javascript execution is allowed on this page.
Hi Umer Shakil, Thimble is designed to run JS through the preview iframe, which is hosted on a different domain (mozillathimblelivepreview.net) . If you are able to get JS to execute in the context of thimble.webmaker.org, then please re-open.
Status: UNCONFIRMED → RESOLVED
Closed: 11 years ago
Resolution: --- → DUPLICATE
Component: Communications → Thimble
Summary: cross site scripting → Thimble xss
Attached image 1.png
is this what you asked for? i entered the script in the context and when its runs its gives the script alert.
Attached image 2.png
is this what you asked for? i entered the script in the context and when its runs its gives the script alert.
Attached image 3.png
user cookie
any updates?
Hi Umer, none of the screenshots you have provided show a valid vulnerability, because Javascript is allowed to run in two contexts: the editor preview and makes.org. When you use JavaScript inside the editor, we postMessage the entire page to an iframe running on https://mozillathimblelivepreview.net, which has no user cookies or user data. See the domain of my alert() box here: https://www.dropbox.com/s/yybenyvj0ulo3gt/Screenshot%202014-07-21%2012.51.07.png . Thimble publishes pages to <username>.makes.org which is a separate domain that only contains user data. User logins are not set on makes.org. If you are able to get Javascript to execute in the context of thimble.webmaker.org, then please re-open.
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: