Cloned iframe in addon is blocked by CSP
Categories
(Core :: DOM: Security, defect, P5)
Tracking
()
| Tracking | Status | |
|---|---|---|
| firefox59 | --- | affected |
People
(Reporter: calixte, Unassigned)
References
(Blocks 1 open bug)
Details
(Whiteboard: [domsecurity-backlog])
Attachments
(1 file)
|
665 bytes,
application/gzip
|
Details |
Comment 1•8 years ago
|
||
Updated•8 years ago
|
Comment 2•8 years ago
|
||
Comment 3•8 years ago
|
||
Comment 4•8 years ago
|
||
Comment 5•8 years ago
|
||
Updated•8 years ago
|
Comment 6•5 years ago
|
||
(In reply to Daniel Veditz [:dveditz] from comment #5)
(In reply to Kris Maglione [:kmag] (long backlog; ping on IRC if you're
blocked) from comment #3)I intentionally ignored the cloneNode case, and I'm still on the fence about
whether we should handle it.Why wouldn't we allow it? It's still something the add-on is doing, and we
allow the equivalent effect of the add-on inspecting the node and creating a
new copy property by property.
Because it might mean an extension cloning an arbitrary node from a web page and accidentally giving it extra privileges. It might be reasonable to just copy the original origin principals when we clone the node, but even that would be different than explicitly copying the attributes, since the latter would always set the extension principal as the origin.
Updated•3 years ago
|
Description
•