Closed
Bug 1434634
(CVE-2019-9808)
Opened 7 years ago
Closed 6 years ago
Incomplete fix of bug 1366357
Categories
(Firefox :: Site Identity, defect, P3)
Firefox
Site Identity
Tracking
()
People
(Reporter: s.h.h.n.j.k, Assigned: johannh)
References
Details
(Keywords: csectype-spoof, sec-low, Whiteboard: [fixed by bug 1371741][post-critsmash-triage][adv-main66+])
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.119 Safari/537.36
Steps to reproduce:
1. Go to https://vuln.shhnjk.com/iframer.php?url=//test.shhnjk.com/permission.html
2. Click on "Cam Data" button
Actual results:
Permission notification says "Unknown origin" is requesting permission.
Expected results:
Bug 1366357 fix made "Unknown protocol" to "Unknown origin", which I don't think solved the issue of confusing permission request.
Tested in Latest Nightly.
Updated•7 years ago
|
Component: Untriaged → Site Identity and Permission Panels
Summary: Incomplete fix of Bug 1366357 → Incomplete fix of bug 1366357
Comment 1•7 years ago
|
||
Johann, can you take a look? Off-hand, I would imagine we should prompt for the origin that created the blob?
Flags: needinfo?(jhofmann)
Updated•7 years ago
|
Updated•7 years ago
|
Keywords: csectype-spoof,
sec-low
Assignee | ||
Comment 2•7 years ago
|
||
This will be fixed by bug 1371741 by disallowing null-principals from accessing data:, which is why I ignored the issue in bug 1366357. I'm not sure what the status of bug 1371741 is. I have a patch waiting for jib to review there so I'll defer to him to sort out this bug :)
Status: UNCONFIRMED → NEW
Ever confirmed: true
Flags: needinfo?(jhofmann) → needinfo?(jib)
Priority: -- → P3
Assignee | ||
Comment 3•7 years ago
|
||
> disallowing null-principals from accessing data:
I meant from accessing getUserMedia :)
Reporter | ||
Comment 4•7 years ago
|
||
Okay, seems like CSP sandbox is not considered in WebRTC permission.
PoC
https://shhnjk.azurewebsites.net/csp_sandbox.php?csp=allow-scripts&xss=%3Cscript%3Enavigator.mediaDevices.getUserMedia({video:%20{facingMode:%20%27user%27}})%3C/script%3E
It shows origin based on URL and does not check whether Document is sandbox. Should I file this as a separate bug?
Flags: needinfo?(jhofmann)
Assignee | ||
Comment 5•7 years ago
|
||
Hm, that's the same thing, it's a null principal so it should just get disallowed in bug 1371741. I'll try to get a hold of jib for answering this...
Flags: needinfo?(jhofmann)
Reporter | ||
Comment 6•7 years ago
|
||
Oh, yeah it's clearly mentioned there :D Sorry :P
Assignee | ||
Comment 7•7 years ago
|
||
No worries, thanks for looking into this!
Assignee | ||
Comment 8•6 years ago
|
||
Now that bug 1371741 got fixed I think we can close this as done as well, Jun, can you confirm that you can no longer request permissions for "Unknown Origin" in the latest Nightly?
Assignee: nobody → jhofmann
Status: NEW → RESOLVED
Closed: 6 years ago
status-firefox59:
affected → ---
status-firefox60:
affected → ---
status-firefox65:
--- → wontfix
status-firefox66:
--- → fixed
Flags: needinfo?(jib) → needinfo?(s.h.h.n.j.k)
Resolution: --- → FIXED
Whiteboard: [fixed by bug 1371741]
Updated•6 years ago
|
Group: firefox-core-security → core-security-release
status-firefox64:
--- → wontfix
status-firefox-esr60:
--- → wontfix
Updated•6 years ago
|
Flags: qe-verify+
Updated•6 years ago
|
Whiteboard: [fixed by bug 1371741] → [fixed by bug 1371741][post-critsmash-triage]
Comment 9•6 years ago
|
||
Jun, does this issue still need verification?
If yes, can you explain exactly what should be verified?
I could confirm the fix in all the main OSes.
Thank you for your contribution!
Reporter | ||
Comment 10•6 years ago
|
||
Sorry just noticed this. I can confirm that this is fixed in Nightly :)
Flags: needinfo?(s.h.h.n.j.k)
Assignee | ||
Comment 11•6 years ago
|
||
Thanks Jun, I think that's enough to verify :)
Status: RESOLVED → VERIFIED
Updated•6 years ago
|
Whiteboard: [fixed by bug 1371741][post-critsmash-triage] → [fixed by bug 1371741][post-critsmash-triage][adv-main66+]
Updated•6 years ago
|
Alias: CVE-2019-9808
Updated•5 years ago
|
Group: core-security-release
You need to log in
before you can comment on or make changes to this bug.
Description
•