Closed Bug 1444651 Opened 7 years ago Closed 7 years ago

Port Bug 1395508 to SeaMonkey

Categories

(SeaMonkey :: Location Bar, defect)

SeaMonkey 2.56 Branch
x86_64
All
defect
Not set
major

Tracking

(seamonkey2.49esr fixed, seamonkey2.53 fixed, seamonkey2.55 fixed, seamonkey2.56 fixed, seamonkey2.57esr fixed)

RESOLVED FIXED
seamonkey2.57
Tracking Status
seamonkey2.49esr --- fixed
seamonkey2.53 --- fixed
seamonkey2.55 --- fixed
seamonkey2.56 --- fixed
seamonkey2.57esr --- fixed

People

(Reporter: frg, Assigned: frg)

References

Details

(Keywords: sec-moderate)

Attachments

(2 files)

We are missing the patch for Bug 1395508 in SeaMonkey. https://hg.mozilla.org/mozilla-central/rev/a14cc3bd9643 I don't have access to the bug but from the changeset it seems that whitespaces may be displayed as spaces and push additional content out of the visible area: You can verify this when using the url from the tests: > + loadURL: "http://example.com/%E3%80%80%E3%80%80", > + expectedURL: "example.com/%E3%80%80%E3%80%80", > + copyExpected: "http://example.com/%E3%80%80%E3%80%80" SeaMonkey will display it as "http:/example.com/ " Should be fixed for 2.49.3
(In reply to Frank-Rainer Grahl (:frg) from comment #0) > I don't have access to the bug I've CC'd you. Sorry for not pro-actively flagging this up with you.
Thanks. The example applies 1:1 to SeaMonkey so as this isn't just copy paste setting sec-moderate as in bug 1395508.
Keywords: sec-lowsec-moderate
Attached file poc.html
address bar spoof using hebrew. poc.html <meta http-equiv="content-type" content="text/html;charset=utf-8"> <script> function aa(){ var link = document.createElement('a'); link.href = "https://xn--ggbla1c4e.xn--ngbc5azd/#"+Array(0x200).join("%20")+"סוֹ.סח"; link.target="aaaa"; document.body.appendChild(link); link.click(); } </script> <a onclick="aa();" href="javascript:void(0);">CLICK ME</a> Expected Result: https://اسماء.شبكة Rendered Results: https://no.io
Regex expression is not 1:1 because we filter out some more control chars later. [Approval Request Comment] Regression caused by (bug #): --- User impact if declined: security risk. Testing completed (on m-c, etc.): c-r 2.53 Risk to taking this patch (and alternatives if risky): trivial patch String changes made by this patch: --
Attachment #8957881 - Flags: review?(iann_bugzilla)
Attachment #8957881 - Flags: approval-comm-release?
Attachment #8957881 - Flags: approval-comm-esr52?
Attachment #8957881 - Flags: approval-comm-beta?
Comment on attachment 8957881 [details] [diff] [review] 1444651-PortBug1395508.patch LGTM r/a=me
Attachment #8957881 - Flags: review?(iann_bugzilla)
Attachment #8957881 - Flags: review+
Attachment #8957881 - Flags: approval-comm-release?
Attachment #8957881 - Flags: approval-comm-release+
Attachment #8957881 - Flags: approval-comm-esr52?
Attachment #8957881 - Flags: approval-comm-esr52+
Attachment #8957881 - Flags: approval-comm-beta?
Attachment #8957881 - Flags: approval-comm-beta+
Group: core-security-release
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: