Open
Bug 1494457
Opened 6 years ago
Updated 2 years ago
PBackgroundLocalStorageCache, PBackgroundSDBConnection, PCacheStorage can be constructed with fraudulent principal, origin, private browsing id
Categories
(Core :: Storage: localStorage & sessionStorage, enhancement, P3)
Core
Storage: localStorage & sessionStorage
Tracking
()
NEW
Fission Milestone | Future |
People
(Reporter: tjr, Unassigned)
References
(Depends on 1 open bug, Blocks 1 open bug)
Details
In PBackground.ipdl, the following methods accept a principal, origin, and/or privatebrowsingId and uses it to construct actors which contains those values as members. - PBackgroundSDBConnection - PBackgroundLocalStorageCache - PCacheStorage A Rogue Content Process could supply fraudulent values to these Actor Constructor and operate on another origin's data. The supplied principal/etc should be checked to ensure that the supplied data is valid for this content process.
Updated•6 years ago
|
Priority: -- → P3
Updated•2 years ago
|
Severity: normal → S3
You need to log in
before you can comment on or make changes to this bug.
Description
•