Closed Bug 1826709 Opened 2 years ago Closed 2 years ago

Prevent /json/* pages from being loaded within an iframe

Categories

(Remote Protocol :: CDP, defect, P1)

defect
Points:
1

Tracking

(firefox-esr102 wontfix, firefox111 wontfix, firefox112 wontfix, firefox113 fixed)

RESOLVED FIXED
113 Branch
Tracking Status
firefox-esr102 --- wontfix
firefox111 --- wontfix
firefox112 --- wontfix
firefox113 --- fixed

People

(Reporter: whimboo, Assigned: whimboo)

Details

(Keywords: sec-low, Whiteboard: [webdriver:m6][adv-main113-])

Attachments

(1 file)

To prevent leaking connection details for the HTTP endpoints of the CDP implementation to any particular website (see the issue for Chromium) we should stop loading the various /json/* pages within an iframe.

As discussed with Freddy on Slack this is mostly sec-want / sec-low. But I would like to get this fixed to not leak the details, which could be used for potential other security attacks.

Thinking about this some more, the targetId leaking through e.g., someone screenshotting an evil page (and then putting the json endpoints into an iframe) is probably a leak that we should plug, but definitely not so severe given that we restrict access across origins. Thank you for filing this, Henrik!

Keywords: sec-low

[CDP] Prevent "/json/*" pages from being loaded within an iframe. r=webdriver-reviewers,freddyb,jdescottes
https://hg.mozilla.org/integration/autoland/rev/c741548492665b3b9d65c2eba245be95d2191a86
https://hg.mozilla.org/mozilla-central/rev/c74154849266

Group: firefox-core-security → core-security-release
Status: ASSIGNED → RESOLVED
Closed: 2 years ago
Resolution: --- → FIXED
Target Milestone: --- → 113 Branch
Whiteboard: [webdriver:m6] → [webdriver:m6][adv-main113-]
Group: core-security-release
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: