Open Bug 1960648 Opened 8 months ago Updated 7 months ago

Limit DetectJSHacks to just general.config.sandbox

Categories

(Firefox :: Security, task)

task

Tracking

()

People

(Reporter: tschuster, Unassigned)

References

Details

The function nsContentSecurityUtils::DetectJsHacks is supposed to detect users that run with custom userChromeJS modifications. The result of that function is used to weaken certain restrictions about what kind of scripts are allowed to execute.

Currently this function checks a four different preferences that can indicate the usage of userChromeJS: xpinstall.signatures.required, general.config.filename, autoadmin.global_config_url and autoadmin.failover_to_cached.

The plan is to change this to general.config.sandbox: false, which must be set when trying to load an AutoConfig without sandboxing. Exclusively for eval (and similar like new Function) we also have the additional pref security.allow_unsafe_dangerous_privileged_evil_eval introduced in Bug 1958232.

Summary: Limit DetectJSHacks to just → Limit DetectJSHacks to just general.config.sandbox
Depends on: 1960652
See Also: → 1968479
You need to log in before you can comment on or make changes to this bug.