Page can obtain path to Mozilla installation or possibly profile by examining JavaScript exceptions
Categories
(Core :: Security, defect, P3)
Tracking
()
Tracking | Status | |
---|---|---|
firefox75 | --- | fixed |
People
(Reporter: bugzilla, Assigned: bzbarsky)
References
(Blocks 1 open bug)
Details
(Keywords: privacy, sec-want, Whiteboard: [sg:want] stepping-stone [fingerprinting][fp-triaged][adv-main75-])
Attachments
(3 files)
Reporter | ||
Comment 1•20 years ago
|
||
Comment 2•20 years ago
|
||
Assignee | ||
Comment 3•20 years ago
|
||
Comment 4•20 years ago
|
||
Comment 5•20 years ago
|
||
Comment 6•20 years ago
|
||
Updated•20 years ago
|
Updated•19 years ago
|
Updated•19 years ago
|
Comment 7•19 years ago
|
||
Assignee | ||
Updated•19 years ago
|
Comment 8•19 years ago
|
||
Comment 9•19 years ago
|
||
Comment 10•19 years ago
|
||
Comment 11•19 years ago
|
||
Comment 12•19 years ago
|
||
Assignee | ||
Comment 13•19 years ago
|
||
Updated•19 years ago
|
Updated•19 years ago
|
Comment 14•19 years ago
|
||
Comment 15•19 years ago
|
||
Comment 16•19 years ago
|
||
Updated•19 years ago
|
Comment 17•19 years ago
|
||
Updated•18 years ago
|
Updated•17 years ago
|
Comment 18•17 years ago
|
||
Comment 19•17 years ago
|
||
Updated•17 years ago
|
Updated•16 years ago
|
Updated•15 years ago
|
Updated•12 years ago
|
Updated•7 years ago
|
Assignee | ||
Comment 21•7 years ago
|
||
Comment 22•6 years ago
|
||
Comment 23•6 years ago
|
||
Updated•6 years ago
|
Updated•6 years ago
|
Comment 24•6 years ago
|
||
We talked to :baku about this and he thinks we need to sanitize the direct injection case. We can look for an Exception in the JSContext, take it out, sanitize it if it's there, and then put it back. We can reuse the same type of sanitization we already have. But first we need to write a test to show it failing.
Comment 25•6 years ago
|
||
Updated•5 years ago
|
Assignee | ||
Comment 26•5 years ago
|
||
OK, I tried editing the testcase to from comment 25 make sense: to make the sandbox less privileged than the exported function, and to examine the state the sandbox sees, not the state the privileged caller sees.
As things stand, the sandbox ends up with a direct reference (via CCWs, of course) to the privileged exception, and attempting to get properties off it results in security errors.
Is that good enough, or do we still want to do some sort of sanitizing behavior to prevent those security errors?
Updated•5 years ago
|
Assignee | ||
Comment 27•5 years ago
|
||
Anyway, I posted a proposed fix that does the sanitizing at https://phabricator.services.mozilla.com/D35996
Assignee | ||
Comment 28•5 years ago
|
||
Updated•5 years ago
|
Comment 29•5 years ago
|
||
(In reply to Boris Zbarsky [:bzbarsky, bz on IRC] from comment #26)
Is that good enough, or do we still want to do some sort of sanitizing behavior to prevent those security errors?
It looks good to me.
Tom, can you take a look?
Comment 30•5 years ago
|
||
(In reply to Boris Zbarsky [:bzbarsky, bz on IRC] from comment #26)
OK, I tried editing the testcase to from comment 25 make sense: to make the sandbox less privileged than the exported function, and to examine the state the sandbox sees, not the state the privileged caller sees.
As things stand, the sandbox ends up with a direct reference (via CCWs, of course) to the privileged exception, and attempting to get properties off it results in security errors.
Is that good enough, or do we still want to do some sort of sanitizing behavior to prevent those security errors?
Truthfully I don't have a solid grasp of everything here, but it seems like it would be okay to me. Could one probe to see if a property exists (returns a security error) vs doesn't and infer something about the user's machine from it? That seems unlikely - they would probably just be able to infer something about the exception thrown which isn't concerning, because they caused it to be thrown.
Comment 31•5 years ago
|
||
Comment 32•5 years ago
|
||
Comment 33•5 years ago
|
||
bugherder |
https://hg.mozilla.org/mozilla-central/rev/942a92874526
https://hg.mozilla.org/mozilla-central/rev/039e8fd2928d
Updated•5 years ago
|
Description
•