Closed Bug 411791 Opened 17 years ago Closed 14 years ago

Content Restriction tests that reflect the threat model

Categories

(Core :: Security, defect)

x86
All
defect
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: sayrer, Assigned: bsterne)

References

Details

This should be a set of HTML pages, and a PAC file that aliases evil.example.com.

At a minimum, it should test inline scripts, javascript URLs, all event handler attributes (onclick, etc), plugins, frames, data urls, and XBL.
Blocks: 390910
The plugin tests should include malicious Java plugins and Flash plugins.
Also LiveConnect
Assignee: dveditz → nobody
Brandon's on this, I believe.  We can probably get some whitehat help once the basics are up and running, so I think front-loading this work probably pays off.
Assignee: nobody → bsterne
Flags: wanted1.9.1+
These tests have been checked in with the CSP patches in bugs 515433, 515437, 515442, 515443, and 515458.  There are also a few more that will be checked in with bug 515460 in the next week or two.
Status: NEW → RESOLVED
Closed: 14 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.