Closed Bug 705651 (CVE-2012-0446) Opened 13 years ago Closed 13 years ago

Frame scripts that access untrusted objects are exploitable

Categories

(Core :: Security, defect)

x86
Windows XP
defect
Not set
normal

Tracking

()

VERIFIED FIXED
mozilla11
Tracking Status
firefox8 --- wontfix
firefox9 --- wontfix
firefox10 + verified
firefox11 + verified
firefox-esr10 --- unaffected
status1.9.2 --- unaffected

People

(Reporter: moz_bug_r_a4, Assigned: smaug)

References

Details

(Keywords: verified-beta, Whiteboard: [sg:critical][qa!][secr:dveditz])

Attachments

(4 files)

Frame scripts run on the special JS context for which we call SetSecurityManagerForJSContext with flags=0, thus if a frame script calls into an untrusted function, XPConnect does not do proper security checks.
Nice :( mrbkap, what kinds of flags can be passed to SetSecurityManagerForJSContext? There is no documentation in nsIXPConnect nor in nsXPConnect.cpp
Assignee: nobody → bugs
I'm pretty sure 0 is passed because it is (or was) passed also here http://mxr.mozilla.org/mozilla2.0/source/dom/src/threads/nsDOMThreadService.cpp#1075
Hey Olli. I don't think you actually need to call SetSecurityManagerForJSContext at all. That function is useful if a given context needs to use a different security manager from the rest of the runtime. However, in most cases, we can just use the one that's installed on XPConnect itself. On the other hand, using HOOK_ALL would also fix this bug.
Attached patch patchSplinter Review
Create a helper method.
Attachment #577535 - Flags: review?(mrbkap)
Comment on attachment 577535 [details] [diff] [review] patch Review of attachment 577535 [details] [diff] [review]: ----------------------------------------------------------------- I mentioned on IRC that the reason that web workers got away with this (before the recent rewrite) is that they truly used object capabilities to protect themselves. Furthermore, they couldn't use the script security manager off the main thread, and therefore wanted to *prevent* calls to the SSM. Because there was nothing around to protect, this was safe. ::: content/base/src/nsFrameMessageManager.cpp @@ +840,5 @@ > + > + JSAutoRequest ar(cx); > + nsIXPConnect* xpc = nsContentUtils::XPConnect(); > + const PRUint32 flags = nsIXPConnect::INIT_JS_STANDARD_CLASSES | > + /*nsIXPConnect::OMIT_COMPONENTS_OBJECT ? |*/ I doubt you want this flag. It's only useful if you want to cut the scripts you're going to be running off from XPCOM entirely.
Attachment #577535 - Flags: review?(mrbkap) → review+
Yeah, that flag has been there since the beginning when it wasn't sure whether we want to expose components to frame scripts or let them do only simpler things. I'll remove that.
Status: NEW → RESOLVED
Closed: 13 years ago
Resolution: --- → FIXED
I'll prepare patches for aurora and beta.
Attached patch for auroraSplinter Review
The only difference to trunk is that trunk doesn't have | JSOPTION_JIT
Attachment #578220 - Flags: approval-mozilla-aurora?
Attachment #578220 - Attachment description: for aurota → for aurora
In beta there is also JS_SetScriptStackQuota and JSOPTION_ANONFUNFIX |
Now tracking for FF9/10, and added the sec-review-needed keyword. Please address possible risk for taking on aurora/beta.
Whiteboard: [qa+]
There is little risk here, we should take this for aurora (fx10)
Whiteboard: [qa+] → [sg:critical][qa+][secr:dveditz]
little risk from the patch, I mean! It's a bad security hole that's probably exploitable through several addons and definitely exploitable through an XSS on AMO.
Attachment #578220 - Flags: approval-mozilla-aurora? → approval-mozilla-aurora+
Target Milestone: --- → mozilla11
Alias: CVE-2012-0446
Blocks: 698772
Verified fixed in Firefox 11.0b6.
Verified fixed in Firefox Aurora.
Verified fixed in Firefox Nightly.
Status: RESOLVED → VERIFIED
Whiteboard: [sg:critical][qa+][secr:dveditz] → [sg:critical][qa!][secr:dveditz]
Group: core-security
Flags: sec-review+
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: