iframe-to-iframe cross-domain extraction method (UI Redressing)
Categories
(Core :: DOM: Copy & Paste and Drag & Drop, defect)
Tracking
()
People
(Reporter: luca.defulgentis, Unassigned)
References
()
Details
(Keywords: csectype-spoof, sec-moderate, Whiteboard: domcore-bugbash-triaged)
Attachments
(1 file)
|
313 bytes,
text/html
|
Details |
Updated•13 years ago
|
Updated•13 years ago
|
Comment 1•13 years ago
|
||
Comment 2•13 years ago
|
||
Comment 3•13 years ago
|
||
Comment 5•12 years ago
|
||
Comment 6•12 years ago
|
||
Updated•3 years ago
|
Comment 7•7 months ago
|
||
This came up in the DOM Core bug bash triage. Dan, is this still relevant?
Comment 8•6 months ago
|
||
Yes, Firefox is still unsafe compared to other browsers.
The specific attack outlined in the nibblesec blog won't work anymore because we restricted the ability to open view-source: URLs in bug 1172165, but as Jesse noted in comment 3, anything sensitive/private that's rendered in the document is still fair game for this attack.
Comment 9•6 months ago
|
||
This testcase uses the default <textarea> drop behavior, nothing fancy. In Firefox you can't drag any text or the link out of the example.com frame and drop it on the parent document textarea, but you can still drag it to the textarea in a frame from a different origin. Here that frame happens to be same-origin with the parent for convenience, but we shouldn't allow drags to any other cross-origin frame either (an attacker can easily have two domains).
Compare the behavior in Chrome or Safari: these drops are not allowed.
Description
•