Closed Bug 883950 Opened 11 years ago Closed 11 years ago

[sms] xss vulnerability with contacts handling in the recipients editor when getting an activity

Categories

(Firefox OS Graveyard :: Gaia::SMS, defect)

ARM
Gonk (Firefox OS)
defect
Not set
major

Tracking

(blocking-b2g:leo+, b2g18 fixed, b2g18-v1.0.1 unaffected)

RESOLVED FIXED
1.1 QE3 (26jun)
blocking-b2g leo+
Tracking Status
b2g18 --- fixed
b2g18-v1.0.1 --- unaffected

People

(Reporter: julienw, Assigned: oconnore)

Details

(Keywords: regression, sec-critical)

Attachments

(1 file)

STR: - Create a contact with name '<blink> Hola </blink>' - Tap on the 'message icon' EXPECTED: You will try to send a SMS/MMS to a text <blink> Hola </blink> CURRENTLY: 'Hola' is blinking! Please check other possibilities of injection in the recipients editor too. see also bug 824437 and bug 883616 for other examples of XSS Injection
Will need leo+ for this, this is an injection through activities. I wonder if we can also make the pattern filter used for activities more strict (in addition to making the code more robust of course)
Flags: needinfo?(dietrich)
blocking-b2g: leo? → leo+
Flags: needinfo?(dietrich)
Adding eric to CC to see if he wants to take this bug.
Assignee: nobody → eric
Eric, any update there ?
I have a patch, I am fixing the unit tests.
Target Milestone: --- → 1.1 QE3 (26jun)
Attached file Pull request on github
Attachment #768120 - Flags: review?(felash)
Attachment #768120 - Flags: review?(gnarf37)
Comment on attachment 768120 [details] [review] Pull request on github Added some comments on the pull request
Attachment #768120 - Flags: review?(felash)
Comment on attachment 768120 [details] [review] Pull request on github r=me
Attachment #768120 - Flags: review?(gnarf37) → review+
master: cee375743267335a4590cd4ba93b9129a179166d v1-train: 5bafa880efe499ceee234807d88bf0752d6960fe
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
Correction: master: b9a009103bd70ec77eb8ec9472a943e38d8219b1
Attachment mime type: text/plain → text/x-github-pull-request
Hey Paul, now that 1.1 is out, can we remove the protection on this bug?
Flags: needinfo?(ptheriault)
Note that accoding to the flags it never affected 1.0.
Yes I think that is ok.
Group: core-security
Flags: needinfo?(ptheriault)
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: