[META] expand CSP enforcement capabilities to include XUL features
Categories
(Core :: DOM: Security, enhancement, P3)
Tracking
()
People
(Reporter: freddy, Unassigned)
References
(Blocks 1 open bug)
Details
(Keywords: meta, Whiteboard: [domsecurity-meta])
Attachments
(1 file)
|
765 bytes,
application/x-php
|
Details |
| Reporter | ||
Comment 1•12 years ago
|
||
Comment 2•12 years ago
|
||
| Reporter | ||
Comment 3•12 years ago
|
||
| Reporter | ||
Comment 4•12 years ago
|
||
Comment 5•12 years ago
|
||
Updated•11 years ago
|
Updated•11 years ago
|
Updated•11 years ago
|
Comment 6•11 years ago
|
||
| Reporter | ||
Updated•11 years ago
|
| Reporter | ||
Comment 7•10 years ago
|
||
| Reporter | ||
Updated•10 years ago
|
| Reporter | ||
Comment 8•10 years ago
|
||
| Reporter | ||
Comment 9•10 years ago
|
||
| Reporter | ||
Updated•10 years ago
|
Comment 10•9 years ago
|
||
| Reporter | ||
Comment 11•9 years ago
|
||
Updated•9 years ago
|
Updated•9 years ago
|
Updated•7 years ago
|
Updated•7 years ago
|
Updated•6 years ago
|
Comment 12•5 years ago
|
||
Christoph, now that XBL is dead, do you know off-hand if other XUL oddities (like inline command event handlers) are already subject to CSP? If you don't know off-hand, don't worry about investigating, I can probably find a few moments to do it...
Updated•5 years ago
|
Comment 13•5 years ago
|
||
(In reply to :Gijs (he/him) from comment #12)
Christoph, now that XBL is dead, do you know off-hand if other XUL oddities (like inline command event handlers) are already subject to CSP? If you don't know off-hand, don't worry about investigating, I can probably find a few moments to do it...
Hey Gijs, I am not 100% sure but I guess that comment around oncommand handlers being subject to CSP within contentAreaDownloadsView.xhtml indicates that they are.
Comment 14•5 years ago
|
||
(In reply to Christoph Kerschbaumer [:ckerschb] from comment #13)
(In reply to :Gijs (he/him) from comment #12)
Christoph, now that XBL is dead, do you know off-hand if other XUL oddities (like inline command event handlers) are already subject to CSP? If you don't know off-hand, don't worry about investigating, I can probably find a few moments to do it...
Hey Gijs, I am not 100% sure but I guess that comment around oncommand handlers being subject to CSP within contentAreaDownloadsView.xhtml indicates that they are.
Oh right. Hm, in that case, maybe we're done here? Freddy?
| Reporter | ||
Comment 15•5 years ago
|
||
I'm entirely too new here to know anything about XUL, but a cursory look at https://developer.mozilla.org/en-US/docs/Archive/Mozilla/XUL/XUL_Reference tells me, this is good.
I've scanned for other elements that look "active" and stumbled upon <observe> and <broadcast> and <overlay> etc, but I don't think anything comes close to scripting. Maybe CSP support for XUL is OK?
NB: I also want to note that we're already sanitizing the badness out of everything that could look like DOM XSS in nsContentUtils::ParseHTML & ParseXML.
The protection we are missing without a CSP is for pages that are not generated by JavaScript during page-load/execution, but generated differently like about:cache, which is created from C++ code (but does have a CSP)
Updated•3 years ago
|
Description
•