Open
Bug 980333
Opened 11 years ago
Updated 16 days ago
Ensure devtools/styleeditor/styleeditor.xul is free of inline script
Categories
(DevTools :: Style Editor, task, P2)
Tracking
(Not tracked)
NEW
People
(Reporter: mgoodwin, Unassigned)
References
(Blocks 1 open bug)
Details
There's some script values attributes (oncommand and onpopupshowing) and some inline script.
Comment 2•11 years ago
|
||
We've had a few cases where people have managed to inject stuff into the tools. A made up example which is somewhat similar to a real attack is a specially crafted font name "Arial <script>alert("XSS!")</script>".
So we'd like to apply CSP saying 'no scripts from the page', which means we need to get rid of all the scripts on the page.
Flags: needinfo?(mgoodwin)
Reporter | ||
Comment 3•11 years ago
|
||
(In reply to Heather Arthur [:harth] from comment #1)
> Why do we need to get rid of them?
We'd like to apply CSP (CSP almost completely eliminates XSS; we occasionally have issues with this in bits of the browser UI where, for obvious reasons, it's a really bad thing).
Platform work is underway to make this possible (e.g. applying CSP to documents with a system principal, applying CSP to XUL documents) but front end work is needed to ensure nothing breaks when a strict-enough-to-be-useful* policy is applied.
*strict enough to be useful in this context means "would stop an attacker injecting scripts or styles" (styles because -moz-binding)
Updated•6 years ago
|
Product: Firefox → DevTools
Updated•2 years ago
|
Severity: normal → S3
Updated•16 days ago
|
Type: defect → task
You need to log in
before you can comment on or make changes to this bug.
Description
•