Re: Clipboard API: Stripping script element

> The current clipboard API specification mentions security risks
> of copy & paste but doesn't seem to explicitly mention methods by
> which user agents deal with such security risks.



Hi Ryosuke,
I did remove the section on cleaning up content because it was not implemented by anyone and seemed unlikely to be - but there is some advice in section 8.1 ("Security risks"). It mentions "The user might paste malicious JavaScript into a trusted page." among the risks and suggests (in the table) that the UA may sanitize content that comes from a different origin. I assume you want some more details added here, right?


> In particular, WebKit has been stripping script element from the
> pasted content but this may have some side effects on CSS rules.]



AFAIK (without re-testing right now), WebKit's implementation is: 
* rich text content that is pasted into a page without JS handling it is sanitized (SCRIPT, javascript: links etc removed)
* a paste event listener that calls getData('text/html') will get the full, pre-sanitized source


If that's correct I can add a short description of this to the spec, in the informative section.

-- 
Hallvord R. M. Steen
Core tester, Opera Software

Received on Thursday, 28 March 2013 09:33:51 UTC