W3C home > Mailing lists > Public > www-forms@w3.org > March 2003

XForms - Secure or Insecure?

From: <AndrewWatt2001@aol.com>
Date: Thu, 13 Mar 2003 08:26:20 EST
Message-ID: <d.bf6720c.2ba1e0fc@aol.com>
To: xforms@yahoogroups.com, www-forms@w3.org, www-forms-editor@w3.org

I thought it would be useful ... hopefully in the sense of eliciting 
well-founded reassurance .. to raise a couple of security questions that I 
have regarding XForms.

There are two potential sources of security concern:
1. That a malicious XForms-containing document can upload files from a user's 
computer without their knowledge
2. A malicious XForms-containing document could download a virus or other 
nasty to the user's computer.

Let me explain how these undesirable situations might potentially arise.

The general background is that an XForms-containing document may have more 
than one XForms model. The security concerns that I am raising could be 
hidden in one XForms model while another XForms model produces the 
functionality that the user wants or needs.

1. File Upload - In principle it seems possible as the Candidate 
Recommendation is drafted that a file could be uploaded from the user's 
computer in response to any arbitrary event. For example the file could be 
uploaded as soon as the XForms completes initialization. One scenario is that 
the content of the file in question is loaded into an <xforms:instance> and 
is later "submitted" to an arbitrary URL chosen by the author of the 
malicious code. If the XForms author sets the replace attributes on <
xforms:submission> to a value of "none", the user may have no knowledge that 
the file has been "stolen" from their computer.

2. Virus Implantation - In principle a hidden XForms model could obtain its 
instance data from an arbitrary URL, with no indication that malicious code 
has been downloaded into the instance data, using the src attribute on <
xforms:instance>. As with scenario 1, an arbitrary event could be used to 
"submit" i.e. save the malicious code to the user's computer using a file 
URL.

Given that an XForms-containing document could contain more than two XForms 
models, then a combined upload/virus implantation attack would be 
theoretically possible.

I assume that the intent of the WG is that XForms implementers provide some 
form (pun intended) of sandbox to prevent such malicious practices. However, 
the current CR seems to rely largely on implementers' common sense ... a 
dangerous commodity where security is concerned ... rather than provide a 
detailed consideration of the risks (perhaps only simply to dismiss them?) 
and solution for these potential security concerns.

I would welcome comments on whether the scenarios which I describe are 
realistic and, assuming that, on what the most appropriate way(s) forward are 
to ensure that XForms-containing documents cannot be used for malicious 
purposes.

If XForms is to be accepted as an appropriate vehicle for handling valuable 
and sensitive business data, it is critical that there is well-founded 
confidence in the security provided by XForms implementations.

Andrew Watt
Received on Thursday, 13 March 2003 08:26:41 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Saturday, 10 March 2012 06:21:54 GMT