[Bug 12469] Dynamic Cross-Site Scripting and Page Repainting

http://www.w3.org/Bugs/Public/show_bug.cgi?id=12469

Tab Atkins Jr. <jackalmage@gmail.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |jackalmage@gmail.com

--- Comment #2 from Tab Atkins Jr. <jackalmage@gmail.com> 2011-04-11 17:01:46 UTC ---
There doesn't appear to be anything new in this attack.  The basic attack
surface is still just a page author allowing users to put arbitrary content
into the document; all you've done is add an over-complicated way of letting
the attacking script pull extra resources from the server.  This is the same
bog-standard attack vector that has existed since the <script> tag was
invented.  Authors should always sanitize user input.

That said, the @sandbox attribute on <iframe> was created specifically to
address these sorts of situations.  Load the user's data in an iframe with the
sandbox turned on, rather than just writing it directly into the page, and
you're good.  If you don't want to incur a network request for every piece of
user content, load the content with the @srcdoc attribute rather than @src.

-- 
Configure bugmail: http://www.w3.org/Bugs/Public/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug.

Received on Monday, 11 April 2011 17:01:49 UTC