- From: Ian Hickson via cvs-syncmail <cvsmail@w3.org>
- Date: Wed, 08 Dec 2010 00:52:08 +0000
- To: public-html-commits@w3.org
Update of /sources/public/html5/spec In directory hutz:/tmp/cvs-serv12939 Modified Files: Overview.html Log Message: note advice from an anonymous IANA reviewer (whatwg r5713) Index: Overview.html =================================================================== RCS file: /sources/public/html5/spec/Overview.html,v retrieving revision 1.4577 retrieving revision 1.4578 diff -u -d -r1.4577 -r1.4578 --- Overview.html 8 Dec 2010 00:28:00 -0000 1.4577 +++ Overview.html 8 Dec 2010 00:52:03 -0000 1.4578 @@ -67215,6 +67215,15 @@ as <code><a href="#text-html-sandboxed">text/html-sandboxed</a></code> as regular <code><a href="#text-html">text/html</a></code> files, authors should avoid using the <code title="">.html</code> or <code title="">.htm</code> extensions for resources labeled as <code><a href="#text-html-sandboxed">text/html-sandboxed</a></code>.</p> + <p>Furthermore, since the <code><a href="#text-html-sandboxed">text/html-sandboxed</a></code> MIME + type impacts the origin security model, authors should be careful + to prevent tampering with the MIME type labeling mechanism itself + when documents are labeled as <code><a href="#text-html-sandboxed">text/html-sandboxed</a></code>. If + an attacker can cause a file to be served as + <code><a href="#text-html">text/html</a></code> instead of + <code><a href="#text-html-sandboxed">text/html-sandboxed</a></code>, then the sandboxing will not + take effect and a cross-site scripting attack will become + possible.</p> <p>Beyond this, the type is identical to <code><a href="#text-html">text/html</a></code>, and the same considerations apply.</p> </dd>
Received on Wednesday, 8 December 2010 00:52:10 UTC