Re: Seamless iframes + CSS3 selectors = bad idea

iirc sandboxed iframes cant frame.

in any case sandbox iframes are a joke unless you use data URIs.. that
should be cross origin anyway

On Dec 6, 2009 2:55 PM, "Maciej Stachowiak" <mjs@apple.com> wrote:

On Dec 5, 2009, at 10:27 PM, Maciej Stachowiak wrote: > > I think the attack
is that you can injec...
OK, I thought of a possible real vulnerability. A trusted host page on the
site wants to embed some untrusted user-generated content with the ability
to modify it, so it embeds it, hosted from its own server, using <iframe
sandbox="allow-same-origin">. This should prevent scripting and plugins, so
in theory it seems safe. But the untrusted content could embed a further
iframe with the seamless flag, embedding an arbitrary document from the
hosting service. It can then use CSS selectors to probe for data in that
document.

Regards,
Maciej

Received on Sunday, 6 December 2009 06:59:17 UTC