W3C home > Mailing lists > Public > public-webappsec@w3.org > April 2013

Re: [filter-effects][css-masking] Move security model for resources to CSP

From: Anne van Kesteren <annevk@annevk.nl>
Date: Tue, 9 Apr 2013 14:49:48 +0100
Message-ID: <CADnb78jX4es_B6zW=_Y52mvoKx9Kq9S-s31hoo30s7r6TorVsQ@mail.gmail.com>
To: Dirk Schulze <dschulze@adobe.com>
Cc: "robert@ocallahan.org" <robert@ocallahan.org>, Bjoern Hoehrmann <derhoermi@gmx.net>, "public-fx@w3.org" <public-fx@w3.org>, "public-webappsec@w3.org" <public-webappsec@w3.org>, Daniel Holbert <dholbert@mozilla.com>
On Tue, Apr 9, 2013 at 2:45 PM, Dirk Schulze <dschulze@adobe.com> wrote:
> I actually just was reminded on one possible security flaw with SVG image and external references.
> Take an account at Twitter or Facebook. For both it is not possible to upload an SVG as image. One reason could be the following scenario:
> * I upload an SVG file and add a image reference in the SVG file <image xlink:href=…"/>
> * This reference has a different origin where the image (e.g a PNG) is hosted
> * The sever hosting this image now can log how often the image was loaded and can make assumptions how often the user profile was clicked on this portal.

I suggest reading carefully through the bug Robert referenced and my
analyses in response. We discussed exactly this.

Received on Tuesday, 9 April 2013 13:50:17 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 18:54:32 UTC