-
Notifications
You must be signed in to change notification settings - Fork 193
Xss vulnerable in URI context with data protocol #435
Comments
related issue is found in this #406 |
@neraliu just a headsup, next time it is likely a good idea to report security issues via http://emberjs.com/security/ We may need to add that explicitly to this readme, so that future travelers are aware. |
@stefanpenner I am sorry that I am not aware of this, i will route through that channel to report any findings. |
No worries, the readme should say that (but doesn't yet) |
I considered this a vulnerability in Firefox, since every other browser tested provides a safe security context in this situation. So I went through their disclosure process. But they marked it a dup of this issue from 2007: https://bugzilla.mozilla.org/show_bug.cgi?id=255107 which has been rediscovered and reported at least ten times. |
i would suggest we block this protocol as it allows script execution in most browsers, and FF will inherit the origin domain which is more serious than others. |
It is found htmlbars is XSS vulnerable in URI context as the "data:" protocol does not include in the bad protocol list. currently, some browsers' implementation inherit the original page domain such that attacker can steal the user cookies etc.
The PoC is shown in the latest version of FF 42.0 by injecting the pattern like this
data:text/html,<script>alert(document.domain)</script>
in the URI.note: please note that Chrome does not inherit the original page domain.
The text was updated successfully, but these errors were encountered: