Closed Bug 503226 (CVE-2009-3375) Opened 15 years ago Closed 15 years ago

document.getSelection() can read cross-origin content selections

Categories

(Core :: DOM: Core & HTML, defect, P2)

x86
All
defect

Tracking

()

RESOLVED FIXED
Tracking Status
status1.9.2 --- beta1-fixed
blocking1.9.1 --- .4+
status1.9.1 --- .4-fixed

People

(Reporter: gfleischer+bugzilla, Assigned: smaug)

Details

(Keywords: verified1.9.0.15, verified1.9.1, Whiteboard: [sg:moderate])

Attachments

(2 files)

User-Agent:       Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.9.0.11) Gecko/2009060214 Firefox/3.0.11
Build Identifier: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.1pre) Gecko/20090708 Shiretoko/3.5.1pre

The document.getSelection() method can be used to read cross-origin content selections.

By storing a reference to the contentDocument of an iframe, any selections made within that iframe can be read regardless of origin.

This method appears to be deprecated.


Reproducible: Always
Select destination for iframe and select 'go'.  Make a text selection and the content should be displayed in an alert box.
The test shows the reported behaviour.  I suspect this should live in Content-land, particularly since jst wrote the deprecation message.  :)
Status: UNCONFIRMED → NEW
Component: General → DOM: Core & HTML
Ever confirmed: true
Product: Firefox → Core
QA Contact: general → general
Whiteboard: [sg:investigate]
Assignee: nobody → Olli.Pettay
Flags: blocking1.9.2?
Status: NEW → ASSIGNED
Marking this a blocker since this allows cross site data leakage.
Flags: blocking1.9.2? → blocking1.9.2+
Priority: -- → P2
Attached patch simple patchSplinter Review
Attachment #394093 - Flags: review?(jst)
Attachment #394093 - Flags: superreview+
Attachment #394093 - Flags: review?(jst)
Attachment #394093 - Flags: review+
Attachment #394093 - Flags: review?(jonas)
Comment on attachment 394093 [details] [diff] [review]
simple patch

AFAIK, security bugs need separate r and sr nowadays.
Don't want to add such before this is fixed everywhere.
http://hg.mozilla.org/mozilla-central/rev/0aa2596a20cc
Status: ASSIGNED → RESOLVED
blocking1.9.1: --- → ?
Closed: 15 years ago
Flags: blocking1.9.0.15?
Resolution: --- → FIXED
blocking1.9.1: ? → .4+
Flags: blocking1.9.0.15? → blocking1.9.0.15+
Attachment #394093 - Flags: approval1.9.1.4?
Attachment #394093 - Flags: approval1.9.0.15?
Flags: wanted1.9.0.x+
Comment on attachment 394093 [details] [diff] [review]
simple patch

Approved for 1.9.1.4 and 1.9.0.15, a=dveditz for release-drivers
Attachment #394093 - Flags: approval1.9.1.4?
Attachment #394093 - Flags: approval1.9.1.4+
Attachment #394093 - Flags: approval1.9.0.15?
Attachment #394093 - Flags: approval1.9.0.15+
Checking in content/html/document/src/nsHTMLDocument.cpp;
/cvsroot/mozilla/content/html/document/src/nsHTMLDocument.cpp,v  <--  nsHTMLDocument.cpp
new revision: 3.792; previous revision: 3.791

http://hg.mozilla.org/releases/mozilla-1.9.1/rev/bffd0a33d902
Verified attached testcase reproduces bug in 1.9.1.3 and is fixed in the 1.9.1.4pre build (Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.1.4pre) Gecko/20090914 Shiretoko/3.5.4pre).
Keywords: verified1.9.1
Verified for 1.9.0.15 as well with Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.15pre) Gecko/2009091606 GranParadiso/3.0.15pre (.NET CLR 3.5.30729).
Whiteboard: [sg:investigate] → [sg:moderate]
Alias: CVE-2009-3375
(In reply to comment #9)
> Don't want to add such before this is fixed everywhere.

I can has test plz?
Flags: in-testsuite?
Group: core-security
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: