load the following page from a local web server
Code: Select all
<iframe src="http://url.invalid/?s=%3Cmeta"></iframe>
Code: Select all
<iframe src="http://url.invalid/?s=%3Cmeta"></iframe>
What are your plans for this? XSS alerts are troublesome enough, you can't really tell what happened, why or what to do about it, so it would be nice not to get them on non existent requests.Giorgio Maone wrote:Known issue. IFrame blocking currently happens after XSS checks for various implementation reasons.
No plan at this moment. The implementation issue which led to put things in this order are still present in the Firefox resource loading pipeline.al_9x wrote: What are your plans for this?
Nope, or at least no unwanted consequences have been observed/reported so far because:al_9x wrote:Blocking a suspicious request seems reasonable, but couldn't modifying it and letting it proceed have unpredictable consequences?
During xss sanitization is it not possible to check that a request is coming from an iframe that will be blocked?Giorgio Maone wrote:No plan at this moment. The implementation issue which led to put things in this order are still present in the Firefox resource loading pipeline.al_9x wrote: What are your plans for this?
idempotence is supposed (but you can't really rely on it) to hold for the original request. However after you modify it and send unexpected data, even a single request can have unintended consequences. After all, feeding unexpected/garbage data to software is a testing technique. It's meant to reveal bugs and crash things. I don't think revealing bugs is a good idea on a live app.Giorgio Maone wrote:Nope, or at least no unwanted consequences have been observed/reported so far because:al_9x wrote:Blocking a suspicious request seems reasonable, but couldn't modifying it and letting it proceed have unpredictable consequences?
- Only GET (idempotent) requests are "sanitized"
Idempotence is supposed by the usage of the GET method, at least in the HTTP protocol intentions, independently of the content of the original/modified request, because this method should never be used to modify the server status (POST, PUT and DELETE serve that purpose).al_9x wrote:idempotence is suppose (but you can't really rely on it) to hold for the original request.
Not sure about it (IIRC, in the phase where XSS checks need to take place you can't often tell whether the request is really going to be loaded in a frame or in a new window), but I'll check.al_9x wrote: During xss sanitization is it not possible to check that a request is coming from an iframe that will be blocked?
Nope, in many case it just does what is meant to do, maybe with slight less precision (think of a search engine request for "location=name", which gets turned into a search for "LOCATION NAME", which will probably get a very similar resultset).al_9x wrote:So a sanitized request is at best a noop and at worst a bug, so what's the point of issuing it, am I missing something?