I noticed some time ago that Reader View is not immune to XSS. This vulnerability could even be triggered with NoScript installed.
Has there been changes to NoScript since then to thwart unknown vulnerabilities ? Is about:reader treated in a special way under the hood ? (It isn't displayed in the whitelist but NoScript does many things beyond what the UI says)
For example using uMatrix, if I enable it on about:reader with:
Code: Select all
matrix-off: reader.about-scheme falseBasically, I would like to understand the security implications of using Reader View on a completely untrusted site: No JS, no cookies, no fonts, audio, video, frames, plugins, nothing
Thanks!