Closed
Bug 810652
Opened 12 years ago
Closed 12 years ago
XSS in Settings App via a web app manifest fields
Categories
(Firefox OS Graveyard :: Gaia::Settings, defect, P2)
Tracking
(blocking-basecamp:+, firefox-esr10 unaffected, firefox-esr17 unaffected, b2g18 fixed, b2g-v1.1hd unaffected, b2g-v1.2 unaffected)
RESOLVED
FIXED
blocking-basecamp | + |
Tracking | Status | |
---|---|---|
firefox-esr10 | --- | unaffected |
firefox-esr17 | --- | unaffected |
b2g18 | --- | fixed |
b2g-v1.1hd | --- | unaffected |
b2g-v1.2 | --- | unaffected |
People
(Reporter: pauljt, Assigned: etienne)
Details
(Keywords: csectype-priv-escalation, sec-high)
Attachments
(1 file)
1.81 KB,
patch
|
kaze
:
review+
|
Details | Diff | Splinter Review |
The settings app uses data in the app object (populated from navigator.mozApps.mgmt.getAll()) without sanitising the data. Injecting HTML in the application name, and possibly other manifest fields results in script injection in the context of the settings app. Including the following line in a web app's manifest results in an alert dialog when the user navigates to Settings -> Application Permissions.
"name": "<img src=a onerror=alert(1)>"
I think the offending code is around here: https://github.com/mozilla-b2g/gaia/blob/master/apps/settings/js/apps.js#L79
But there is lots of usage of data from the manifest in that file, which all needs to be escaped. Also urls (now set by the code from bug 809293) need to be sanitized to make sure they are not something like javascript: or data: URIs.
CSP will, in theory, prevent these attacks once we have a default policy of no inline script enforced. But CSP should be a secondary defense, not the only protection.
Comment 1•12 years ago
|
||
Hmm...this is the third XSS bug I've seen come up. I feel like we need to do full-blown analysis across apps for this. Do we have any static analysis checkers we could use to catch a lot of possible XSS bugs up front to get started?
Reporter | ||
Comment 2•12 years ago
|
||
(In reply to Jason Smith [:jsmith] from comment #1)
> Hmm...this is the third XSS bug I've seen come up. I feel like we need to do
> full-blown analysis across apps for this. Do we have any static analysis
> checkers we could use to catch a lot of possible XSS bugs up front to get
> started?
A couple of us from the security assurance team are currently reviewing source code across the all of the gaia apps with the main goal of trying to identify XSS bugs. We do not currently have any automated tools as far as I am aware. I've not had a lot of success with automated tools in detecting DOM-based XSS in the past but if anyone has any recommendations I'm open to suggestions.
Reporter | ||
Comment 3•12 years ago
|
||
Also, there are probably some more general guidelines that we can come with to reduce the risk of this issue occurring, and making it easier to review for (e.g. less use of innerHTML and more use of createElement()&setAttribute(), using common libraries for escaping strings etc).
Assignee | ||
Comment 4•12 years ago
|
||
[Approval Request Comment]
User impact if declined: Security risk
Testing completed: App permissions management tested on device
Assignee: nobody → etienne
Attachment #680996 -
Flags: review?(kaze)
Attachment #680996 -
Flags: approval-gaia-master?(21)
Updated•12 years ago
|
Keywords: csec-priv-escalation,
sec-high
Updated•12 years ago
|
Attachment #680996 -
Flags: review?(kaze) → review+
Updated•12 years ago
|
blocking-basecamp: ? → +
Priority: -- → P2
Assignee | ||
Comment 5•12 years ago
|
||
Comment on attachment 680996 [details] [diff] [review]
Patch proposal
Canceling the approval request since this is know basecamp-blocker-+
Attachment #680996 -
Flags: approval-gaia-master?(21)
Assignee | ||
Comment 6•12 years ago
|
||
Status: NEW → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Updated•12 years ago
|
status-firefox-esr10:
--- → unaffected
status-firefox-esr17:
--- → unaffected
Updated•11 years ago
|
You need to log in
before you can comment on or make changes to this bug.
Description
•