UserAgent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2751.0 Safari/537.36
Steps to reproduce the problem:
1. Generate a page with the following CSP header: `default-src https:; upgrade-insecure-requests`
2. Generate a simple page with an HTTP iframe source that can also accept an HTTPS request. I've attached the HTML I used to test for this condition. Ensure that this page is protected with the CSP header from step 1.
3. Remove, and possibly flush, any HSTS headers set for the test domain.
What is the expected behavior?
`upgrade-insecure-requests` should upgrade the "http://domain.com/iframe-src" source to "https://domain.com/iframe-src" and successfully frame the resource.
What went wrong?
The "http://domain.com/iframe-src" resource is blocked by the CSP policy and the following error is displayed in the console:
Refused to frame 'http://domain.com/iframe-src' because it violates the following Content Security Policy directive: "default-src https:". Note that 'frame-src' was not explicitly set, so 'default-src' is used as a fallback.
Did this work before? No
Chrome version: 53.0.2751.0 Channel: canary
OS Version: OS X 10.11.4
Flash Version: Shockwave Flash 22.0 r0
I've tested in Chrome Stable and Canary and get the same results. I get the expected behavior in Firefox Stable and Nightly.
Note that I added an `img` tag `src` in my test as well to verify that there wasn't something in my test that caused UIR to break. When using an HTTP `img` `src`, it resource is successfully upgraded, suggesting that upgrades are working on the page, just not for iframes.
|
Deleted:
iframe-uir-test.html
152 bytes
|
Comment 1 by mkwst@chromium.org
, May 31 2016Labels: -Restrict-View-SecurityTeam
Owner: mkwst@chromium.org
Status: Started (was: Unconfirmed)