This is a variant of issue 718942 for mixed content IPCs. If we've got https://a.com/sensitive.html, which embeds an insecure subframe http://b.com, the browser-side mixed content check will send a FrameMsg_MixedContentFound to b.com which, IIUC, contains the full https://a.com/sensitive.html URL in params.main_resource_url. It also will contain the source location of the navigation from a.com in params.source_location if you patch in Arthur's WIP CL (https://codereview.chromium.org/2901223003/) to fix issue 690946 . As in issue 718942 , we should not be disclosing that information to a potentially separate, cross-origin renderer.
Currently, the problematic URL and source location are only used for a console message. FrameMsg_MixedContentFound also sometimes triggers a CSP strict mixed content violation report (for block-all-mixed-content), but that doesn't use those URLs. This is another issue that could be solved by directly routing console messages to the devtools process (see issue 721329).
One example repro of this is the layout test http/tests/security/mixedContent/insecure-iframe-in-iframe.html with --enable-browser-side-navigation and --site-per-process.
I'll assign this to myself for now, since arthursonzogni@ is OOO for the next couple of days.
Comment 1 by jam@chromium.org
, May 30 2017Labels: -Proj-PlzNavigate-Blocking