Site isolation: verify Origin header in requests coming from renderers |
||
Issue descriptionUserAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36 Steps to reproduce the problem: N/A What is the expected behavior? A compromised renderer can currently fake any HTTP request, including the Origin header. Site isolation brings forward the possibility to filter out requests which present a wrong Origin. What went wrong? N/A Did this work before? N/A Chrome version: Channel: stable OS Version: Flash Version:
,
Dec 7 2017
Yep! There's already a start for this in ChildProcessSecurityPolicyImpl::CanSetAsOriginHeader. We've got a bug on file to add site isolation enforcement in issue 515309. |
||
►
Sign in to add a comment |
||
Comment 1 by nasko@chromium.org
, Dec 7 2017Cc: creis@chromium.org nick@chromium.org nasko@chromium.org alex...@chromium.org
Components: Internals>Sandbox>SiteIsolation
Labels: OS-Android OS-Chrome OS-Mac OS-Windows
Status: Untriaged (was: Unconfirmed)