[Webkit-unassigned] [Bug 8036] New: Overzealous Iframe security

bugzilla-daemon at opendarwin.org bugzilla-daemon at opendarwin.org
Tue Mar 28 11:42:59 PST 2006


http://bugzilla.opendarwin.org/show_bug.cgi?id=8036

           Summary: Overzealous Iframe security
           Product: WebKit
           Version: 420+ (nightly)
          Platform: PC
        OS/Version: Windows XP
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Frames
        AssignedTo: webkit-unassigned at opendarwin.org
        ReportedBy: jhaygood at spsu.edu


Firefox, Internet Explorer, and Opera let the following check pass, even if
you're on a different frame:
parent == iframes[i].contentWindow

They don't let you access it, but you can tell if they are in fact the same. If
you have a Publisher Side File on the domain the original iframe is hosted in,
you can 'break out' of the containing frame using this method:

* Webpage writes out iframe on different domain (normally an ad server)
* iframe writes out iframe pointing to a publisher side file on the original
server
* new iframe finds the original iframe using the above comparison (reliable,
but doesn't work on Safari), using source comparison (not reliable, since
iframes can redirect), or size comparison (not reliable, since sites get
placement sizes wrong)

This breaks compatibility with most portal sites.


-- 
Configure bugmail: http://bugzilla.opendarwin.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the webkit-unassigned mailing list