[Webkit-unassigned] [Bug 129172] SVG Data URLs "taint" canvas as cross-origin

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Thu Apr 3 01:26:14 PDT 2014


https://bugs.webkit.org/show_bug.cgi?id=129172


Dirk Schulze <krit at webkit.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |krit at webkit.org




--- Comment #2 from Dirk Schulze <krit at webkit.org>  2014-04-03 01:26:34 PST ---
(In reply to comment #1)
> Correction: Data URIs in UTF8 format (data:image/svg+xml;utf8) and Base64 format (data:image/svg+xml;base64) seem to both taint the canvas; the checks to ensure an SVG source is safe seem to only check an SVG included as a remote file, and don't scan Data URI  contents themselves.

We load the SVG as SVG image which should be save enough, since SVG images already make sure that the security model is followed.

A question: Can you load an embed an external SVG document in the Canvas?

-- 
Configure bugmail: https://bugs.webkit.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.



More information about the webkit-unassigned mailing list