On 16.04.2015 11:04, Jan Odvarko wrote:
> On Thu, Apr 16, 2015 at 10:30 AM, Frederik Braun <fbr...@mozilla.com
> <mailto:fbr...@mozilla.com>> wrote:
> 
> 
>     Running our code in someone else's origin sounds undesired indeed. Not
>     only because of CSP: What if someone puts this in a frame (or a popup)
>     and interacts with this JSON viewer?
> 
> Why iteration with a frame with the viewer could be an issue?
>  

In a clickjacking-style attack, users could be tricked to dragging &
dropping JSON that contains login tokens or other sensitive data.

Alternatively, a cut-out & zoomed iframe that just shows the first few
characters (e.g. a csrf token) could be used as a "fake captcha".
Unknowing users would copy the sensitive data from victim.com in the
fake captcha form of evil.com (which frames the JSON viewer)

See here for a discussion of a similar attack (against view-source in an
iframe): https://bugzilla.mozilla.org/show_bug.cgi?id=624883

_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to