Branch: refs/heads/main Home: https://github.com/WebKit/WebKit Commit: 900265400e127db69a5ae3234151f005a3e769d3 https://github.com/WebKit/WebKit/commit/900265400e127db69a5ae3234151f005a3e769d3 Author: Ryan Reno <rr...@apple.com> Date: 2023-07-31 (Mon, 31 Jul 2023)
Changed paths: A LayoutTests/http/tests/security/block-top-level-navigations-by-third-party-iframe-sandboxed-by-own-csp-expected.txt A LayoutTests/http/tests/security/block-top-level-navigations-by-third-party-iframe-sandboxed-by-own-csp.html A LayoutTests/http/tests/security/resources/attempt-top-level-navigation-with-csp.py M Source/WebCore/dom/Document.cpp Log Message: ----------- Third Party IFrame Navigation Block Bypass via Content Security Policy Sandbox https://bugs.webkit.org/show_bug.cgi?id=257903 rdar://109059471 Reviewed by Brent Fulgham. If a third-party iframe is unsandboxed we will prevent top navigation without user interaction with the frame. However, this is bypassable if the iframe gives itself a sandbox which allows top navigation via CSP. This change checks to see if the iframe element was unsandboxed and proceeds with the more strict third-party checks if so. * LayoutTests/http/tests/security/block-top-level-navigations-by-third-party-iframe-sandboxed-by-own-csp-expected.txt: Added. * LayoutTests/http/tests/security/block-top-level-navigations-by-third-party-iframe-sandboxed-by-own-csp.html: Added. * LayoutTests/http/tests/security/resources/attempt-top-level-navigation-with-csp.py: Added. * Source/WebCore/dom/Document.cpp: (WebCore::Document::isNavigationBlockedByThirdPartyIFrameRedirectBlocking): Originally-landed-as: 259548.823@safari-7615-branch (18a05c43972c). rdar://109059471 Canonical link: https://commits.webkit.org/266433@main _______________________________________________ webkit-changes mailing list webkit-changes@lists.webkit.org https://lists.webkit.org/mailman/listinfo/webkit-changes