Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(374)

Side by Side Diff: chrome/browser/extensions/extension_protocols.cc

Issue 12218064: Non-web-accessible extension URLs should not load in non-extension processes (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Fix for a failing unit test Created 7 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « chrome/browser/chrome_security_exploit_browsertest.cc ('k') | chrome/chrome_tests.gypi » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/extensions/extension_protocols.h" 5 #include "chrome/browser/extensions/extension_protocols.h"
6 6
7 #include <algorithm> 7 #include <algorithm>
8 8
9 #include "base/compiler_specific.h" 9 #include "base/compiler_specific.h"
10 #include "base/file_path.h" 10 #include "base/file_path.h"
11 #include "base/logging.h" 11 #include "base/logging.h"
12 #include "base/memory/weak_ptr.h" 12 #include "base/memory/weak_ptr.h"
13 #include "base/message_loop.h" 13 #include "base/message_loop.h"
14 #include "base/path_service.h" 14 #include "base/path_service.h"
15 #include "base/string_util.h" 15 #include "base/string_util.h"
16 #include "base/stringprintf.h" 16 #include "base/stringprintf.h"
17 #include "base/threading/thread_restrictions.h" 17 #include "base/threading/thread_restrictions.h"
18 #include "base/threading/worker_pool.h" 18 #include "base/threading/worker_pool.h"
19 #include "build/build_config.h" 19 #include "build/build_config.h"
20 #include "chrome/browser/extensions/extension_info_map.h" 20 #include "chrome/browser/extensions/extension_info_map.h"
21 #include "chrome/browser/extensions/image_loader.h" 21 #include "chrome/browser/extensions/image_loader.h"
22 #include "chrome/browser/net/chrome_url_request_context.h" 22 #include "chrome/browser/net/chrome_url_request_context.h"
23 #include "chrome/common/chrome_paths.h" 23 #include "chrome/common/chrome_paths.h"
24 #include "chrome/common/extensions/extension.h" 24 #include "chrome/common/extensions/extension.h"
25 #include "chrome/common/extensions/extension_file_util.h" 25 #include "chrome/common/extensions/extension_file_util.h"
26 #include "chrome/common/extensions/extension_resource.h" 26 #include "chrome/common/extensions/extension_resource.h"
27 #include "chrome/common/extensions/manifest_url_handler.h"
27 #include "chrome/common/extensions/web_accessible_resources_handler.h" 28 #include "chrome/common/extensions/web_accessible_resources_handler.h"
28 #include "chrome/common/url_constants.h" 29 #include "chrome/common/url_constants.h"
29 #include "content/public/browser/resource_request_info.h" 30 #include "content/public/browser/resource_request_info.h"
30 #include "extensions/common/constants.h" 31 #include "extensions/common/constants.h"
31 #include "googleurl/src/url_util.h" 32 #include "googleurl/src/url_util.h"
32 #include "grit/component_extension_resources_map.h" 33 #include "grit/component_extension_resources_map.h"
33 #include "net/base/mime_util.h" 34 #include "net/base/mime_util.h"
34 #include "net/base/net_errors.h" 35 #include "net/base/net_errors.h"
35 #include "net/http/http_response_headers.h" 36 #include "net/http/http_response_headers.h"
36 #include "net/http/http_response_info.h" 37 #include "net/http/http_response_info.h"
(...skipping 221 matching lines...) Expand 10 before | Expand all | Expand 10 after
258 } 259 }
259 260
260 return true; 261 return true;
261 } 262 }
262 263
263 // Returns true if an chrome-extension:// resource should be allowed to load. 264 // Returns true if an chrome-extension:// resource should be allowed to load.
264 // TODO(aa): This should be moved into ExtensionResourceRequestPolicy, but we 265 // TODO(aa): This should be moved into ExtensionResourceRequestPolicy, but we
265 // first need to find a way to get CanLoadInIncognito state into the renderers. 266 // first need to find a way to get CanLoadInIncognito state into the renderers.
266 bool AllowExtensionResourceLoad(net::URLRequest* request, 267 bool AllowExtensionResourceLoad(net::URLRequest* request,
267 bool is_incognito, 268 bool is_incognito,
269 const Extension* extension,
268 ExtensionInfoMap* extension_info_map) { 270 ExtensionInfoMap* extension_info_map) {
269 const ResourceRequestInfo* info = ResourceRequestInfo::ForRequest(request); 271 const ResourceRequestInfo* info = ResourceRequestInfo::ForRequest(request);
270 272
271 // We have seen crashes where info is NULL: crbug.com/52374. 273 // We have seen crashes where info is NULL: crbug.com/52374.
272 if (!info) { 274 if (!info) {
273 LOG(ERROR) << "Allowing load of " << request->url().spec() 275 LOG(ERROR) << "Allowing load of " << request->url().spec()
274 << "from unknown origin. Could not find user data for " 276 << "from unknown origin. Could not find user data for "
275 << "request."; 277 << "request.";
276 return true; 278 return true;
277 } 279 }
278 280
279 if (is_incognito && !ExtensionCanLoadInIncognito(info, request->url().host(), 281 if (is_incognito && !ExtensionCanLoadInIncognito(info, request->url().host(),
280 extension_info_map)) { 282 extension_info_map)) {
281 return false; 283 return false;
282 } 284 }
283 285
286 // The following checks are meant to replicate similar set of checks in the
287 // renderer process, performed by ResourceRequestPolicy::CanRequestResource.
288 // These are not exactly equivalent, because we don't have the same bits of
289 // information. The two checks need to be kept in sync as much as possible, as
290 // an exploited renderer can bypass the checks in ResourceRequestPolicy.
291
292 // Check if the extension for which this request is made is indeed loaded in
293 // the process sending the request. If not, we need to explicitly check if
294 // the resource is explicitly accessible or fits in a set of exception cases.
295 // Note: This allows a case where two extensions execute in the same renderer
296 // process to request each other's resources. We can't do more precise check,
297 // since the renderer can lie which extension has made the request.
298 if (extension_info_map->process_map().Contains(
299 request->url().host(), info->GetChildID())) {
300 return true;
301 }
302
303 if (!content::PageTransitionIsWebTriggerable(info->GetPageTransition()))
304 return false;
305
306 // The following checks require that we have an actual extension object. If we
307 // don't have it, allow the request handling to continue with the rest of the
308 // checks.
309 if (!extension)
310 return true;
311
312 // Disallow loading of packaged resources for hosted apps. We don't allow
313 // hybrid hosted/packaged apps. The one exception is access to icons, since
314 // some extensions want to be able to do things like create their own
315 // launchers.
316 std::string resource_root_relative_path =
317 request->url().path().empty() ? "" : request->url().path().substr(1);
318 if (extension->is_hosted_app() &&
319 !extension->icons().ContainsPath(resource_root_relative_path)) {
320 LOG(ERROR) << "Denying load of " << request->url().spec() << " from "
321 << "hosted app.";
322 return false;
323 }
324
325 // If the resource is not expicitly marked as web accessible, it should only
326 // be allowed if it is being loaded by DevTools. A close approximation is
327 // checking if the extension contains DevTools page.
328 // IsResourceWebAccessible already does the manifest version check, so no
329 // need to explicitly do it.
330 if (!extensions::WebAccessibleResourcesInfo::IsResourceWebAccessible(
331 extension, request->url().path()) &&
332 extensions::ManifestURL::GetDevToolsPage(extension).is_empty()) {
333 return false;
334 }
335
284 return true; 336 return true;
285 } 337 }
286 338
287 // Returns true if the given URL references an icon in the given extension. 339 // Returns true if the given URL references an icon in the given extension.
288 bool URLIsForExtensionIcon(const GURL& url, const Extension* extension) { 340 bool URLIsForExtensionIcon(const GURL& url, const Extension* extension) {
289 DCHECK(url.SchemeIs(extensions::kExtensionScheme)); 341 DCHECK(url.SchemeIs(extensions::kExtensionScheme));
290 342
291 if (!extension) 343 if (!extension)
292 return false; 344 return false;
293 345
(...skipping 21 matching lines...) Expand all
315 private: 367 private:
316 const bool is_incognito_; 368 const bool is_incognito_;
317 ExtensionInfoMap* const extension_info_map_; 369 ExtensionInfoMap* const extension_info_map_;
318 DISALLOW_COPY_AND_ASSIGN(ExtensionProtocolHandler); 370 DISALLOW_COPY_AND_ASSIGN(ExtensionProtocolHandler);
319 }; 371 };
320 372
321 // Creates URLRequestJobs for extension:// URLs. 373 // Creates URLRequestJobs for extension:// URLs.
322 net::URLRequestJob* 374 net::URLRequestJob*
323 ExtensionProtocolHandler::MaybeCreateJob( 375 ExtensionProtocolHandler::MaybeCreateJob(
324 net::URLRequest* request, net::NetworkDelegate* network_delegate) const { 376 net::URLRequest* request, net::NetworkDelegate* network_delegate) const {
377 // chrome-extension://extension-id/resource/path.js
378 const std::string& extension_id = request->url().host();
379 const Extension* extension =
380 extension_info_map_->extensions().GetByID(extension_id);
381
325 // TODO(mpcomplete): better error code. 382 // TODO(mpcomplete): better error code.
326 if (!AllowExtensionResourceLoad( 383 if (!AllowExtensionResourceLoad(
327 request, is_incognito_, extension_info_map_)) { 384 request, is_incognito_, extension, extension_info_map_)) {
328 return new net::URLRequestErrorJob( 385 return new net::URLRequestErrorJob(
329 request, network_delegate, net::ERR_ADDRESS_UNREACHABLE); 386 request, network_delegate, net::ERR_ADDRESS_UNREACHABLE);
330 } 387 }
331 388
332 // chrome-extension://extension-id/resource/path.js
333 const std::string& extension_id = request->url().host();
334 const Extension* extension =
335 extension_info_map_->extensions().GetByID(extension_id);
336 base::FilePath directory_path; 389 base::FilePath directory_path;
337 if (extension) 390 if (extension)
338 directory_path = extension->path(); 391 directory_path = extension->path();
339 if (directory_path.value().empty()) { 392 if (directory_path.value().empty()) {
340 const Extension* disabled_extension = 393 const Extension* disabled_extension =
341 extension_info_map_->disabled_extensions().GetByID(extension_id); 394 extension_info_map_->disabled_extensions().GetByID(extension_id);
342 if (URLIsForExtensionIcon(request->url(), disabled_extension)) 395 if (URLIsForExtensionIcon(request->url(), disabled_extension))
343 directory_path = disabled_extension->path(); 396 directory_path = disabled_extension->path();
344 if (directory_path.value().empty()) { 397 if (directory_path.value().empty()) {
345 LOG(WARNING) << "Failed to GetPathForExtension: " << extension_id; 398 LOG(WARNING) << "Failed to GetPathForExtension: " << extension_id;
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after
403 send_cors_header); 456 send_cors_header);
404 } 457 }
405 458
406 } // namespace 459 } // namespace
407 460
408 net::URLRequestJobFactory::ProtocolHandler* CreateExtensionProtocolHandler( 461 net::URLRequestJobFactory::ProtocolHandler* CreateExtensionProtocolHandler(
409 bool is_incognito, 462 bool is_incognito,
410 ExtensionInfoMap* extension_info_map) { 463 ExtensionInfoMap* extension_info_map) {
411 return new ExtensionProtocolHandler(is_incognito, extension_info_map); 464 return new ExtensionProtocolHandler(is_incognito, extension_info_map);
412 } 465 }
OLDNEW
« no previous file with comments | « chrome/browser/chrome_security_exploit_browsertest.cc ('k') | chrome/chrome_tests.gypi » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698