Index: third_party/WebKit/Source/core/dom/SecurityContext.cpp |
diff --git a/third_party/WebKit/Source/core/dom/SecurityContext.cpp b/third_party/WebKit/Source/core/dom/SecurityContext.cpp |
index a37ff6b8230baa1b56ff5bf886d6a06243d97da4..a2c268fea4930670288335a8d4b1bd5588566c91 100644 |
--- a/third_party/WebKit/Source/core/dom/SecurityContext.cpp |
+++ b/third_party/WebKit/Source/core/dom/SecurityContext.cpp |
@@ -74,10 +74,16 @@ bool SecurityContext::isSecureTransitionTo(const KURL& url) const |
void SecurityContext::enforceSandboxFlags(SandboxFlags mask) |
{ |
+ // The security origin must be set already in order to determine a sandboxed origin's potential trustworthiness. |
+ ASSERT(securityOrigin()); |
m_sandboxFlags |= mask; |
- if (isSandboxed(SandboxOrigin) && securityOrigin() && !securityOrigin()->isUnique()) { |
- setSecurityOrigin(SecurityOrigin::createUnique()); |
+ if (isSandboxed(SandboxOrigin) && !securityOrigin()->isUnique()) { |
+ // Before overwriting the original origin, compute secure |
+ // context properties from it. These properties are used to do |
+ // secure context checks involving unique origins in remote |
+ // frames. |
+ setSecurityOrigin(SecurityOrigin::createUnique(securityOrigin()->isPotentiallyTrustworthy(), securityOrigin()->isPotentiallyTrustworthy() && securityOrigin()->bypassSecureContextCheck())); |
didUpdateSecurityOrigin(); |
} |
} |