| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 24 matching lines...) Expand all Loading... |
| 35 #include "core/frame/LocalDOMWindow.h" | 35 #include "core/frame/LocalDOMWindow.h" |
| 36 #include "core/frame/LocalFrame.h" | 36 #include "core/frame/LocalFrame.h" |
| 37 #include "core/frame/Location.h" | 37 #include "core/frame/Location.h" |
| 38 #include "core/frame/Settings.h" | 38 #include "core/frame/Settings.h" |
| 39 #include "core/html/HTMLFrameElementBase.h" | 39 #include "core/html/HTMLFrameElementBase.h" |
| 40 #include "core/workers/MainThreadWorkletGlobalScope.h" | 40 #include "core/workers/MainThreadWorkletGlobalScope.h" |
| 41 #include "platform/weborigin/SecurityOrigin.h" | 41 #include "platform/weborigin/SecurityOrigin.h" |
| 42 | 42 |
| 43 namespace blink { | 43 namespace blink { |
| 44 | 44 |
| 45 static bool isOriginAccessibleFromDOMWindow(const SecurityOrigin* targetOrigin,
const LocalDOMWindow* accessingWindow) | 45 namespace { |
| 46 |
| 47 bool canAccessFrameInternal(const LocalDOMWindow* accessingWindow, const Securit
yOrigin* targetFrameOrigin, const DOMWindow* targetWindow) |
| 46 { | 48 { |
| 47 return accessingWindow && accessingWindow->document()->getSecurityOrigin()->
canAccessCheckSuborigins(targetOrigin); | 49 SECURITY_CHECK(!(targetWindow && targetWindow->frame()) |
| 48 } | 50 || targetWindow == targetWindow->frame()->domWindow()); |
| 49 | |
| 50 static bool canAccessFrame(v8::Isolate* isolate, const LocalDOMWindow* accessing
Window, const SecurityOrigin* targetFrameOrigin, const DOMWindow* targetWindow,
ExceptionState& exceptionState) | |
| 51 { | |
| 52 ASSERT_WITH_SECURITY_IMPLICATION(!(targetWindow && targetWindow->frame()) ||
targetWindow == targetWindow->frame()->domWindow()); | |
| 53 | 51 |
| 54 // It's important to check that targetWindow is a LocalDOMWindow: it's | 52 // It's important to check that targetWindow is a LocalDOMWindow: it's |
| 55 // possible for a remote frame and local frame to have the same security | 53 // possible for a remote frame and local frame to have the same security |
| 56 // origin, depending on the model being used to allocate Frames between | 54 // origin, depending on the model being used to allocate Frames between |
| 57 // processes. See https://crbug.com/601629. | 55 // processes. See https://crbug.com/601629. |
| 58 if (targetWindow && targetWindow->isLocalDOMWindow() && isOriginAccessibleFr
omDOMWindow(targetFrameOrigin, accessingWindow)) | 56 if (!(accessingWindow && targetWindow && targetWindow->isLocalDOMWindow())) |
| 57 return false; |
| 58 |
| 59 const SecurityOrigin* accessingOrigin = |
| 60 accessingWindow->document()->getSecurityOrigin(); |
| 61 if (!accessingOrigin->canAccessCheckSuborigins(targetFrameOrigin)) |
| 62 return false; |
| 63 |
| 64 // Notify the loader's client if the initial document has been accessed. |
| 65 LocalFrame* targetFrame = toLocalDOMWindow(targetWindow)->frame(); |
| 66 if (targetFrame->loader().stateMachine()->isDisplayingInitialEmptyDocument()
) |
| 67 targetFrame->loader().didAccessInitialDocument(); |
| 68 |
| 69 return true; |
| 70 } |
| 71 |
| 72 bool canAccessFrame(const LocalDOMWindow* accessingWindow, const SecurityOrigin*
targetFrameOrigin, const DOMWindow* targetWindow, ExceptionState& exceptionStat
e) |
| 73 { |
| 74 if (canAccessFrameInternal(accessingWindow, targetFrameOrigin, targetWindow)
) |
| 59 return true; | 75 return true; |
| 60 | 76 |
| 61 if (targetWindow) | 77 if (targetWindow) |
| 62 exceptionState.throwSecurityError(targetWindow->sanitizedCrossDomainAcce
ssErrorMessage(accessingWindow), targetWindow->crossDomainAccessErrorMessage(acc
essingWindow)); | 78 exceptionState.throwSecurityError(targetWindow->sanitizedCrossDomainAcce
ssErrorMessage(accessingWindow), targetWindow->crossDomainAccessErrorMessage(acc
essingWindow)); |
| 63 return false; | 79 return false; |
| 64 } | 80 } |
| 65 | 81 |
| 66 static bool canAccessFrame(v8::Isolate* isolate, const LocalDOMWindow* accessing
Window, SecurityOrigin* targetFrameOrigin, const DOMWindow* targetWindow, Securi
tyReportingOption reportingOption = ReportSecurityError) | 82 bool canAccessFrame(const LocalDOMWindow* accessingWindow, SecurityOrigin* targe
tFrameOrigin, const DOMWindow* targetWindow, SecurityReportingOption reportingOp
tion = ReportSecurityError) |
| 67 { | 83 { |
| 68 ASSERT_WITH_SECURITY_IMPLICATION(!(targetWindow && targetWindow->frame()) ||
targetWindow == targetWindow->frame()->domWindow()); | 84 if (canAccessFrameInternal(accessingWindow, targetFrameOrigin, targetWindow)
) |
| 69 | |
| 70 // It's important to check that targetWindow is a LocalDOMWindow: it's | |
| 71 // possible for a remote frame and local frame to have the same security | |
| 72 // origin, depending on the model being used to allocate Frames between | |
| 73 // processes. See https://crbug.com/601629. | |
| 74 if (targetWindow->isLocalDOMWindow() && isOriginAccessibleFromDOMWindow(targ
etFrameOrigin, accessingWindow)) | |
| 75 return true; | 85 return true; |
| 76 | 86 |
| 77 if (reportingOption == ReportSecurityError && targetWindow) | 87 if (accessingWindow && targetWindow && reportingOption == ReportSecurityErro
r) |
| 78 accessingWindow->printErrorMessage(targetWindow->crossDomainAccessErrorM
essage(accessingWindow)); | 88 accessingWindow->printErrorMessage(targetWindow->crossDomainAccessErrorM
essage(accessingWindow)); |
| 79 return false; | 89 return false; |
| 80 } | 90 } |
| 81 | 91 |
| 92 } // namespace |
| 93 |
| 82 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const DOMWindow* target, ExceptionState& exceptionState) | 94 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const DOMWindow* target, ExceptionState& exceptionState) |
| 83 { | 95 { |
| 84 ASSERT(target); | 96 ASSERT(target); |
| 85 const Frame* frame = target->frame(); | 97 const Frame* frame = target->frame(); |
| 86 if (!frame || !frame->securityContext()) | 98 if (!frame || !frame->securityContext()) |
| 87 return false; | 99 return false; |
| 88 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge
tSecurityOrigin(), target, exceptionState); | 100 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity
Origin(), target, exceptionState); |
| 89 } | 101 } |
| 90 | 102 |
| 91 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const DOMWindow* target, SecurityReportingOption reportin
gOption) | 103 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const DOMWindow* target, SecurityReportingOption reportin
gOption) |
| 92 { | 104 { |
| 93 ASSERT(target); | 105 ASSERT(target); |
| 94 const Frame* frame = target->frame(); | 106 const Frame* frame = target->frame(); |
| 95 if (!frame || !frame->securityContext()) | 107 if (!frame || !frame->securityContext()) |
| 96 return false; | 108 return false; |
| 97 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge
tSecurityOrigin(), target, reportingOption); | 109 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity
Origin(), target, reportingOption); |
| 98 } | 110 } |
| 99 | 111 |
| 100 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const EventTarget* target, ExceptionState& exceptionState
) | 112 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const EventTarget* target, ExceptionState& exceptionState
) |
| 101 { | 113 { |
| 102 ASSERT(target); | 114 ASSERT(target); |
| 103 const DOMWindow* window = target->toDOMWindow(); | 115 const DOMWindow* window = target->toDOMWindow(); |
| 104 if (!window) { | 116 if (!window) { |
| 105 // We only need to check the access to Window objects which are | 117 // We only need to check the access to Window objects which are |
| 106 // cross-origin accessible. If it's not a Window, the object's | 118 // cross-origin accessible. If it's not a Window, the object's |
| 107 // origin must always be the same origin (or it already leaked). | 119 // origin must always be the same origin (or it already leaked). |
| 108 return true; | 120 return true; |
| 109 } | 121 } |
| 110 const Frame* frame = window->frame(); | 122 const Frame* frame = window->frame(); |
| 111 if (!frame || !frame->securityContext()) | 123 if (!frame || !frame->securityContext()) |
| 112 return false; | 124 return false; |
| 113 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge
tSecurityOrigin(), window, exceptionState); | 125 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity
Origin(), window, exceptionState); |
| 114 } | 126 } |
| 115 | 127 |
| 116 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Location* target, ExceptionState& exceptionState) | 128 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Location* target, ExceptionState& exceptionState) |
| 117 { | 129 { |
| 118 ASSERT(target); | 130 ASSERT(target); |
| 119 const Frame* frame = target->frame(); | 131 const Frame* frame = target->frame(); |
| 120 if (!frame || !frame->securityContext()) | 132 if (!frame || !frame->securityContext()) |
| 121 return false; | 133 return false; |
| 122 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge
tSecurityOrigin(), frame->domWindow(), exceptionState); | 134 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity
Origin(), frame->domWindow(), exceptionState); |
| 123 } | 135 } |
| 124 | 136 |
| 125 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Location* target, SecurityReportingOption reporting
Option) | 137 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Location* target, SecurityReportingOption reporting
Option) |
| 126 { | 138 { |
| 127 ASSERT(target); | 139 ASSERT(target); |
| 128 const Frame* frame = target->frame(); | 140 const Frame* frame = target->frame(); |
| 129 if (!frame || !frame->securityContext()) | 141 if (!frame || !frame->securityContext()) |
| 130 return false; | 142 return false; |
| 131 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge
tSecurityOrigin(), frame->domWindow(), reportingOption); | 143 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity
Origin(), frame->domWindow(), reportingOption); |
| 132 } | 144 } |
| 133 | 145 |
| 134 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co
ntext> context, const ExecutionContext* executionContext, const MainThreadWorkle
tGlobalScope* workletGlobalScope, SecurityReportingOption reportingOption) | 146 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co
ntext> context, const ExecutionContext* executionContext, const MainThreadWorkle
tGlobalScope* workletGlobalScope, SecurityReportingOption reportingOption) |
| 135 { | 147 { |
| 136 DCHECK(executionContext); | 148 DCHECK(executionContext); |
| 137 DOMWindow* domWindow = toDOMWindow(context); | 149 DOMWindow* domWindow = toDOMWindow(context); |
| 138 if (executionContext->isMainThreadWorkletGlobalScope()) { | 150 if (executionContext->isMainThreadWorkletGlobalScope()) { |
| 139 Frame* callingFrame = toMainThreadWorkletGlobalScope(executionContext)->
frame(); | 151 Frame* callingFrame = toMainThreadWorkletGlobalScope(executionContext)->
frame(); |
| 140 domWindow = callingFrame ? callingFrame->domWindow() : nullptr; | 152 domWindow = callingFrame ? callingFrame->domWindow() : nullptr; |
| 141 } | 153 } |
| 142 | 154 |
| 143 DCHECK(workletGlobalScope); | 155 DCHECK(workletGlobalScope); |
| 144 const Frame* workletGlobalScopeFrame = workletGlobalScope->frame(); | 156 const Frame* workletGlobalScopeFrame = workletGlobalScope->frame(); |
| 145 if (!workletGlobalScopeFrame || !workletGlobalScopeFrame->securityContext()) | 157 if (!workletGlobalScopeFrame || !workletGlobalScopeFrame->securityContext()) |
| 146 return false; | 158 return false; |
| 147 | 159 |
| 148 return domWindow && canAccessFrame(isolate, toLocalDOMWindow(domWindow), wor
kletGlobalScopeFrame->securityContext()->getSecurityOrigin(), workletGlobalScope
Frame->domWindow(), reportingOption); | 160 return domWindow && canAccessFrame(toLocalDOMWindow(domWindow), workletGloba
lScopeFrame->securityContext()->getSecurityOrigin(), workletGlobalScopeFrame->do
mWindow(), reportingOption); |
| 149 } | 161 } |
| 150 | 162 |
| 151 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co
ntext> calling, v8::Local<v8::Context> target, SecurityReportingOption reporting
Option) | 163 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co
ntext> calling, v8::Local<v8::Context> target, SecurityReportingOption reporting
Option) |
| 152 { | 164 { |
| 153 ExecutionContext* targetExecutionContext = toExecutionContext(target); | 165 ExecutionContext* targetExecutionContext = toExecutionContext(target); |
| 154 DCHECK(targetExecutionContext); | 166 DCHECK(targetExecutionContext); |
| 155 | 167 |
| 156 ExecutionContext* callingExecutionContext = toExecutionContext(calling); | 168 ExecutionContext* callingExecutionContext = toExecutionContext(calling); |
| 157 DCHECK(callingExecutionContext); | 169 DCHECK(callingExecutionContext); |
| 158 | 170 |
| 159 if (targetExecutionContext->isMainThreadWorkletGlobalScope()) | 171 if (targetExecutionContext->isMainThreadWorkletGlobalScope()) |
| 160 return shouldAllowAccessTo(isolate, calling, callingExecutionContext, to
MainThreadWorkletGlobalScope(targetExecutionContext), DoNotReportSecurityError); | 172 return shouldAllowAccessTo(isolate, calling, callingExecutionContext, to
MainThreadWorkletGlobalScope(targetExecutionContext), DoNotReportSecurityError); |
| 161 | 173 |
| 162 if (callingExecutionContext->isMainThreadWorkletGlobalScope()) | 174 if (callingExecutionContext->isMainThreadWorkletGlobalScope()) |
| 163 return shouldAllowAccessTo(isolate, target, targetExecutionContext, toMa
inThreadWorkletGlobalScope(callingExecutionContext), DoNotReportSecurityError); | 175 return shouldAllowAccessTo(isolate, target, targetExecutionContext, toMa
inThreadWorkletGlobalScope(callingExecutionContext), DoNotReportSecurityError); |
| 164 | 176 |
| 165 DOMWindow* window = toDOMWindow(target); | 177 DOMWindow* window = toDOMWindow(target); |
| 166 return window && shouldAllowAccessTo(isolate, toLocalDOMWindow(toDOMWindow(c
alling)), window, DoNotReportSecurityError); | 178 return window && shouldAllowAccessTo(isolate, toLocalDOMWindow(toDOMWindow(c
alling)), window, DoNotReportSecurityError); |
| 167 } | 179 } |
| 168 | 180 |
| 169 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Node* target, ExceptionState& exceptionState) | 181 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Node* target, ExceptionState& exceptionState) |
| 170 { | 182 { |
| 171 if (!target) | 183 if (!target) |
| 172 return false; | 184 return false; |
| 173 return canAccessFrame(isolate, accessingWindow, target->document().getSecuri
tyOrigin(), target->document().domWindow(), exceptionState); | 185 return canAccessFrame(accessingWindow, target->document().getSecurityOrigin(
), target->document().domWindow(), exceptionState); |
| 174 } | 186 } |
| 175 | 187 |
| 176 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Node* target, SecurityReportingOption reportingOpti
on) | 188 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Node* target, SecurityReportingOption reportingOpti
on) |
| 177 { | 189 { |
| 178 if (!target) | 190 if (!target) |
| 179 return false; | 191 return false; |
| 180 return canAccessFrame(isolate, accessingWindow, target->document().getSecuri
tyOrigin(), target->document().domWindow(), reportingOption); | 192 return canAccessFrame(accessingWindow, target->document().getSecurityOrigin(
), target->document().domWindow(), reportingOption); |
| 181 } | 193 } |
| 182 | 194 |
| 183 bool BindingSecurity::shouldAllowAccessToFrame(v8::Isolate* isolate, const Local
DOMWindow* accessingWindow, const Frame* target, SecurityReportingOption reporti
ngOption) | 195 bool BindingSecurity::shouldAllowAccessToFrame(v8::Isolate* isolate, const Local
DOMWindow* accessingWindow, const Frame* target, SecurityReportingOption reporti
ngOption) |
| 184 { | 196 { |
| 185 if (!target || !target->securityContext()) | 197 if (!target || !target->securityContext()) |
| 186 return false; | 198 return false; |
| 187 return canAccessFrame(isolate, accessingWindow, target->securityContext()->g
etSecurityOrigin(), target->domWindow(), reportingOption); | 199 return canAccessFrame(accessingWindow, target->securityContext()->getSecurit
yOrigin(), target->domWindow(), reportingOption); |
| 188 } | 200 } |
| 189 | 201 |
| 190 } // namespace blink | 202 } // namespace blink |
| OLD | NEW |