Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(138)

Side by Side Diff: content/common/content_security_policy/content_security_policy.cc

Issue 2869423002: PlzNavigate: Do not disclose urls between cross-origin renderers. (Closed)
Patch Set: alexmos@ suggestions. Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2017 The Chromium Authors. All rights reserved. 1 // Copyright 2017 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <sstream> 5 #include <sstream>
6 #include "base/strings/string_split.h" 6 #include "base/strings/string_split.h"
7 #include "base/strings/string_util.h" 7 #include "base/strings/string_util.h"
8 #include "content/common/content_security_policy/csp_context.h" 8 #include "content/common/content_security_policy/csp_context.h"
9 9
10 namespace content { 10 namespace content {
(...skipping 26 matching lines...) Expand all
37 return url.spec(); 37 return url.spec();
38 } 38 }
39 39
40 void ReportViolation(CSPContext* context, 40 void ReportViolation(CSPContext* context,
41 const ContentSecurityPolicy& policy, 41 const ContentSecurityPolicy& policy,
42 const CSPDirective& directive, 42 const CSPDirective& directive,
43 const CSPDirective::Name directive_name, 43 const CSPDirective::Name directive_name,
44 const GURL& url, 44 const GURL& url,
45 bool is_redirect, 45 bool is_redirect,
46 const SourceLocation& source_location) { 46 const SourceLocation& source_location) {
47 // For security reasons, some urls must not be disclosed. It includes the
48 // blocked url and the source location of the error. Care must be taken to
49 // ensure that these information are not transmitted between different
alexmos 2017/05/12 01:37:20 nit: "these information are" -> "these are" (or "t
arthursonzogni 2017/05/15 12:20:46 Done.
50 // cross-origin renderers.
alexmos 2017/05/12 01:37:20 Perhaps also include a reference to https://crbug.
arthursonzogni 2017/05/15 12:20:46 Done (In RenderFrameHostImpl::SanitizeDataForUseIn
51 GURL safe_url = context->ShouldProtectDataInCspViolation(url::Origin(url))
52 ? url.GetOrigin()
53 : url;
Mike West 2017/05/12 14:16:44 I think we can skip this if |is_redirect| is false
arthursonzogni 2017/05/15 12:20:46 For form-action: I think you are right. For frame-
alexmos 2017/05/16 05:56:48 Ack - I think that makes sense to me. Mike, do yo
54
55 url::Origin source_location_origin(GURL(source_location.url));
56 SourceLocation safe_source_location =
57 context->ShouldProtectDataInCspViolation(source_location_origin)
58 ? SourceLocation(source_location_origin.Serialize(), 0u, 0u)
59 : source_location;
60
47 // We should never have a violation against `child-src` or `default-src` 61 // We should never have a violation against `child-src` or `default-src`
48 // directly; the effective directive should always be one of the explicit 62 // directly; the effective directive should always be one of the explicit
49 // fetch directives. 63 // fetch directives.
50 DCHECK_NE(directive_name, CSPDirective::DefaultSrc); 64 DCHECK_NE(directive_name, CSPDirective::DefaultSrc);
51 DCHECK_NE(directive_name, CSPDirective::ChildSrc); 65 DCHECK_NE(directive_name, CSPDirective::ChildSrc);
52 66
53 std::stringstream message; 67 std::stringstream message;
54 68
55 if (policy.header.type == blink::kWebContentSecurityPolicyTypeReport) 69 if (policy.header.type == blink::kWebContentSecurityPolicyTypeReport)
56 message << "[Report Only] "; 70 message << "[Report Only] ";
57 71
58 if (directive_name == CSPDirective::FormAction) 72 if (directive_name == CSPDirective::FormAction)
59 message << "Refused to send form data to '"; 73 message << "Refused to send form data to '";
60 else if (directive_name == CSPDirective::FrameSrc) 74 else if (directive_name == CSPDirective::FrameSrc)
61 message << "Refused to frame '"; 75 message << "Refused to frame '";
62 76
63 message << ElideURLForReportViolation(url) 77 message << ElideURLForReportViolation(safe_url)
64 << "' because it violates the following Content Security Policy " 78 << "' because it violates the following Content Security Policy "
65 "directive: \"" 79 "directive: \""
66 << directive.ToString() << "\"."; 80 << directive.ToString() << "\".";
67 81
68 if (directive.name != directive_name) 82 if (directive.name != directive_name)
69 message << " Note that '" << CSPDirective::NameToString(directive_name) 83 message << " Note that '" << CSPDirective::NameToString(directive_name)
70 << "' was not explicitly set, so '" 84 << "' was not explicitly set, so '"
71 << CSPDirective::NameToString(directive.name) 85 << CSPDirective::NameToString(directive.name)
72 << "' is used as a fallback."; 86 << "' is used as a fallback.";
73 87
74 message << "\n"; 88 message << "\n";
75 89
76 context->ReportContentSecurityPolicyViolation(CSPViolationParams( 90 context->ReportContentSecurityPolicyViolation(CSPViolationParams(
77 CSPDirective::NameToString(directive.name), 91 CSPDirective::NameToString(directive.name),
78 CSPDirective::NameToString(directive_name), message.str(), url, 92 CSPDirective::NameToString(directive_name), message.str(), safe_url,
79 policy.report_endpoints, policy.header.header_value, policy.header.type, 93 policy.report_endpoints, policy.header.header_value, policy.header.type,
80 is_redirect, source_location)); 94 is_redirect, safe_source_location));
81 } 95 }
82 96
83 bool AllowDirective(CSPContext* context, 97 bool AllowDirective(CSPContext* context,
84 const ContentSecurityPolicy& policy, 98 const ContentSecurityPolicy& policy,
85 const CSPDirective& directive, 99 const CSPDirective& directive,
86 CSPDirective::Name directive_name, 100 CSPDirective::Name directive_name,
87 const GURL& url, 101 const GURL& url,
88 bool is_redirect, 102 bool is_redirect,
89 const SourceLocation& source_location) { 103 const SourceLocation& source_location) {
90 if (CSPSourceList::Allow(directive.source_list, url, context, is_redirect)) 104 if (CSPSourceList::Allow(directive.source_list, url, context, is_redirect))
(...skipping 80 matching lines...) Expand 10 before | Expand all | Expand 10 after
171 is_first_policy = false; 185 is_first_policy = false;
172 text << "report-uri"; 186 text << "report-uri";
173 for (const std::string& endpoint : report_endpoints) 187 for (const std::string& endpoint : report_endpoints)
174 text << " " << endpoint; 188 text << " " << endpoint;
175 } 189 }
176 190
177 return text.str(); 191 return text.str();
178 } 192 }
179 193
180 } // namespace content 194 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698