Index: extensions/common/csp_validator.cc |
diff --git a/extensions/common/csp_validator.cc b/extensions/common/csp_validator.cc |
index d19c7f27ef803c519421858fa31f4171a208b5c4..fc3f541a041bfc0c30db7360e0bd8ec37895b65d 100644 |
--- a/extensions/common/csp_validator.cc |
+++ b/extensions/common/csp_validator.cc |
@@ -11,6 +11,7 @@ |
#include "base/strings/string_util.h" |
#include "content/public/common/url_constants.h" |
#include "extensions/common/constants.h" |
+#include "net/base/registry_controlled_domains/registry_controlled_domain.h" |
namespace extensions { |
@@ -38,30 +39,68 @@ struct DirectiveStatus { |
bool is_secure; |
}; |
+// Returns whether |url| starts with |scheme_and_separator| and does not have a |
+// too permissive wildcard host name. If |should_check_rcd| is true, then the |
+// Public suffix list is used to exclude wildcard TLDs such as "https://*.org". |
+bool isNonWildcardTLD(const std::string& url, |
+ const std::string& scheme_and_separator, |
+ bool should_check_rcd) { |
+ if (!StartsWithASCII(url, scheme_and_separator, true)) |
+ return false; |
+ |
+ size_t start_of_host = scheme_and_separator.length(); |
+ |
+ size_t end_of_host = url.find("/", start_of_host); |
+ if (end_of_host == std::string::npos) |
+ end_of_host = url.size(); |
+ |
+ // Note: It is sufficient to only compare the first character against '*' |
+ // because the CSP only allows wildcards at the start of a directive, see |
+ // host-source and host-part at http://www.w3.org/TR/CSP2/#source-list-syntax |
+ bool is_wildcard_subdomain = end_of_host > start_of_host + 2 && |
+ url[start_of_host] == '*' && url[start_of_host + 1] == '.'; |
+ if (is_wildcard_subdomain) |
+ start_of_host += 2; |
+ |
+ size_t start_of_port = url.rfind(":", end_of_host); |
+ // The ":" check at the end of the following condition is used to avoid |
+ // treating the last part of an IPv6 address as a port. |
+ if (start_of_port > start_of_host && url[start_of_port - 1] != ':') { |
+ bool is_valid_port = false; |
+ // Do a quick sanity check. The following check could mistakenly flag |
+ // ":123456" or ":****" as valid, but that does not matter because the |
+ // relaxing CSP directive will just be ignored by Blink. |
+ for (size_t i = start_of_port + 1; i < end_of_host; ++i) { |
+ is_valid_port = IsAsciiDigit(url[i]) || url[i] == '*'; |
+ if (!is_valid_port) |
+ break; |
+ } |
+ if (is_valid_port) |
+ end_of_host = start_of_port; |
+ } |
+ |
+ std::string host(url, start_of_host, end_of_host - start_of_host); |
+ // Global wildcards are not allowed. |
+ if (host.empty() || host.find("*") != std::string::npos) |
+ return false; |
+ |
+ if (!is_wildcard_subdomain || !should_check_rcd) |
+ return true; |
+ |
+ // Wildcards on subdomains of a TLD are not allowed. |
+ size_t registry_length = net::registry_controlled_domains::GetRegistryLength( |
+ host, |
+ net::registry_controlled_domains::INCLUDE_UNKNOWN_REGISTRIES, |
+ net::registry_controlled_domains::INCLUDE_PRIVATE_REGISTRIES); |
+ return registry_length != 0; |
+} |
+ |
bool HasOnlySecureTokens(base::StringTokenizer& tokenizer, |
Manifest::Type type) { |
while (tokenizer.GetNext()) { |
std::string source = tokenizer.token(); |
base::StringToLowerASCII(&source); |
- // Don't alow whitelisting of all hosts. This boils down to: |
- // 1. Maximum of 2 '*' characters. |
- // 2. Each '*' is either followed by a '.' or preceded by a ':' |
- int wildcards = 0; |
- size_t length = source.length(); |
- for (size_t i = 0; i < length; ++i) { |
- if (source[i] == L'*') { |
- wildcards++; |
- if (wildcards > 2) |
- return false; |
- |
- bool isWildcardPort = i > 0 && source[i - 1] == L':'; |
- bool isWildcardSubdomain = i + 1 < length && source[i + 1] == L'.'; |
- if (!isWildcardPort && !isWildcardSubdomain) |
- return false; |
- } |
- } |
- |
// We might need to relax this whitelist over time. |
if (source == "'self'" || |
source == "'none'" || |
@@ -69,14 +108,14 @@ bool HasOnlySecureTokens(base::StringTokenizer& tokenizer, |
LowerCaseEqualsASCII(source, "blob:") || |
LowerCaseEqualsASCII(source, "filesystem:") || |
LowerCaseEqualsASCII(source, "http://localhost") || |
- StartsWithASCII(source, "http://127.0.0.1:", false) || |
- StartsWithASCII(source, "http://localhost:", false) || |
- StartsWithASCII(source, "https://", true) || |
- StartsWithASCII(source, "chrome://", true) || |
- StartsWithASCII(source, |
- std::string(extensions::kExtensionScheme) + |
- url::kStandardSchemeSeparator, |
- true) || |
+ StartsWithASCII(source, "http://127.0.0.1:", true) || |
+ StartsWithASCII(source, "http://localhost:", true) || |
+ isNonWildcardTLD(source, "https://", true) || |
+ isNonWildcardTLD(source, "chrome://", false) || |
+ isNonWildcardTLD(source, |
+ std::string(extensions::kExtensionScheme) + |
+ url::kStandardSchemeSeparator, |
+ false) || |
StartsWithASCII(source, "chrome-extension-resource:", true)) { |
continue; |
} |