| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/command_line.h" | 5 #include "base/command_line.h" |
| 6 #include "base/containers/hash_tables.h" |
| 7 #include "content/browser/dom_storage/dom_storage_context_wrapper.h" |
| 8 #include "content/browser/dom_storage/session_storage_namespace_impl.h" |
| 9 #include "content/browser/renderer_host/render_view_host_factory.h" |
| 6 #include "content/browser/renderer_host/render_view_host_impl.h" | 10 #include "content/browser/renderer_host/render_view_host_impl.h" |
| 7 #include "content/browser/web_contents/web_contents_impl.h" | 11 #include "content/browser/web_contents/web_contents_impl.h" |
| 12 #include "content/common/view_messages.h" |
| 13 #include "content/public/browser/browser_context.h" |
| 8 #include "content/public/browser/notification_service.h" | 14 #include "content/public/browser/notification_service.h" |
| 9 #include "content/public/browser/notification_types.h" | 15 #include "content/public/browser/notification_types.h" |
| 16 #include "content/public/browser/storage_partition.h" |
| 10 #include "content/public/common/content_switches.h" | 17 #include "content/public/common/content_switches.h" |
| 18 #include "content/public/test/browser_test_utils.h" |
| 11 #include "content/public/test/test_utils.h" | 19 #include "content/public/test/test_utils.h" |
| 12 #include "content/shell/browser/shell.h" | 20 #include "content/shell/browser/shell.h" |
| 13 #include "content/test/content_browser_test.h" | 21 #include "content/test/content_browser_test.h" |
| 14 #include "content/test/content_browser_test_utils.h" | 22 #include "content/test/content_browser_test_utils.h" |
| 15 | 23 |
| 16 namespace content { | 24 namespace content { |
| 17 | 25 |
| 26 namespace { |
| 27 |
| 28 // This is a helper function for the tests which attempt to create a |
| 29 // duplicate RenderViewHost or RenderWidgetHost. It tries to create two objects |
| 30 // with the same process and routing ids, which causes a collision. |
| 31 // It creates a couple of windows in process 1, which causes a few routing ids |
| 32 // to be allocated. Then a cross-process navigation is initiated, which causes a |
| 33 // new process 2 to be created and have a pending RenderViewHost for it. The |
| 34 // routing id of the RenderViewHost which is target for a duplicate is set |
| 35 // into |target_routing_id| and the pending RenderViewHost which is used for |
| 36 // the attempt is the return value. |
| 37 RenderViewHostImpl* PrepareToDuplicateHosts(Shell* shell, |
| 38 int* target_routing_id) { |
| 39 GURL foo("http://foo.com/files/simple_page.html"); |
| 40 |
| 41 // Start off with initial navigation, so we get the first process allocated. |
| 42 NavigateToURL(shell, foo); |
| 43 |
| 44 // Open another window, so we generate some more routing ids. |
| 45 ShellAddedObserver shell2_observer; |
| 46 EXPECT_TRUE(ExecuteScript( |
| 47 shell->web_contents(), "window.open(document.URL + '#2');")); |
| 48 Shell* shell2 = shell2_observer.GetShell(); |
| 49 |
| 50 // The new window must be in the same process, but have a new routing id. |
| 51 EXPECT_EQ(shell->web_contents()->GetRenderViewHost()->GetProcess()->GetID(), |
| 52 shell2->web_contents()->GetRenderViewHost()->GetProcess()->GetID()); |
| 53 *target_routing_id = |
| 54 shell2->web_contents()->GetRenderViewHost()->GetRoutingID(); |
| 55 EXPECT_NE(*target_routing_id, |
| 56 shell->web_contents()->GetRenderViewHost()->GetRoutingID()); |
| 57 |
| 58 // Now, simulate a link click coming from the renderer. |
| 59 GURL extension_url("https://bar.com/files/simple_page.html"); |
| 60 WebContentsImpl* wc = static_cast<WebContentsImpl*>(shell->web_contents()); |
| 61 wc->RequestOpenURL( |
| 62 shell->web_contents()->GetRenderViewHost(), extension_url, |
| 63 Referrer(), CURRENT_TAB, wc->GetFrameTree()->root()->frame_id(), |
| 64 false, true); |
| 65 |
| 66 // Since the navigation above requires a cross-process swap, there will be a |
| 67 // pending RenderViewHost. Ensure it exists and is in a different process |
| 68 // than the initial page. |
| 69 RenderViewHostImpl* pending_rvh = |
| 70 wc->GetRenderManagerForTesting()->pending_render_view_host(); |
| 71 EXPECT_TRUE(pending_rvh != NULL); |
| 72 EXPECT_NE(shell->web_contents()->GetRenderViewHost()->GetProcess()->GetID(), |
| 73 pending_rvh->GetProcess()->GetID()); |
| 74 |
| 75 return pending_rvh; |
| 76 } |
| 77 |
| 78 } // namespace |
| 79 |
| 80 |
| 18 // The goal of these tests will be to "simulate" exploited renderer processes, | 81 // The goal of these tests will be to "simulate" exploited renderer processes, |
| 19 // which can send arbitrary IPC messages and confuse browser process internal | 82 // which can send arbitrary IPC messages and confuse browser process internal |
| 20 // state, leading to security bugs. We are trying to verify that the browser | 83 // state, leading to security bugs. We are trying to verify that the browser |
| 21 // doesn't perform any dangerous operations in such cases. | 84 // doesn't perform any dangerous operations in such cases. |
| 22 class SecurityExploitBrowserTest : public ContentBrowserTest { | 85 class SecurityExploitBrowserTest : public ContentBrowserTest { |
| 23 public: | 86 public: |
| 24 SecurityExploitBrowserTest() {} | 87 SecurityExploitBrowserTest() {} |
| 25 virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE { | 88 virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE { |
| 26 ASSERT_TRUE(test_server()->Start()); | 89 ASSERT_TRUE(test_server()->Start()); |
| 27 | 90 |
| (...skipping 17 matching lines...) Expand all Loading... |
| 45 shell()->web_contents()->GetRenderViewHost()->GetEnabledBindings()); | 108 shell()->web_contents()->GetRenderViewHost()->GetEnabledBindings()); |
| 46 | 109 |
| 47 content::WindowedNotificationObserver terminated( | 110 content::WindowedNotificationObserver terminated( |
| 48 content::NOTIFICATION_RENDERER_PROCESS_CLOSED, | 111 content::NOTIFICATION_RENDERER_PROCESS_CLOSED, |
| 49 content::NotificationService::AllSources()); | 112 content::NotificationService::AllSources()); |
| 50 shell()->web_contents()->GetRenderViewHost()->SetWebUIProperty( | 113 shell()->web_contents()->GetRenderViewHost()->SetWebUIProperty( |
| 51 "toolkit", "views"); | 114 "toolkit", "views"); |
| 52 terminated.Wait(); | 115 terminated.Wait(); |
| 53 } | 116 } |
| 54 | 117 |
| 118 // This is a test for crbug.com/312016 attempting to create duplicate |
| 119 // RenderViewHosts. SetupForDuplicateHosts sets up this test case and leaves |
| 120 // it in a state with pending RenderViewHost. Before the commit of the new |
| 121 // pending RenderViewHost, this test case creates a new window through the new |
| 122 // process. |
| 123 IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, |
| 124 AttemptDuplicateRenderViewHost) { |
| 125 int duplicate_routing_id = MSG_ROUTING_NONE; |
| 126 RenderViewHostImpl* pending_rvh = |
| 127 PrepareToDuplicateHosts(shell(), &duplicate_routing_id); |
| 128 EXPECT_NE(MSG_ROUTING_NONE, duplicate_routing_id); |
| 129 |
| 130 // Since this test executes on the UI thread and hopping threads might cause |
| 131 // different timing in the test, let's simulate a CreateNewWindow call coming |
| 132 // from the IO thread. |
| 133 ViewHostMsg_CreateWindow_Params params; |
| 134 DOMStorageContextWrapper* dom_storage_context = |
| 135 static_cast<DOMStorageContextWrapper*>( |
| 136 BrowserContext::GetStoragePartition( |
| 137 shell()->web_contents()->GetBrowserContext(), |
| 138 pending_rvh->GetSiteInstance())->GetDOMStorageContext()); |
| 139 SessionStorageNamespaceImpl* session_storage = |
| 140 new SessionStorageNamespaceImpl(dom_storage_context); |
| 141 // Cause a deliberate collision in routing ids. |
| 142 int main_frame_routing_id = duplicate_routing_id + 1; |
| 143 pending_rvh->CreateNewWindow( |
| 144 duplicate_routing_id, main_frame_routing_id, params, session_storage); |
| 145 |
| 146 // If the above operation doesn't cause a crash, the test has succeeded! |
| 55 } | 147 } |
| 148 |
| 149 } // namespace content |
| OLD | NEW |