2017-06-19 07:59:44 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "FramingChecker.h"
|
|
|
|
#include "nsCharSeparatedTokenizer.h"
|
|
|
|
#include "nsCSPUtils.h"
|
|
|
|
#include "nsDocShell.h"
|
|
|
|
#include "nsIChannel.h"
|
|
|
|
#include "nsIConsoleService.h"
|
|
|
|
#include "nsIContentSecurityPolicy.h"
|
|
|
|
#include "nsIScriptError.h"
|
|
|
|
#include "nsNetUtil.h"
|
|
|
|
#include "nsQueryObject.h"
|
|
|
|
#include "mozilla/dom/nsCSPUtils.h"
|
2019-01-11 14:43:39 +03:00
|
|
|
#include "mozilla/dom/LoadURIOptionsBinding.h"
|
2018-09-18 17:57:04 +03:00
|
|
|
#include "mozilla/NullPrincipal.h"
|
2017-06-19 07:59:44 +03:00
|
|
|
|
|
|
|
using namespace mozilla;
|
|
|
|
|
2019-02-26 01:05:29 +03:00
|
|
|
/* static */
|
|
|
|
bool FramingChecker::CheckOneFrameOptionsPolicy(nsIHttpChannel* aHttpChannel,
|
|
|
|
const nsAString& aPolicy,
|
|
|
|
nsIDocShell* aDocShell) {
|
2017-06-19 07:59:44 +03:00
|
|
|
static const char allowFrom[] = "allow-from";
|
|
|
|
const uint32_t allowFromLen = ArrayLength(allowFrom) - 1;
|
|
|
|
bool isAllowFrom =
|
|
|
|
StringHead(aPolicy, allowFromLen).LowerCaseEqualsLiteral(allowFrom);
|
|
|
|
|
|
|
|
// return early if header does not have one of the values with meaning
|
|
|
|
if (!aPolicy.LowerCaseEqualsLiteral("deny") &&
|
|
|
|
!aPolicy.LowerCaseEqualsLiteral("sameorigin") && !isAllowFrom) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
|
|
aHttpChannel->GetURI(getter_AddRefs(uri));
|
|
|
|
|
|
|
|
// XXXkhuey when does this happen? Is returning true safe here?
|
|
|
|
if (!aDocShell) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// We need to check the location of this window and the location of the top
|
|
|
|
// window, if we're not the top. X-F-O: SAMEORIGIN requires that the
|
|
|
|
// document must be same-origin with top window. X-F-O: DENY requires that
|
|
|
|
// the document must never be framed.
|
|
|
|
nsCOMPtr<nsPIDOMWindowOuter> thisWindow = aDocShell->GetWindow();
|
|
|
|
// If we don't have DOMWindow there is no risk of clickjacking
|
|
|
|
if (!thisWindow) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetScriptableTop, not GetTop, because we want this to respect
|
|
|
|
// <iframe mozbrowser> boundaries.
|
|
|
|
nsCOMPtr<nsPIDOMWindowOuter> topWindow = thisWindow->GetScriptableTop();
|
|
|
|
|
|
|
|
// if the document is in the top window, it's not in a frame.
|
|
|
|
if (thisWindow == topWindow) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Find the top docshell in our parent chain that doesn't have the system
|
|
|
|
// principal and use it for the principal comparison. Finding the top
|
|
|
|
// content-type docshell doesn't work because some chrome documents are
|
|
|
|
// loaded in content docshells (see bug 593387).
|
2018-10-02 00:38:01 +03:00
|
|
|
nsCOMPtr<nsIDocShellTreeItem> thisDocShellItem(aDocShell);
|
2017-06-19 07:59:44 +03:00
|
|
|
nsCOMPtr<nsIDocShellTreeItem> parentDocShellItem;
|
|
|
|
nsCOMPtr<nsIDocShellTreeItem> curDocShellItem = thisDocShellItem;
|
2019-01-02 16:05:23 +03:00
|
|
|
nsCOMPtr<Document> topDoc;
|
2017-06-19 07:59:44 +03:00
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIScriptSecurityManager> ssm =
|
|
|
|
do_GetService(NS_SCRIPTSECURITYMANAGER_CONTRACTID, &rv);
|
|
|
|
if (!ssm) {
|
|
|
|
MOZ_CRASH();
|
|
|
|
}
|
|
|
|
|
2017-11-03 18:37:10 +03:00
|
|
|
// If the X-Frame-Options value is SAMEORIGIN, then the top frame in the
|
|
|
|
// parent chain must be from the same origin as this document.
|
|
|
|
bool checkSameOrigin = aPolicy.LowerCaseEqualsLiteral("sameorigin");
|
|
|
|
nsCOMPtr<nsIURI> topUri;
|
|
|
|
|
2017-06-19 07:59:44 +03:00
|
|
|
// Traverse up the parent chain and stop when we see a docshell whose
|
|
|
|
// parent has a system principal, or a docshell corresponding to
|
|
|
|
// <iframe mozbrowser>.
|
|
|
|
while (NS_SUCCEEDED(
|
|
|
|
curDocShellItem->GetParent(getter_AddRefs(parentDocShellItem))) &&
|
|
|
|
parentDocShellItem) {
|
|
|
|
nsCOMPtr<nsIDocShell> curDocShell = do_QueryInterface(curDocShellItem);
|
|
|
|
if (curDocShell && curDocShell->GetIsMozBrowser()) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
topDoc = parentDocShellItem->GetDocument();
|
|
|
|
if (topDoc) {
|
2019-03-24 23:36:25 +03:00
|
|
|
if (topDoc->NodePrincipal()->IsSystemPrincipal()) {
|
2017-06-19 07:59:44 +03:00
|
|
|
// Found a system-principled doc: last docshell was top.
|
|
|
|
break;
|
|
|
|
}
|
2017-11-03 18:37:10 +03:00
|
|
|
|
|
|
|
if (checkSameOrigin) {
|
|
|
|
topDoc->NodePrincipal()->GetURI(getter_AddRefs(topUri));
|
2018-09-25 08:25:05 +03:00
|
|
|
bool isPrivateWin =
|
|
|
|
topDoc->NodePrincipal()->OriginAttributesRef().mPrivateBrowsingId >
|
|
|
|
0;
|
|
|
|
rv = ssm->CheckSameOriginURI(uri, topUri, true, isPrivateWin);
|
2017-11-03 18:37:10 +03:00
|
|
|
|
|
|
|
// one of the ancestors is not same origin as this document
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
ReportXFOViolation(curDocShellItem, uri, eSAMEORIGIN);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2017-06-19 07:59:44 +03:00
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
curDocShellItem = parentDocShellItem;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If this document has the top non-SystemPrincipal docshell it is not being
|
|
|
|
// framed or it is being framed by a chrome document, which we allow.
|
|
|
|
if (curDocShellItem == thisDocShellItem) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the value of the header is DENY, and the previous condition is
|
|
|
|
// not met (current docshell is not the top docshell), prohibit the
|
|
|
|
// load.
|
|
|
|
if (aPolicy.LowerCaseEqualsLiteral("deny")) {
|
|
|
|
ReportXFOViolation(curDocShellItem, uri, eDENY);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
topDoc = curDocShellItem->GetDocument();
|
|
|
|
topDoc->NodePrincipal()->GetURI(getter_AddRefs(topUri));
|
|
|
|
|
|
|
|
// If the X-Frame-Options value is "allow-from [uri]", then the top
|
|
|
|
// frame in the parent chain must be from that origin
|
|
|
|
if (isAllowFrom) {
|
|
|
|
if (aPolicy.Length() == allowFromLen ||
|
|
|
|
(aPolicy[allowFromLen] != ' ' && aPolicy[allowFromLen] != '\t')) {
|
|
|
|
ReportXFOViolation(curDocShellItem, uri, eALLOWFROM);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
rv = NS_NewURI(getter_AddRefs(uri), Substring(aPolicy, allowFromLen));
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return false;
|
|
|
|
}
|
2018-09-25 08:25:05 +03:00
|
|
|
bool isPrivateWin =
|
|
|
|
topDoc->NodePrincipal()->OriginAttributesRef().mPrivateBrowsingId > 0;
|
|
|
|
rv = ssm->CheckSameOriginURI(uri, topUri, true, isPrivateWin);
|
2017-06-19 07:59:44 +03:00
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
ReportXFOViolation(curDocShellItem, uri, eALLOWFROM);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ignore x-frame-options if CSP with frame-ancestors exists
|
|
|
|
static bool ShouldIgnoreFrameOptions(nsIChannel* aChannel,
|
2019-05-22 02:14:27 +03:00
|
|
|
nsIContentSecurityPolicy* aCSP) {
|
2017-06-19 07:59:44 +03:00
|
|
|
NS_ENSURE_TRUE(aChannel, false);
|
2019-05-22 02:14:27 +03:00
|
|
|
NS_ENSURE_TRUE(aCSP, false);
|
2017-06-19 07:59:44 +03:00
|
|
|
|
|
|
|
bool enforcesFrameAncestors = false;
|
2019-05-22 02:14:27 +03:00
|
|
|
aCSP->GetEnforcesFrameAncestors(&enforcesFrameAncestors);
|
2017-06-19 07:59:44 +03:00
|
|
|
if (!enforcesFrameAncestors) {
|
|
|
|
// if CSP does not contain frame-ancestors, then there
|
|
|
|
// is nothing to do here.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// log warning to console that xfo is ignored because of CSP
|
2019-02-20 15:27:25 +03:00
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
|
|
|
uint64_t innerWindowID = loadInfo->GetInnerWindowID();
|
|
|
|
bool privateWindow = !!loadInfo->GetOriginAttributes().mPrivateBrowsingId;
|
2019-06-11 18:51:51 +03:00
|
|
|
AutoTArray<nsString, 2> params = {NS_LITERAL_STRING("x-frame-options"),
|
|
|
|
NS_LITERAL_STRING("frame-ancestors")};
|
2017-07-12 08:13:37 +03:00
|
|
|
CSP_LogLocalizedStr("IgnoringSrcBecauseOfDirective", params,
|
2017-06-19 07:59:44 +03:00
|
|
|
EmptyString(), // no sourcefile
|
|
|
|
EmptyString(), // no scriptsample
|
|
|
|
0, // no linenumber
|
|
|
|
0, // no columnnumber
|
|
|
|
nsIScriptError::warningFlag,
|
2018-07-20 20:57:21 +03:00
|
|
|
NS_LITERAL_CSTRING("IgnoringSrcBecauseOfDirective"),
|
2018-03-13 08:40:38 +03:00
|
|
|
innerWindowID, privateWindow);
|
2017-06-19 07:59:44 +03:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if X-Frame-Options permits this document to be loaded as a subdocument.
|
|
|
|
// This will iterate through and check any number of X-Frame-Options policies
|
|
|
|
// in the request (comma-separated in a header, multiple headers, etc).
|
2019-02-26 01:05:29 +03:00
|
|
|
/* static */
|
|
|
|
bool FramingChecker::CheckFrameOptions(nsIChannel* aChannel,
|
|
|
|
nsIDocShell* aDocShell,
|
2019-05-22 02:14:27 +03:00
|
|
|
nsIContentSecurityPolicy* aCsp) {
|
2017-06-19 07:59:44 +03:00
|
|
|
if (!aChannel || !aDocShell) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-05-22 02:14:27 +03:00
|
|
|
if (ShouldIgnoreFrameOptions(aChannel, aCsp)) {
|
2017-06-19 07:59:44 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aChannel);
|
|
|
|
if (!httpChannel) {
|
|
|
|
// check if it is hiding in a multipart channel
|
|
|
|
rv = nsDocShell::Cast(aDocShell)->GetHttpChannel(
|
|
|
|
aChannel, getter_AddRefs(httpChannel));
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!httpChannel) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoCString xfoHeaderCValue;
|
|
|
|
Unused << httpChannel->GetResponseHeader(
|
|
|
|
NS_LITERAL_CSTRING("X-Frame-Options"), xfoHeaderCValue);
|
|
|
|
NS_ConvertUTF8toUTF16 xfoHeaderValue(xfoHeaderCValue);
|
|
|
|
|
|
|
|
// if no header value, there's nothing to do.
|
|
|
|
if (xfoHeaderValue.IsEmpty()) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// iterate through all the header values (usually there's only one, but can
|
|
|
|
// be many. If any want to deny the load, deny the load.
|
|
|
|
nsCharSeparatedTokenizer tokenizer(xfoHeaderValue, ',');
|
|
|
|
while (tokenizer.hasMoreTokens()) {
|
2017-06-20 12:19:52 +03:00
|
|
|
const nsAString& tok = tokenizer.nextToken();
|
2017-06-19 07:59:44 +03:00
|
|
|
if (!CheckOneFrameOptionsPolicy(httpChannel, tok, aDocShell)) {
|
|
|
|
// cancel the load and display about:blank
|
|
|
|
httpChannel->Cancel(NS_BINDING_ABORTED);
|
|
|
|
if (aDocShell) {
|
|
|
|
nsCOMPtr<nsIWebNavigation> webNav(do_QueryObject(aDocShell));
|
|
|
|
if (webNav) {
|
2019-02-20 15:27:25 +03:00
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = httpChannel->LoadInfo();
|
2018-09-18 17:57:04 +03:00
|
|
|
RefPtr<NullPrincipal> principal =
|
|
|
|
NullPrincipal::CreateWithInheritedAttributes(
|
|
|
|
loadInfo->TriggeringPrincipal());
|
2019-01-11 14:43:39 +03:00
|
|
|
|
|
|
|
LoadURIOptions loadURIOptions;
|
|
|
|
loadURIOptions.mTriggeringPrincipal = principal;
|
|
|
|
webNav->LoadURI(NS_LITERAL_STRING("about:blank"), loadURIOptions);
|
2017-06-19 07:59:44 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-02-26 01:05:29 +03:00
|
|
|
/* static */
|
|
|
|
void FramingChecker::ReportXFOViolation(nsIDocShellTreeItem* aTopDocShellItem,
|
|
|
|
nsIURI* aThisURI, XFOHeader aHeader) {
|
2017-06-19 07:59:44 +03:00
|
|
|
MOZ_ASSERT(aTopDocShellItem, "Need a top docshell");
|
|
|
|
|
|
|
|
nsCOMPtr<nsPIDOMWindowOuter> topOuterWindow = aTopDocShellItem->GetWindow();
|
|
|
|
if (!topOuterWindow) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsPIDOMWindowInner* topInnerWindow = topOuterWindow->GetCurrentInnerWindow();
|
|
|
|
if (!topInnerWindow) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> topURI;
|
|
|
|
|
2019-01-02 16:05:23 +03:00
|
|
|
nsCOMPtr<Document> document = aTopDocShellItem->GetDocument();
|
2017-06-19 07:59:44 +03:00
|
|
|
nsresult rv = document->NodePrincipal()->GetURI(getter_AddRefs(topURI));
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!topURI) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCString topURIString;
|
|
|
|
nsCString thisURIString;
|
|
|
|
|
|
|
|
rv = topURI->GetSpec(topURIString);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = aThisURI->GetSpec(thisURIString);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIConsoleService> consoleService =
|
|
|
|
do_GetService(NS_CONSOLESERVICE_CONTRACTID);
|
|
|
|
nsCOMPtr<nsIScriptError> errorObject =
|
|
|
|
do_CreateInstance(NS_SCRIPTERROR_CONTRACTID);
|
|
|
|
|
|
|
|
if (!consoleService || !errorObject) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsString msg = NS_LITERAL_STRING("Load denied by X-Frame-Options: ");
|
|
|
|
msg.Append(NS_ConvertUTF8toUTF16(thisURIString));
|
|
|
|
|
|
|
|
switch (aHeader) {
|
|
|
|
case eDENY:
|
|
|
|
msg.AppendLiteral(" does not permit framing.");
|
|
|
|
break;
|
|
|
|
case eSAMEORIGIN:
|
|
|
|
msg.AppendLiteral(" does not permit cross-origin framing.");
|
|
|
|
break;
|
|
|
|
case eALLOWFROM:
|
|
|
|
msg.AppendLiteral(" does not permit framing by ");
|
|
|
|
msg.Append(NS_ConvertUTF8toUTF16(topURIString));
|
|
|
|
msg.Append('.');
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-08-07 16:56:30 +03:00
|
|
|
// It is ok to use InitWithSanitizedSource, because the source string is
|
|
|
|
// empty.
|
|
|
|
rv = errorObject->InitWithSanitizedSource(
|
|
|
|
msg, EmptyString(), EmptyString(), 0, 0, nsIScriptError::errorFlag,
|
|
|
|
"X-Frame-Options", topInnerWindow->WindowID());
|
2017-06-19 07:59:44 +03:00
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
consoleService->LogMessage(errorObject);
|
|
|
|
}
|