WebKit Bugzilla
New
Browse
Log In
×
Sign in with GitHub
or
Remember my login
Create Account
·
Forgot Password
Forgotten password account recovery
RESOLVED WONTFIX
104520
CSP: Apply isolated world's own CSP to connections/requests/executions it generates.
https://bugs.webkit.org/show_bug.cgi?id=104520
Summary
CSP: Apply isolated world's own CSP to connections/requests/executions it gen...
Mike West
Reported
2012-12-10 01:17:17 PST
We currently have the ability to set a Content Security Policy string on an isolated world, but we're only using it to bypass the main world's policy. We should extend this support in order to apply that policy to the script running in the isolated world. If it injects resources into the main world's DOM, they should run through its policy first. Likewise for XHR, script execution, and etc.
Attachments
Add attachment
proposed patch, testcase, etc.
Mike West
Comment 1
2013-02-07 11:00:54 PST
Unassigning myself; let's be realistic about what I'm actually working on. :/
Radar WebKit Bug Importer
Comment 2
2016-05-27 12:32:11 PDT
<
rdar://problem/26522716
>
Brent Fulgham
Comment 3
2016-11-07 15:56:40 PST
This is a fairly large architecture change that would allow WebKit Extensions to create potentially more restrictive behavior than they are given by default. However, the WebKit Extension design as it stands in 2016 is already very restrictive, and respects the page’s CSP, so it’s not clear how much additional protection would be provided by this large change. At the time Mike filed the original Bugzilla bug that I imported into this Radar, we allowed extensions to do anything — even violate the CSP rules on the web pages being processed by the sandbox. Since then, we have changed to a pessemistic approach of the extension, and require the extension to follow the CSP of the source page. One could argue that an altruistic extension writer might wish to provide additional sandboxing that applied only to their extension. WebKit would not support this. But it seems very unlikely this would be used in practice, and our experience with extension writers support this impression. Consequently, this change seems to have little merit and I am closing as not to be fixed.
Note
You need to
log in
before you can comment on or make changes to this bug.
Top of Page
Format For Printing
XML
Clone This Bug