WebAPI/Security/BrowserAPI: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
Name of API: Browser API
== Browser API ==
 
References:
*https://wiki.mozilla.org/WebAPI/EmbeddedBrowserAPI
*popup windows in b2g: https://bugzilla.mozilla.org/show_bug.cgi?id=716664
*window.open in iframe mozbrowser: https://bugzilla.mozilla.org/show_bug.cgi?id=742944
*window.open in iframe mozapp: https://bugzilla.mozilla.org/show_bug.cgi?id=744451
 
Brief purpose of API: Provide an iframe that acts as a web browser
Brief purpose of API: Provide an iframe that acts as a web browser


Line 19: Line 12:
Threat severity: high per https://wiki.mozilla.org/Security_Severity_Ratings
Threat severity: high per https://wiki.mozilla.org/Security_Severity_Ratings


== Regular web content (unauthenticated) ==
References:
Use cases for unauthenticated code: None
*https://wiki.mozilla.org/WebAPI/EmbeddedBrowserAPI
 
*popup windows in b2g: https://bugzilla.mozilla.org/show_bug.cgi?id=716664
Authorization model for normal content: None
*window.open in iframe mozbrowser: https://bugzilla.mozilla.org/show_bug.cgi?id=742944
 
*window.open in iframe mozapp: https://bugzilla.mozilla.org/show_bug.cgi?id=744451
Authorization model for installed content:None
*https://groups.google.com/d/topic/mozilla.dev.webapps/paeyzogqJNY/discussion
 
Potential mitigations:
 
== Trusted (authenticated by publisher) ==
Use cases for authenticated code: Implement a 3rd party browser application
 
Authorization model: Implicit
 
Potential mitigations: Each app has separate cookie and password stores from other apps (including system browser app)


== Certified (vouched for by trusted 3rd party) ==
=== Permissions Table===
Use cases for certified code: Replacement Browser


Authorization model: Implicit
{| border="1" class="wikitable"
! Type
! Use Cases
! Authorization Model
! Notes & Other Controls
|-
| Web Content || None || No access
|-
| Installed Web Apps || None || No access
|-
| Privileged Web Apps || Implement a 3rd party browser application || Implicit || Each app has separate cookie and password stores from other apps (including system browser app)
|-
| Certified Web Apps || Replacement Browser|| Implicit ||
|}


Potential mitigations: N/A
[[Category:Web APIs]]
[[Category:Security]]

Latest revision as of 23:40, 1 October 2014

Browser API

Brief purpose of API: Provide an iframe that acts as a web browser

General Use Cases: A browser app.

Inherent threats:

  • browser can see all data from all websites, and perform all actions
  • can steal passwords (user-entered; enumerate all saved passwords)
  • can steal cookies (by enumerating websites)
  • NOT a use case: OAuth or other app-content or content-content interactions

Threat severity: high per https://wiki.mozilla.org/Security_Severity_Ratings

References:

Permissions Table

Type Use Cases Authorization Model Notes & Other Controls
Web Content None No access
Installed Web Apps None No access
Privileged Web Apps Implement a 3rd party browser application Implicit Each app has separate cookie and password stores from other apps (including system browser app)
Certified Web Apps Replacement Browser Implicit