WebAPI/Security/BrowserAPI: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
| Line 6: | Line 6: | ||
*window.open in iframe mozbrowser: https://bugzilla.mozilla.org/show_bug.cgi?id=742944 | *window.open in iframe mozbrowser: https://bugzilla.mozilla.org/show_bug.cgi?id=742944 | ||
*window.open in iframe mozapp: https://bugzilla.mozilla.org/show_bug.cgi?id=744451 | *window.open in iframe mozapp: https://bugzilla.mozilla.org/show_bug.cgi?id=744451 | ||
*https://groups.google.com/d/topic/mozilla.dev.webapps/paeyzogqJNY/discussion | |||
Brief purpose of API: Provide an iframe that acts as a web browser | Brief purpose of API: Provide an iframe that acts as a web browser | ||
| Line 28: | Line 29: | ||
Potential mitigations: | Potential mitigations: | ||
== | == Privileged (approved by app store) == | ||
Use cases for | Use cases for privileged code: Implement a 3rd party browser application | ||
Authorization model: Implicit | Authorization model: Implicit | ||
| Line 35: | Line 36: | ||
Potential mitigations: Each app has separate cookie and password stores from other apps (including system browser app) | Potential mitigations: Each app has separate cookie and password stores from other apps (including system browser app) | ||
== Certified ( | == Certified (system-critical apps) == | ||
Use cases for certified code: Replacement Browser | Use cases for certified code: Replacement Browser | ||
Revision as of 23:41, 6 August 2012
Name of API: Browser API
References:
- https://wiki.mozilla.org/WebAPI/EmbeddedBrowserAPI
- popup windows in b2g: https://bugzilla.mozilla.org/show_bug.cgi?id=716664
- window.open in iframe mozbrowser: https://bugzilla.mozilla.org/show_bug.cgi?id=742944
- window.open in iframe mozapp: https://bugzilla.mozilla.org/show_bug.cgi?id=744451
- https://groups.google.com/d/topic/mozilla.dev.webapps/paeyzogqJNY/discussion
Brief purpose of API: Provide an iframe that acts as a web browser
General Use Cases: A browser app.
Inherent threats:
- browser can see all data from all websites, and perform all actions
- can steal passwords (user-entered; enumerate all saved passwords)
- can steal cookies (by enumerating websites)
- NOT a use case: OAuth or other app-content or content-content interactions
Threat severity: high per https://wiki.mozilla.org/Security_Severity_Ratings
Regular web content (unauthenticated)
Use cases for unauthenticated code: None
Authorization model for normal content: None
Authorization model for installed content:None
Potential mitigations:
Privileged (approved by app store)
Use cases for privileged code: Implement a 3rd party browser application
Authorization model: Implicit
Potential mitigations: Each app has separate cookie and password stores from other apps (including system browser app)
Certified (system-critical apps)
Use cases for certified code: Replacement Browser
Authorization model: Implicit
Potential mitigations: N/A