You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I've just quickly reviewed this extension and identified an unsafe pattern in the popup construction. The names of blocked domains are injected in to the popup HTML without HTML-encoding them to prevent injection of Javascript or other HTML content.
I have not identified a working way to exploit this, however any of the following would have resulted in injection of arbitrary HTML in to the popup:
Any URL scheme which does not use the :// notation being passed to the onBeforeRequest handler, based on the custom URL decoding routine ignoring this possibility.
If punycode allowed ASCII characters to be redundantly encoded (I checked, it doesn't seem to).
If Chrome passed protocol-relative or other incomplete URLs to the extension (it doesn't)
HTML-encoding content before injecting it in to the popup would remove the hazard that such a condition is introduced in future.
The text was updated successfully, but these errors were encountered:
Hello,
I've just quickly reviewed this extension and identified an unsafe pattern in the popup construction. The names of blocked domains are injected in to the popup HTML without HTML-encoding them to prevent injection of Javascript or other HTML content.
I have not identified a working way to exploit this, however any of the following would have resulted in injection of arbitrary HTML in to the popup:
HTML-encoding content before injecting it in to the popup would remove the hazard that such a condition is introduced in future.
The text was updated successfully, but these errors were encountered: