Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adressing cross-document vectors comprehensively relies on "origin-policy" which is a proposal which is on hold #422

Open
mbrodesser-Igalia opened this issue Jan 25, 2024 · 4 comments
Milestone

Comments

@mbrodesser-Igalia
Copy link
Collaborator

https://w3c.github.io/trusted-types/dist/spec/#cross-document-vectors mentions that.

Examples of instances not addressable appreciated.

@mbrodesser-Igalia
Copy link
Collaborator Author

https://w3c.github.io/webappsec-csp/#security-inherit-csp applies only to local schemes. So non-local schemes are not addressed.

@mbrodesser-Igalia
Copy link
Collaborator Author

mbrodesser-Igalia commented Jan 25, 2024

https://w3c.github.io/trusted-types/dist/spec/#cross-document-vectors mentions https://github.com/WICG/origin-policy to address cross-document vectors comprehensively. However, the latter is a proposal which is on hold.

@mbrodesser-Igalia mbrodesser-Igalia changed the title Why are cross-document vectors only partially adresseable with CSP propagation rules? Adressing cross-document vectors comprehensively relies on "origin-policy" which is a proposal which is on hold Jan 25, 2024
@mbrodesser-Igalia
Copy link
Collaborator Author

Are there alternatives?

@mbrodesser-Igalia mbrodesser-Igalia added this to the v1 milestone Jan 25, 2024
@koto
Copy link
Member

koto commented Jan 25, 2024

I don't think there are, at least in Web APIs? For TT (or, more generally, CSP) it's a known limitation. Controls are per-document or realm, whereas XSS affects the whole origin.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants