Commit 61b395a4 authored by Yawning Angel's avatar Yawning Angel Committed by Georg Koppen
Browse files

Bug 19837: Whitelist internal URLs that Firefox requires for media.

Firefox requires being able to load chrome:// and resource:// URLs for
things like the media player, with the origin set to the remote URL
that triggered the load.

This is unfortunate in that there's no way to disambiguate malicious JS
versus someone opening a video file (for example).

for why this is a huge nightmare and will eventually require C++ code.
parent 808ed83b
......@@ -21,7 +21,26 @@ ContentPolicy.prototype = {
contractID: ";1",
QueryInterface: XPCOMUtils.generateQI([Ci.nsIContentPolicy]),
uriWhitelist: {
// Video playback.
"chrome://global/content/TopLevelVideoDocument.js": Ci.nsIContentPolicy.TYPE_SCRIPT,
"resource://gre/res/TopLevelVideoDocument.css": Ci.nsIContentPolicy.TYPE_STYLESHEET,
"chrome://global/skin/media/TopLevelVideoDocument.css": Ci.nsIContentPolicy.TYPE_STYLESHEET,
"chrome://global/content/bindings/videocontrols.xml": Ci.nsIContentPolicy.TYPE_XBL,
"chrome://global/content/bindings/scale.xml": Ci.nsIContentPolicy.TYPE_XBL,
"chrome://global/content/bindings/progressmeter.xml": Ci.nsIContentPolicy.TYPE_XBL,
// Image display.
"resource://gre/res/ImageDocument.css": Ci.nsIContentPolicy.TYPE_STYLESHEET,
"resource://gre/res/TopLevelImageDocument.css": Ci.nsIContentPolicy.TYPE_STYLESHEET,
"chrome://global/skin/media/TopLevelImageDocument.css": Ci.nsIContentPolicy.TYPE_STYLESHEET,
// Resizing text boxes.
"chrome://global/content/bindings/resizer.xml": Ci.nsIContentPolicy.TYPE_XBL,
shouldLoad: function(aContentType, aContentLocation, aRequestOrigin, aContext, aMimeTypeGuess, aExtra) {
// Accept if no content URI or scheme is not a resource/chrome.
if (!aContentLocation || !(aContentLocation.schemeIs('resource') || aContentLocation.schemeIs('chrome')))
return Ci.nsIContentPolicy.ACCEPT;
......@@ -34,6 +53,16 @@ ContentPolicy.prototype = {
if (Ci.nsIContentPolicy.TYPE_DOCUMENT === aContentType)
return Ci.nsIContentPolicy.ACCEPT;
// There's certain things that break horribly if they aren't allowed to
// access URIs with proscribed schemes, with `aContentOrigin` basically
// set to arbibrary URIs.
// XXX: Feature gate this behind the security slider or something, I don't
// give a fuck.
if (aContentLocation.spec in this.uriWhitelist)
if (this.uriWhitelist[aContentLocation.spec] == aContentType)
return Ci.nsIContentPolicy.ACCEPT;
return Ci.nsIContentPolicy.REJECT_REQUEST;
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment