1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* vim: set ts=8 sts=2 et sw=2 tw=80: */
3 /* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this
5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
7 #include "nsScriptSecurityManager.h"
9 #include "mozilla/ArrayUtils.h"
10 #include "mozilla/StaticPrefs_extensions.h"
11 #include "mozilla/StaticPrefs_security.h"
12 #include "mozilla/StoragePrincipalHelper.h"
14 #include "xpcpublic.h"
15 #include "XPCWrapper.h"
16 #include "nsILoadContext.h"
17 #include "nsIScriptObjectPrincipal.h"
18 #include "nsIScriptContext.h"
19 #include "nsIScriptError.h"
20 #include "nsINestedURI.h"
22 #include "nsJSPrincipals.h"
23 #include "mozilla/BasePrincipal.h"
24 #include "ExpandedPrincipal.h"
25 #include "SystemPrincipal.h"
26 #include "DomainPolicy.h"
29 #include "nsCRTGlue.h"
30 #include "nsContentSecurityUtils.h"
31 #include "nsDocShell.h"
33 #include "nsGlobalWindowInner.h"
35 #include "nsTextFormatter.h"
36 #include "nsIStringBundle.h"
37 #include "nsNetUtil.h"
38 #include "nsIEffectiveTLDService.h"
39 #include "nsDirectoryServiceDefs.h"
40 #include "nsIScriptGlobalObject.h"
41 #include "nsPIDOMWindow.h"
42 #include "nsIDocShell.h"
43 #include "nsIConsoleService.h"
44 #include "nsIOService.h"
45 #include "nsIContent.h"
46 #include "nsDOMJSUtils.h"
47 #include "nsAboutProtocolUtils.h"
48 #include "nsIClassInfo.h"
49 #include "nsIURIFixup.h"
50 #include "nsIChromeRegistry.h"
51 #include "nsIResProtocolHandler.h"
52 #include "nsIContentSecurityPolicy.h"
53 #include "mozilla/Components.h"
54 #include "mozilla/Preferences.h"
55 #include "mozilla/dom/BindingUtils.h"
56 #include "mozilla/NullPrincipal.h"
58 #include "mozilla/dom/ContentChild.h"
59 #include "mozilla/dom/ContentParent.h"
60 #include "mozilla/dom/Exceptions.h"
61 #include "mozilla/dom/nsCSPContext.h"
62 #include "mozilla/dom/ScriptSettings.h"
63 #include "mozilla/ClearOnShutdown.h"
64 #include "mozilla/ResultExtensions.h"
65 #include "mozilla/StaticPtr.h"
66 #include "mozilla/dom/WorkerCommon.h"
67 #include "mozilla/dom/WorkerPrivate.h"
68 #include "nsContentUtils.h"
69 #include "nsJSUtils.h"
70 #include "nsILoadInfo.h"
72 // This should be probably defined on some other place... but I couldn't find it
73 #define WEBAPPS_PERM_NAME "webapps-manage"
75 using namespace mozilla
;
76 using namespace mozilla::dom
;
78 nsIIOService
* nsScriptSecurityManager::sIOService
= nullptr;
79 bool nsScriptSecurityManager::sStrictFileOriginPolicy
= true;
85 NS_INLINE_DECL_REFCOUNTING(BundleHelper
)
87 static nsIStringBundle
* GetOrCreate() {
88 MOZ_ASSERT(!sShutdown
);
90 // Already shutting down. Nothing should require the use of the string
91 // bundle when shutting down.
97 sSelf
= new BundleHelper();
100 return sSelf
->GetOrCreateInternal();
103 static void Shutdown() {
109 ~BundleHelper() = default;
111 nsIStringBundle
* GetOrCreateInternal() {
113 nsCOMPtr
<nsIStringBundleService
> bundleService
=
114 mozilla::components::StringBundle::Service();
115 if (NS_WARN_IF(!bundleService
)) {
119 nsresult rv
= bundleService
->CreateBundle(
120 "chrome://global/locale/security/caps.properties",
121 getter_AddRefs(mBundle
));
122 if (NS_WARN_IF(NS_FAILED(rv
))) {
130 nsCOMPtr
<nsIStringBundle
> mBundle
;
132 static StaticRefPtr
<BundleHelper
> sSelf
;
133 static bool sShutdown
;
136 StaticRefPtr
<BundleHelper
> BundleHelper::sSelf
;
137 bool BundleHelper::sShutdown
= false;
141 ///////////////////////////
142 // Convenience Functions //
143 ///////////////////////////
145 class nsAutoInPrincipalDomainOriginSetter
{
147 nsAutoInPrincipalDomainOriginSetter() { ++sInPrincipalDomainOrigin
; }
148 ~nsAutoInPrincipalDomainOriginSetter() { --sInPrincipalDomainOrigin
; }
149 static uint32_t sInPrincipalDomainOrigin
;
151 uint32_t nsAutoInPrincipalDomainOriginSetter::sInPrincipalDomainOrigin
;
153 static nsresult
GetOriginFromURI(nsIURI
* aURI
, nsACString
& aOrigin
) {
155 return NS_ERROR_NULL_POINTER
;
157 if (nsAutoInPrincipalDomainOriginSetter::sInPrincipalDomainOrigin
> 1) {
158 // Allow a single recursive call to GetPrincipalDomainOrigin, since that
159 // might be happening on a different principal from the first call. But
160 // after that, cut off the recursion; it just indicates that something
161 // we're doing in this method causes us to reenter a security check here.
162 return NS_ERROR_NOT_AVAILABLE
;
165 nsAutoInPrincipalDomainOriginSetter autoSetter
;
167 nsCOMPtr
<nsIURI
> uri
= NS_GetInnermostURI(aURI
);
168 NS_ENSURE_TRUE(uri
, NS_ERROR_UNEXPECTED
);
170 nsAutoCString hostPort
;
172 nsresult rv
= uri
->GetHostPort(hostPort
);
173 if (NS_SUCCEEDED(rv
)) {
174 nsAutoCString scheme
;
175 rv
= uri
->GetScheme(scheme
);
176 NS_ENSURE_SUCCESS(rv
, rv
);
177 aOrigin
= scheme
+ "://"_ns
+ hostPort
;
179 // Some URIs (e.g., nsSimpleURI) don't support host. Just
180 // get the full spec.
181 rv
= uri
->GetSpec(aOrigin
);
182 NS_ENSURE_SUCCESS(rv
, rv
);
188 static nsresult
GetPrincipalDomainOrigin(nsIPrincipal
* aPrincipal
,
189 nsACString
& aOrigin
) {
191 nsCOMPtr
<nsIURI
> uri
;
192 aPrincipal
->GetDomain(getter_AddRefs(uri
));
193 nsresult rv
= GetOriginFromURI(uri
, aOrigin
);
194 if (NS_SUCCEEDED(rv
)) {
197 // If there is no Domain fallback to the Principals Origin
198 return aPrincipal
->GetOriginNoSuffix(aOrigin
);
201 inline void SetPendingExceptionASCII(JSContext
* cx
, const char* aMsg
) {
202 JS_ReportErrorASCII(cx
, "%s", aMsg
);
205 inline void SetPendingException(JSContext
* cx
, const char16_t
* aMsg
) {
206 NS_ConvertUTF16toUTF8
msg(aMsg
);
207 JS_ReportErrorUTF8(cx
, "%s", msg
.get());
211 bool nsScriptSecurityManager::SecurityCompareURIs(nsIURI
* aSourceURI
,
212 nsIURI
* aTargetURI
) {
213 return NS_SecurityCompareURIs(aSourceURI
, aTargetURI
,
214 sStrictFileOriginPolicy
);
217 // SecurityHashURI is consistent with SecurityCompareURIs because
218 // NS_SecurityHashURI is consistent with NS_SecurityCompareURIs. See
220 uint32_t nsScriptSecurityManager::SecurityHashURI(nsIURI
* aURI
) {
221 return NS_SecurityHashURI(aURI
);
225 * GetChannelResultPrincipal will return the principal that the resource
226 * returned by this channel will use. For example, if the resource is in
227 * a sandbox, it will return the nullprincipal. If the resource is forced
228 * to inherit principal, it will return the principal of its parent. If
229 * the load doesn't require sandboxing or inheriting, it will return the same
230 * principal as GetChannelURIPrincipal. Namely the principal of the URI
231 * that is being loaded.
234 nsScriptSecurityManager::GetChannelResultPrincipal(nsIChannel
* aChannel
,
235 nsIPrincipal
** aPrincipal
) {
236 return GetChannelResultPrincipal(aChannel
, aPrincipal
,
237 /*aIgnoreSandboxing*/ false);
240 nsresult
nsScriptSecurityManager::GetChannelResultPrincipalIfNotSandboxed(
241 nsIChannel
* aChannel
, nsIPrincipal
** aPrincipal
) {
242 return GetChannelResultPrincipal(aChannel
, aPrincipal
,
243 /*aIgnoreSandboxing*/ true);
247 nsScriptSecurityManager::GetChannelResultStoragePrincipal(
248 nsIChannel
* aChannel
, nsIPrincipal
** aPrincipal
) {
249 nsCOMPtr
<nsIPrincipal
> principal
;
250 nsresult rv
= GetChannelResultPrincipal(aChannel
, getter_AddRefs(principal
),
251 /*aIgnoreSandboxing*/ false);
252 if (NS_WARN_IF(NS_FAILED(rv
))) {
256 return StoragePrincipalHelper::Create(
257 aChannel
, principal
, /* aForceIsolation */ false, aPrincipal
);
261 nsScriptSecurityManager::GetChannelResultPrincipals(
262 nsIChannel
* aChannel
, nsIPrincipal
** aPrincipal
,
263 nsIPrincipal
** aPartitionedPrincipal
) {
264 nsresult rv
= GetChannelResultPrincipal(aChannel
, aPrincipal
,
265 /*aIgnoreSandboxing*/ false);
266 if (NS_WARN_IF(NS_FAILED(rv
))) {
270 if (!(*aPrincipal
)->GetIsContentPrincipal()) {
271 // If for some reason we don't have a content principal here, just reuse our
272 // principal for the storage principal too, since attempting to create a
273 // storage principal would fail anyway.
274 nsCOMPtr
<nsIPrincipal
> copy
= *aPrincipal
;
275 copy
.forget(aPartitionedPrincipal
);
279 return StoragePrincipalHelper::Create(
280 aChannel
, *aPrincipal
, /* aForceIsolation */ true, aPartitionedPrincipal
);
283 nsresult
nsScriptSecurityManager::GetChannelResultPrincipal(
284 nsIChannel
* aChannel
, nsIPrincipal
** aPrincipal
, bool aIgnoreSandboxing
) {
285 MOZ_ASSERT(aChannel
, "Must have channel!");
287 // Check whether we have an nsILoadInfo that says what we should do.
288 nsCOMPtr
<nsILoadInfo
> loadInfo
= aChannel
->LoadInfo();
289 if (loadInfo
->GetForceInheritPrincipalOverruleOwner()) {
290 nsCOMPtr
<nsIPrincipal
> principalToInherit
=
291 loadInfo
->FindPrincipalToInherit(aChannel
);
292 principalToInherit
.forget(aPrincipal
);
296 nsCOMPtr
<nsISupports
> owner
;
297 aChannel
->GetOwner(getter_AddRefs(owner
));
299 CallQueryInterface(owner
, aPrincipal
);
305 if (!aIgnoreSandboxing
&& loadInfo
->GetLoadingSandboxed()) {
306 nsCOMPtr
<nsIPrincipal
> sandboxedLoadingPrincipal
=
307 loadInfo
->GetSandboxedLoadingPrincipal();
308 MOZ_ASSERT(sandboxedLoadingPrincipal
);
309 sandboxedLoadingPrincipal
.forget(aPrincipal
);
313 bool forceInherit
= loadInfo
->GetForceInheritPrincipal();
314 if (aIgnoreSandboxing
&& !forceInherit
) {
315 // Check if SEC_FORCE_INHERIT_PRINCIPAL was dropped because of
317 if (loadInfo
->GetLoadingSandboxed() &&
318 loadInfo
->GetForceInheritPrincipalDropped()) {
323 nsCOMPtr
<nsIPrincipal
> principalToInherit
=
324 loadInfo
->FindPrincipalToInherit(aChannel
);
325 principalToInherit
.forget(aPrincipal
);
329 auto securityMode
= loadInfo
->GetSecurityMode();
330 // The data: inheritance flags should only apply to the initial load,
331 // not to loads that it might have redirected to.
332 if (loadInfo
->RedirectChain().IsEmpty() &&
334 nsILoadInfo::SEC_REQUIRE_SAME_ORIGIN_INHERITS_SEC_CONTEXT
||
336 nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_INHERITS_SEC_CONTEXT
||
337 securityMode
== nsILoadInfo::SEC_REQUIRE_CORS_INHERITS_SEC_CONTEXT
)) {
338 nsCOMPtr
<nsIURI
> uri
;
339 nsresult rv
= NS_GetFinalChannelURI(aChannel
, getter_AddRefs(uri
));
340 NS_ENSURE_SUCCESS(rv
, rv
);
342 nsCOMPtr
<nsIPrincipal
> principalToInherit
=
343 loadInfo
->FindPrincipalToInherit(aChannel
);
344 bool inheritForAboutBlank
= loadInfo
->GetAboutBlankInherits();
346 if (nsContentUtils::ChannelShouldInheritPrincipal(
347 principalToInherit
, uri
, inheritForAboutBlank
, false)) {
348 principalToInherit
.forget(aPrincipal
);
352 return GetChannelURIPrincipal(aChannel
, aPrincipal
);
355 /* The principal of the URI that this channel is loading. This is never
356 * affected by things like sandboxed loads, or loads where we forcefully
357 * inherit the principal. Think of this as the principal of the server
358 * which this channel is loading from. Most callers should use
359 * GetChannelResultPrincipal instead of GetChannelURIPrincipal. Only
360 * call GetChannelURIPrincipal if you are sure that you want the
361 * principal that matches the uri, even in cases when the load is
362 * sandboxed or when the load could be a blob or data uri (i.e even when
363 * you encounter loads that may or may not be sandboxed and loads
364 * that may or may not inherit)."
367 nsScriptSecurityManager::GetChannelURIPrincipal(nsIChannel
* aChannel
,
368 nsIPrincipal
** aPrincipal
) {
369 MOZ_ASSERT(aChannel
, "Must have channel!");
371 // Get the principal from the URI. Make sure this does the same thing
372 // as Document::Reset and PrototypeDocumentContentSink::Init.
373 nsCOMPtr
<nsIURI
> uri
;
374 nsresult rv
= NS_GetFinalChannelURI(aChannel
, getter_AddRefs(uri
));
375 NS_ENSURE_SUCCESS(rv
, rv
);
377 nsCOMPtr
<nsILoadInfo
> loadInfo
= aChannel
->LoadInfo();
379 // Inherit the origin attributes from loadInfo.
380 // If this is a top-level document load, the origin attributes of the
381 // loadInfo will be set from nsDocShell::DoURILoad.
382 // For subresource loading, the origin attributes of the loadInfo is from
383 // its loadingPrincipal.
384 OriginAttributes attrs
= loadInfo
->GetOriginAttributes();
386 nsCOMPtr
<nsIPrincipal
> prin
=
387 BasePrincipal::CreateContentPrincipal(uri
, attrs
);
388 prin
.forget(aPrincipal
);
389 return *aPrincipal
? NS_OK
: NS_ERROR_FAILURE
;
392 /////////////////////////////
393 // nsScriptSecurityManager //
394 /////////////////////////////
396 ////////////////////////////////////
397 // Methods implementing ISupports //
398 ////////////////////////////////////
399 NS_IMPL_ISUPPORTS(nsScriptSecurityManager
, nsIScriptSecurityManager
)
401 ///////////////////////////////////////////////////
402 // Methods implementing nsIScriptSecurityManager //
403 ///////////////////////////////////////////////////
405 ///////////////// Security Checks /////////////////
407 bool nsScriptSecurityManager::ContentSecurityPolicyPermitsJSAction(
408 JSContext
* cx
, JS::HandleString aCode
) {
409 MOZ_ASSERT(cx
== nsContentUtils::GetCurrentJSContext());
411 // Get the window, if any, corresponding to the current global
412 nsCOMPtr
<nsIContentSecurityPolicy
> csp
;
413 if (nsGlobalWindowInner
* win
= xpc::CurrentWindowOrNull(cx
)) {
417 nsCOMPtr
<nsIPrincipal
> subjectPrincipal
= nsContentUtils::SubjectPrincipal();
419 // Get the CSP for addon sandboxes. If the principal is expanded and has a
420 // csp, we're probably in luck.
421 auto* basePrin
= BasePrincipal::Cast(subjectPrincipal
);
422 // ContentScriptAddonPolicy means it is also an expanded principal, thus
423 // this is in a sandbox used as a content script.
424 if (basePrin
->ContentScriptAddonPolicy()) {
425 basePrin
->As
<ExpandedPrincipal
>()->GetCsp(getter_AddRefs(csp
));
427 // don't do anything unless there's a CSP
433 nsCOMPtr
<nsICSPEventListener
> cspEventListener
;
434 if (!NS_IsMainThread()) {
435 WorkerPrivate
* workerPrivate
=
436 mozilla::dom::GetWorkerPrivateFromContext(cx
);
438 cspEventListener
= workerPrivate
->CSPEventListener();
443 bool reportViolation
= false;
444 nsresult rv
= csp
->GetAllowsEval(&reportViolation
, &evalOK
);
446 // A little convoluted. We want the scriptSample for a) reporting a violation
447 // or b) passing it to AssertEvalNotUsingSystemPrincipal or c) we're in the
448 // parent process. So do the work to get it if either of those cases is true.
449 nsAutoJSString scriptSample
;
450 if (reportViolation
|| subjectPrincipal
->IsSystemPrincipal() ||
451 XRE_IsE10sParentProcess()) {
452 if (NS_WARN_IF(!scriptSample
.init(cx
, aCode
))) {
453 JS_ClearPendingException(cx
);
458 #if !defined(ANDROID)
459 if (!nsContentSecurityUtils::IsEvalAllowed(
460 cx
, subjectPrincipal
->IsSystemPrincipal(), scriptSample
)) {
466 NS_WARNING("CSP: failed to get allowsEval");
467 return true; // fail open to not break sites.
470 if (reportViolation
) {
471 JS::AutoFilename scriptFilename
;
472 nsAutoString fileName
;
473 unsigned lineNum
= 0;
474 unsigned columnNum
= 0;
475 if (JS::DescribeScriptedCaller(cx
, &scriptFilename
, &lineNum
, &columnNum
)) {
476 if (const char* file
= scriptFilename
.get()) {
477 CopyUTF8toUTF16(nsDependentCString(file
), fileName
);
480 MOZ_ASSERT(!JS_IsExceptionPending(cx
));
482 csp
->LogViolationDetails(nsIContentSecurityPolicy::VIOLATION_TYPE_EVAL
,
483 nullptr, // triggering element
484 cspEventListener
, fileName
, scriptSample
, lineNum
,
485 columnNum
, u
""_ns
, u
""_ns
);
492 bool nsScriptSecurityManager::JSPrincipalsSubsume(JSPrincipals
* first
,
493 JSPrincipals
* second
) {
494 return nsJSPrincipals::get(first
)->Subsumes(nsJSPrincipals::get(second
));
498 nsScriptSecurityManager::CheckSameOriginURI(nsIURI
* aSourceURI
,
501 bool aFromPrivateWindow
) {
502 // Please note that aFromPrivateWindow is only 100% accurate if
503 // reportError is true.
504 if (!SecurityCompareURIs(aSourceURI
, aTargetURI
)) {
506 ReportError("CheckSameOriginError", aSourceURI
, aTargetURI
,
509 return NS_ERROR_DOM_BAD_URI
;
515 nsScriptSecurityManager::CheckLoadURIFromScript(JSContext
* cx
, nsIURI
* aURI
) {
516 // Get principal of currently executing script.
517 MOZ_ASSERT(cx
== nsContentUtils::GetCurrentJSContext());
518 nsIPrincipal
* principal
= nsContentUtils::SubjectPrincipal();
519 nsresult rv
= CheckLoadURIWithPrincipal(
520 // Passing 0 for the window ID here is OK, because we will report a
521 // script-visible exception anyway.
522 principal
, aURI
, nsIScriptSecurityManager::STANDARD
, 0);
523 if (NS_SUCCEEDED(rv
)) {
530 if (NS_FAILED(aURI
->GetAsciiSpec(spec
))) return NS_ERROR_FAILURE
;
531 nsAutoCString
msg("Access to '");
533 msg
.AppendLiteral("' from script denied");
534 SetPendingExceptionASCII(cx
, msg
.get());
535 return NS_ERROR_DOM_BAD_URI
;
539 * Helper method to handle cases where a flag passed to
540 * CheckLoadURIWithPrincipal means denying loading if the given URI has certain
541 * nsIProtocolHandler flags set.
542 * @return if success, access is allowed. Otherwise, deny access
544 static nsresult
DenyAccessIfURIHasFlags(nsIURI
* aURI
, uint32_t aURIFlags
) {
545 MOZ_ASSERT(aURI
, "Must have URI!");
548 nsresult rv
= NS_URIChainHasFlags(aURI
, aURIFlags
, &uriHasFlags
);
549 NS_ENSURE_SUCCESS(rv
, rv
);
552 return NS_ERROR_DOM_BAD_URI
;
558 static bool EqualOrSubdomain(nsIURI
* aProbeArg
, nsIURI
* aBase
) {
560 nsCOMPtr
<nsIURI
> probe
= aProbeArg
;
562 nsCOMPtr
<nsIEffectiveTLDService
> tldService
=
563 do_GetService(NS_EFFECTIVETLDSERVICE_CONTRACTID
);
564 NS_ENSURE_TRUE(tldService
, false);
566 if (nsScriptSecurityManager::SecurityCompareURIs(probe
, aBase
)) {
570 nsAutoCString host
, newHost
;
571 rv
= probe
->GetHost(host
);
572 NS_ENSURE_SUCCESS(rv
, false);
574 rv
= tldService
->GetNextSubDomain(host
, newHost
);
575 if (rv
== NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS
) {
578 NS_ENSURE_SUCCESS(rv
, false);
579 rv
= NS_MutateURI(probe
).SetHost(newHost
).Finalize(probe
);
580 NS_ENSURE_SUCCESS(rv
, false);
585 nsScriptSecurityManager::CheckLoadURIWithPrincipal(nsIPrincipal
* aPrincipal
,
588 uint64_t aInnerWindowID
) {
589 MOZ_ASSERT(aPrincipal
, "CheckLoadURIWithPrincipal must have a principal");
591 // If someone passes a flag that we don't understand, we should
592 // fail, because they may need a security check that we don't
596 ~(nsIScriptSecurityManager::LOAD_IS_AUTOMATIC_DOCUMENT_REPLACEMENT
|
597 nsIScriptSecurityManager::ALLOW_CHROME
|
598 nsIScriptSecurityManager::DISALLOW_SCRIPT
|
599 nsIScriptSecurityManager::DISALLOW_INHERIT_PRINCIPAL
|
600 nsIScriptSecurityManager::DONT_REPORT_ERRORS
),
601 NS_ERROR_UNEXPECTED
);
602 NS_ENSURE_ARG_POINTER(aPrincipal
);
603 NS_ENSURE_ARG_POINTER(aTargetURI
);
605 // If DISALLOW_INHERIT_PRINCIPAL is set, we prevent loading of URIs which
606 // would do such inheriting. That would be URIs that do not have their own
607 // security context. We do this even for the system principal.
608 if (aFlags
& nsIScriptSecurityManager::DISALLOW_INHERIT_PRINCIPAL
) {
609 nsresult rv
= DenyAccessIfURIHasFlags(
610 aTargetURI
, nsIProtocolHandler::URI_INHERITS_SECURITY_CONTEXT
);
611 NS_ENSURE_SUCCESS(rv
, rv
);
614 if (aPrincipal
== mSystemPrincipal
) {
619 nsCOMPtr
<nsIURI
> sourceURI
;
620 auto* basePrin
= BasePrincipal::Cast(aPrincipal
);
621 basePrin
->GetURI(getter_AddRefs(sourceURI
));
623 if (basePrin
->Is
<ExpandedPrincipal
>()) {
624 auto expanded
= basePrin
->As
<ExpandedPrincipal
>();
625 const auto& allowList
= expanded
->AllowList();
626 // Only report errors when all principals fail.
627 uint32_t flags
= aFlags
| nsIScriptSecurityManager::DONT_REPORT_ERRORS
;
628 for (size_t i
= 0; i
< allowList
.Length() - 1; i
++) {
629 nsresult rv
= CheckLoadURIWithPrincipal(allowList
[i
], aTargetURI
, flags
,
631 if (NS_SUCCEEDED(rv
)) {
632 // Allow access if it succeeded with one of the allowlisted principals
637 // Report errors (if requested) for the last principal.
638 return CheckLoadURIWithPrincipal(allowList
.LastElement(), aTargetURI
,
639 aFlags
, aInnerWindowID
);
642 "Non-system principals or expanded principal passed to "
643 "CheckLoadURIWithPrincipal "
645 return NS_ERROR_UNEXPECTED
;
648 // Automatic loads are not allowed from certain protocols.
650 nsIScriptSecurityManager::LOAD_IS_AUTOMATIC_DOCUMENT_REPLACEMENT
) {
651 nsresult rv
= DenyAccessIfURIHasFlags(
653 nsIProtocolHandler::URI_FORBIDS_AUTOMATIC_DOCUMENT_REPLACEMENT
);
654 NS_ENSURE_SUCCESS(rv
, rv
);
657 // If either URI is a nested URI, get the base URI
658 nsCOMPtr
<nsIURI
> sourceBaseURI
= NS_GetInnermostURI(sourceURI
);
659 nsCOMPtr
<nsIURI
> targetBaseURI
= NS_GetInnermostURI(aTargetURI
);
661 //-- get the target scheme
662 nsAutoCString targetScheme
;
663 nsresult rv
= targetBaseURI
->GetScheme(targetScheme
);
664 if (NS_FAILED(rv
)) return rv
;
666 //-- Some callers do not allow loading javascript:
667 if ((aFlags
& nsIScriptSecurityManager::DISALLOW_SCRIPT
) &&
668 targetScheme
.EqualsLiteral("javascript")) {
669 return NS_ERROR_DOM_BAD_URI
;
672 // Check for uris that are only loadable by principals that subsume them
673 bool targetURIIsLoadableBySubsumers
= false;
674 rv
= NS_URIChainHasFlags(targetBaseURI
,
675 nsIProtocolHandler::URI_LOADABLE_BY_SUBSUMERS
,
676 &targetURIIsLoadableBySubsumers
);
677 NS_ENSURE_SUCCESS(rv
, rv
);
679 if (targetURIIsLoadableBySubsumers
) {
680 // check nothing else in the URI chain has flags that prevent
682 rv
= CheckLoadURIFlags(
683 sourceURI
, aTargetURI
, sourceBaseURI
, targetBaseURI
, aFlags
,
684 aPrincipal
->OriginAttributesRef().mPrivateBrowsingId
> 0,
686 NS_ENSURE_SUCCESS(rv
, rv
);
687 // Check the principal is allowed to load the target.
688 if (aFlags
& nsIScriptSecurityManager::DONT_REPORT_ERRORS
) {
689 return aPrincipal
->CheckMayLoad(targetBaseURI
, false);
691 return aPrincipal
->CheckMayLoadWithReporting(targetBaseURI
, false,
695 //-- get the source scheme
696 nsAutoCString sourceScheme
;
697 rv
= sourceBaseURI
->GetScheme(sourceScheme
);
698 if (NS_FAILED(rv
)) return rv
;
700 if (sourceScheme
.LowerCaseEqualsLiteral(NS_NULLPRINCIPAL_SCHEME
)) {
701 // A null principal can target its own URI.
702 if (sourceURI
== aTargetURI
) {
705 } else if (sourceScheme
.EqualsIgnoreCase("file") &&
706 targetScheme
.EqualsIgnoreCase("moz-icon")) {
707 // exception for file: linking to moz-icon://.ext?size=...
708 // Note that because targetScheme is the base (innermost) URI scheme,
709 // this does NOT allow file -> moz-icon:file:///... links.
710 // This is intentional.
714 // Check for webextension
715 bool targetURIIsLoadableByExtensions
= false;
716 rv
= NS_URIChainHasFlags(aTargetURI
,
717 nsIProtocolHandler::URI_LOADABLE_BY_EXTENSIONS
,
718 &targetURIIsLoadableByExtensions
);
719 NS_ENSURE_SUCCESS(rv
, rv
);
721 if (targetURIIsLoadableByExtensions
&&
722 BasePrincipal::Cast(aPrincipal
)->AddonPolicy()) {
726 // If we get here, check all the schemes can link to each other, from the top
728 nsCOMPtr
<nsIURI
> currentURI
= sourceURI
;
729 nsCOMPtr
<nsIURI
> currentOtherURI
= aTargetURI
;
731 bool denySameSchemeLinks
= false;
732 rv
= NS_URIChainHasFlags(aTargetURI
,
733 nsIProtocolHandler::URI_SCHEME_NOT_SELF_LINKABLE
,
734 &denySameSchemeLinks
);
735 if (NS_FAILED(rv
)) return rv
;
737 while (currentURI
&& currentOtherURI
) {
738 nsAutoCString scheme
, otherScheme
;
739 currentURI
->GetScheme(scheme
);
740 currentOtherURI
->GetScheme(otherScheme
);
743 scheme
.Equals(otherScheme
, nsCaseInsensitiveCStringComparator
);
744 bool isSamePage
= false;
745 // about: URIs are special snowflakes.
746 if (scheme
.EqualsLiteral("about") && schemesMatch
) {
747 nsAutoCString moduleName
, otherModuleName
;
748 // about: pages can always link to themselves:
750 NS_SUCCEEDED(NS_GetAboutModuleName(currentURI
, moduleName
)) &&
752 NS_GetAboutModuleName(currentOtherURI
, otherModuleName
)) &&
753 moduleName
.Equals(otherModuleName
);
755 // We will have allowed the load earlier if the source page has
756 // system principal. So we know the source has a content
757 // principal, and it's trying to link to something else.
758 // Linkable about: pages are always reachable, even if we hit
759 // the CheckLoadURIFlags call below.
760 // We punch only 1 other hole: iff the source is unlinkable,
761 // we let them link to other pages explicitly marked SAFE
762 // for content. This avoids world-linkable about: pages linking
763 // to non-world-linkable about: pages.
764 nsCOMPtr
<nsIAboutModule
> module
, otherModule
;
765 bool knowBothModules
=
767 NS_GetAboutModule(currentURI
, getter_AddRefs(module
))) &&
768 NS_SUCCEEDED(NS_GetAboutModule(currentOtherURI
,
769 getter_AddRefs(otherModule
)));
770 uint32_t aboutModuleFlags
= 0;
771 uint32_t otherAboutModuleFlags
= 0;
774 NS_SUCCEEDED(module
->GetURIFlags(currentURI
, &aboutModuleFlags
)) &&
775 NS_SUCCEEDED(otherModule
->GetURIFlags(currentOtherURI
,
776 &otherAboutModuleFlags
));
777 if (knowBothModules
) {
778 isSamePage
= !(aboutModuleFlags
& nsIAboutModule::MAKE_LINKABLE
) &&
779 (otherAboutModuleFlags
&
780 nsIAboutModule::URI_SAFE_FOR_UNTRUSTED_CONTENT
);
782 otherAboutModuleFlags
& nsIAboutModule::MAKE_LINKABLE
) {
783 // XXXgijs: this is a hack. The target will be nested
784 // (with innerURI of moz-safe-about:whatever), and
785 // the source isn't, so we won't pass if we finish
786 // the loop. We *should* pass, though, so return here.
787 // This hack can go away when bug 1228118 is fixed.
793 bool equalExceptRef
= false;
794 rv
= currentURI
->EqualsExceptRef(currentOtherURI
, &equalExceptRef
);
795 isSamePage
= NS_SUCCEEDED(rv
) && equalExceptRef
;
798 // If schemes are not equal, or they're equal but the target URI
799 // is different from the source URI and doesn't always allow linking
800 // from the same scheme, check if the URI flags of the current target
801 // URI allow the current source URI to link to it.
802 // The policy is specified by the protocol flags on both URIs.
803 if (!schemesMatch
|| (denySameSchemeLinks
&& !isSamePage
)) {
804 return CheckLoadURIFlags(
805 currentURI
, currentOtherURI
, sourceBaseURI
, targetBaseURI
, aFlags
,
806 aPrincipal
->OriginAttributesRef().mPrivateBrowsingId
> 0,
809 // Otherwise... check if we can nest another level:
810 nsCOMPtr
<nsINestedURI
> nestedURI
= do_QueryInterface(currentURI
);
811 nsCOMPtr
<nsINestedURI
> nestedOtherURI
= do_QueryInterface(currentOtherURI
);
813 // If schemes match and neither URI is nested further, we're OK.
814 if (!nestedURI
&& !nestedOtherURI
) {
817 // If one is nested and the other isn't, something is wrong.
818 if (!nestedURI
!= !nestedOtherURI
) {
819 return NS_ERROR_DOM_BAD_URI
;
821 // Otherwise, both should be nested and we'll go through the loop again.
822 nestedURI
->GetInnerURI(getter_AddRefs(currentURI
));
823 nestedOtherURI
->GetInnerURI(getter_AddRefs(currentOtherURI
));
826 // We should never get here. We should always return from inside the loop.
827 return NS_ERROR_DOM_BAD_URI
;
831 * Helper method to check whether the target URI and its innermost ("base") URI
832 * has protocol flags that should stop it from being loaded by the source URI
833 * (and/or the source URI's innermost ("base") URI), taking into account any
834 * nsIScriptSecurityManager flags originally passed to
835 * CheckLoadURIWithPrincipal and friends.
837 * @return if success, access is allowed. Otherwise, deny access
839 nsresult
nsScriptSecurityManager::CheckLoadURIFlags(
840 nsIURI
* aSourceURI
, nsIURI
* aTargetURI
, nsIURI
* aSourceBaseURI
,
841 nsIURI
* aTargetBaseURI
, uint32_t aFlags
, bool aFromPrivateWindow
,
842 uint64_t aInnerWindowID
) {
843 // Note that the order of policy checks here is very important!
844 // We start from most restrictive and work our way down.
845 bool reportErrors
= !(aFlags
& nsIScriptSecurityManager::DONT_REPORT_ERRORS
);
846 const char* errorTag
= "CheckLoadURIError";
848 nsAutoCString targetScheme
;
849 nsresult rv
= aTargetBaseURI
->GetScheme(targetScheme
);
850 if (NS_FAILED(rv
)) return rv
;
852 // Check for system target URI
853 rv
= DenyAccessIfURIHasFlags(aTargetURI
,
854 nsIProtocolHandler::URI_DANGEROUS_TO_LOAD
);
856 // Deny access, since the origin principal is not system
858 ReportError(errorTag
, aSourceURI
, aTargetURI
, aFromPrivateWindow
,
864 // Used by ExtensionProtocolHandler to prevent loading extension resources
865 // in private contexts if the extension does not have permission.
866 if (aFromPrivateWindow
) {
867 rv
= DenyAccessIfURIHasFlags(
868 aTargetURI
, nsIProtocolHandler::URI_DISALLOW_IN_PRIVATE_CONTEXT
);
871 ReportError(errorTag
, aSourceURI
, aTargetURI
, aFromPrivateWindow
,
878 // Check for chrome target URI
879 bool targetURIIsUIResource
= false;
880 rv
= NS_URIChainHasFlags(aTargetURI
, nsIProtocolHandler::URI_IS_UI_RESOURCE
,
881 &targetURIIsUIResource
);
882 NS_ENSURE_SUCCESS(rv
, rv
);
883 if (targetURIIsUIResource
) {
884 // ALLOW_CHROME is a flag that we pass on all loads _except_ docshell
885 // loads (since docshell loads run the loaded content with its origin
886 // principal). We are effectively allowing resource:// and chrome://
887 // URIs to load as long as they are content accessible and as long
888 // they're not loading it as a document.
889 if (aFlags
& nsIScriptSecurityManager::ALLOW_CHROME
) {
890 bool sourceIsUIResource
= false;
891 rv
= NS_URIChainHasFlags(aSourceBaseURI
,
892 nsIProtocolHandler::URI_IS_UI_RESOURCE
,
893 &sourceIsUIResource
);
894 NS_ENSURE_SUCCESS(rv
, rv
);
895 if (sourceIsUIResource
) {
896 // TODO Bug 1654488: Remove pref in CheckLoadURIFlags which
897 // allows all UI resources to load
899 security_caps_allow_uri_is_ui_resource_in_checkloaduriflags()) {
902 // Special case for moz-icon URIs loaded by a local resources like
903 // e.g. chrome: or resource:
904 if (targetScheme
.EqualsLiteral("moz-icon")) {
909 if (targetScheme
.EqualsLiteral("resource")) {
910 if (StaticPrefs::security_all_resource_uri_content_accessible()) {
914 nsCOMPtr
<nsIProtocolHandler
> ph
;
915 rv
= sIOService
->GetProtocolHandler("resource", getter_AddRefs(ph
));
916 NS_ENSURE_SUCCESS(rv
, rv
);
918 return NS_ERROR_DOM_BAD_URI
;
921 nsCOMPtr
<nsIResProtocolHandler
> rph
= do_QueryInterface(ph
);
923 return NS_ERROR_DOM_BAD_URI
;
926 bool accessAllowed
= false;
927 rph
->AllowContentToAccess(aTargetBaseURI
, &accessAllowed
);
931 } else if (targetScheme
.EqualsLiteral("chrome")) {
932 // Allow the load only if the chrome package is allowlisted.
933 nsCOMPtr
<nsIXULChromeRegistry
> reg(
934 do_GetService(NS_CHROMEREGISTRY_CONTRACTID
));
936 bool accessAllowed
= false;
937 reg
->AllowContentToAccess(aTargetBaseURI
, &accessAllowed
);
942 } else if (targetScheme
.EqualsLiteral("moz-page-thumb")) {
943 if (XRE_IsParentProcess()) {
947 auto& remoteType
= dom::ContentChild::GetSingleton()->GetRemoteType();
948 if (remoteType
== PRIVILEGEDABOUT_REMOTE_TYPE
) {
955 ReportError(errorTag
, aSourceURI
, aTargetURI
, aFromPrivateWindow
,
958 return NS_ERROR_DOM_BAD_URI
;
961 // Check for target URI pointing to a file
962 bool targetURIIsLocalFile
= false;
963 rv
= NS_URIChainHasFlags(aTargetURI
, nsIProtocolHandler::URI_IS_LOCAL_FILE
,
964 &targetURIIsLocalFile
);
965 NS_ENSURE_SUCCESS(rv
, rv
);
966 if (targetURIIsLocalFile
) {
967 // Allow domains that were allowlisted in the prefs. In 99.9% of cases,
968 // this array is empty.
970 MOZ_ALWAYS_SUCCEEDS(InFileURIAllowlist(aSourceURI
, &isAllowlisted
));
976 if (aSourceBaseURI
->SchemeIs("chrome")) {
982 ReportError(errorTag
, aSourceURI
, aTargetURI
, aFromPrivateWindow
,
985 return NS_ERROR_DOM_BAD_URI
;
990 // Everyone is allowed to load this. The case URI_LOADABLE_BY_SUBSUMERS
991 // is handled by the caller which is just delegating to us as a helper.
992 bool hasSubsumersFlag
= false;
993 NS_URIChainHasFlags(aTargetBaseURI
,
994 nsIProtocolHandler::URI_LOADABLE_BY_SUBSUMERS
,
996 bool hasLoadableByAnyone
= false;
997 NS_URIChainHasFlags(aTargetBaseURI
,
998 nsIProtocolHandler::URI_LOADABLE_BY_ANYONE
,
999 &hasLoadableByAnyone
);
1000 MOZ_ASSERT(hasLoadableByAnyone
|| hasSubsumersFlag
,
1001 "why do we get here and do not have any of the two flags set?");
1008 nsresult
nsScriptSecurityManager::ReportError(const char* aMessageTag
,
1009 const nsACString
& aSourceSpec
,
1010 const nsACString
& aTargetSpec
,
1011 bool aFromPrivateWindow
,
1012 uint64_t aInnerWindowID
) {
1013 if (aSourceSpec
.IsEmpty() || aTargetSpec
.IsEmpty()) {
1017 nsCOMPtr
<nsIStringBundle
> bundle
= BundleHelper::GetOrCreate();
1018 if (NS_WARN_IF(!bundle
)) {
1022 // Localize the error message
1023 nsAutoString message
;
1024 AutoTArray
<nsString
, 2> formatStrings
;
1025 CopyASCIItoUTF16(aSourceSpec
, *formatStrings
.AppendElement());
1026 CopyASCIItoUTF16(aTargetSpec
, *formatStrings
.AppendElement());
1028 bundle
->FormatStringFromName(aMessageTag
, formatStrings
, message
);
1029 NS_ENSURE_SUCCESS(rv
, rv
);
1031 nsCOMPtr
<nsIConsoleService
> console(
1032 do_GetService(NS_CONSOLESERVICE_CONTRACTID
));
1033 NS_ENSURE_TRUE(console
, NS_ERROR_FAILURE
);
1034 nsCOMPtr
<nsIScriptError
> error(do_CreateInstance(NS_SCRIPTERROR_CONTRACTID
));
1035 NS_ENSURE_TRUE(error
, NS_ERROR_FAILURE
);
1037 // using category of "SOP" so we can link to MDN
1038 if (aInnerWindowID
!= 0) {
1039 rv
= error
->InitWithWindowID(
1040 message
, u
""_ns
, u
""_ns
, 0, 0, nsIScriptError::errorFlag
, "SOP"_ns
,
1041 aInnerWindowID
, true /* From chrome context */);
1043 rv
= error
->Init(message
, u
""_ns
, u
""_ns
, 0, 0, nsIScriptError::errorFlag
,
1044 "SOP", aFromPrivateWindow
, true /* From chrome context */);
1046 NS_ENSURE_SUCCESS(rv
, rv
);
1047 console
->LogMessage(error
);
1051 nsresult
nsScriptSecurityManager::ReportError(const char* aMessageTag
,
1052 nsIURI
* aSource
, nsIURI
* aTarget
,
1053 bool aFromPrivateWindow
,
1054 uint64_t aInnerWindowID
) {
1055 NS_ENSURE_TRUE(aSource
&& aTarget
, NS_ERROR_NULL_POINTER
);
1057 // Get the source URL spec
1058 nsAutoCString sourceSpec
;
1059 nsresult rv
= aSource
->GetAsciiSpec(sourceSpec
);
1060 NS_ENSURE_SUCCESS(rv
, rv
);
1062 // Get the target URL spec
1063 nsAutoCString targetSpec
;
1064 rv
= aTarget
->GetAsciiSpec(targetSpec
);
1065 NS_ENSURE_SUCCESS(rv
, rv
);
1067 return ReportError(aMessageTag
, sourceSpec
, targetSpec
, aFromPrivateWindow
,
1072 nsScriptSecurityManager::CheckLoadURIStrWithPrincipal(
1073 nsIPrincipal
* aPrincipal
, const nsACString
& aTargetURIStr
,
1076 nsCOMPtr
<nsIURI
> target
;
1077 rv
= NS_NewURI(getter_AddRefs(target
), aTargetURIStr
);
1078 NS_ENSURE_SUCCESS(rv
, rv
);
1080 rv
= CheckLoadURIWithPrincipal(aPrincipal
, target
, aFlags
, 0);
1081 if (rv
== NS_ERROR_DOM_BAD_URI
) {
1082 // Don't warn because NS_ERROR_DOM_BAD_URI is one of the expected
1086 NS_ENSURE_SUCCESS(rv
, rv
);
1088 // Now start testing fixup -- since aTargetURIStr is a string, not
1089 // an nsIURI, we may well end up fixing it up before loading.
1090 // Note: This needs to stay in sync with the nsIURIFixup api.
1091 nsCOMPtr
<nsIURIFixup
> fixup
= components::URIFixup::Service();
1096 // URIFixup's keyword and alternate flags can only fixup to http/https, so we
1097 // can skip testing them. This simplifies our life because this code can be
1098 // invoked from the content process where the search service would not be
1100 uint32_t flags
[] = {nsIURIFixup::FIXUP_FLAG_NONE
,
1101 nsIURIFixup::FIXUP_FLAG_FIX_SCHEME_TYPOS
};
1102 for (uint32_t i
= 0; i
< ArrayLength(flags
); ++i
) {
1103 uint32_t fixupFlags
= flags
[i
];
1104 if (aPrincipal
->OriginAttributesRef().mPrivateBrowsingId
> 0) {
1105 fixupFlags
|= nsIURIFixup::FIXUP_FLAG_PRIVATE_CONTEXT
;
1107 nsCOMPtr
<nsIURIFixupInfo
> fixupInfo
;
1108 rv
= fixup
->GetFixupURIInfo(aTargetURIStr
, fixupFlags
,
1109 getter_AddRefs(fixupInfo
));
1110 NS_ENSURE_SUCCESS(rv
, rv
);
1111 rv
= fixupInfo
->GetPreferredURI(getter_AddRefs(target
));
1112 NS_ENSURE_SUCCESS(rv
, rv
);
1114 rv
= CheckLoadURIWithPrincipal(aPrincipal
, target
, aFlags
, 0);
1115 if (rv
== NS_ERROR_DOM_BAD_URI
) {
1116 // Don't warn because NS_ERROR_DOM_BAD_URI is one of the expected
1120 NS_ENSURE_SUCCESS(rv
, rv
);
1127 nsScriptSecurityManager::CheckLoadURIWithPrincipalFromJS(
1128 nsIPrincipal
* aPrincipal
, nsIURI
* aTargetURI
, uint32_t aFlags
,
1129 uint64_t aInnerWindowID
, JSContext
* aCx
) {
1130 MOZ_ASSERT(aPrincipal
,
1131 "CheckLoadURIWithPrincipalFromJS must have a principal");
1132 NS_ENSURE_ARG_POINTER(aPrincipal
);
1133 NS_ENSURE_ARG_POINTER(aTargetURI
);
1136 CheckLoadURIWithPrincipal(aPrincipal
, aTargetURI
, aFlags
, aInnerWindowID
);
1137 if (NS_FAILED(rv
)) {
1138 nsAutoCString uriStr
;
1139 Unused
<< aTargetURI
->GetSpec(uriStr
);
1141 nsAutoCString
message("Load of ");
1142 message
.Append(uriStr
);
1144 nsAutoCString principalStr
;
1145 Unused
<< aPrincipal
->GetSpec(principalStr
);
1146 if (!principalStr
.IsEmpty()) {
1147 message
.AppendPrintf(" from %s", principalStr
.get());
1150 message
.Append(" denied");
1152 dom::Throw(aCx
, rv
, message
);
1159 nsScriptSecurityManager::CheckLoadURIStrWithPrincipalFromJS(
1160 nsIPrincipal
* aPrincipal
, const nsACString
& aTargetURIStr
, uint32_t aFlags
,
1162 nsCOMPtr
<nsIURI
> targetURI
;
1163 MOZ_TRY(NS_NewURI(getter_AddRefs(targetURI
), aTargetURIStr
));
1165 return CheckLoadURIWithPrincipalFromJS(aPrincipal
, targetURI
, aFlags
, 0, aCx
);
1169 nsScriptSecurityManager::InFileURIAllowlist(nsIURI
* aUri
, bool* aResult
) {
1171 MOZ_ASSERT(aResult
);
1174 for (nsIURI
* uri
: EnsureFileURIAllowlist()) {
1175 if (EqualOrSubdomain(aUri
, uri
)) {
1184 ///////////////// Principals ///////////////////////
1187 nsScriptSecurityManager::GetSystemPrincipal(nsIPrincipal
** result
) {
1188 NS_ADDREF(*result
= mSystemPrincipal
);
1194 nsScriptSecurityManager::CreateContentPrincipal(
1195 nsIURI
* aURI
, JS::Handle
<JS::Value
> aOriginAttributes
, JSContext
* aCx
,
1196 nsIPrincipal
** aPrincipal
) {
1197 OriginAttributes attrs
;
1198 if (!aOriginAttributes
.isObject() || !attrs
.Init(aCx
, aOriginAttributes
)) {
1199 return NS_ERROR_INVALID_ARG
;
1201 nsCOMPtr
<nsIPrincipal
> prin
=
1202 BasePrincipal::CreateContentPrincipal(aURI
, attrs
);
1203 prin
.forget(aPrincipal
);
1204 return *aPrincipal
? NS_OK
: NS_ERROR_FAILURE
;
1208 nsScriptSecurityManager::CreateContentPrincipalFromOrigin(
1209 const nsACString
& aOrigin
, nsIPrincipal
** aPrincipal
) {
1210 if (StringBeginsWith(aOrigin
, "["_ns
)) {
1211 return NS_ERROR_INVALID_ARG
;
1214 if (StringBeginsWith(aOrigin
,
1215 nsLiteralCString(NS_NULLPRINCIPAL_SCHEME
":"))) {
1216 return NS_ERROR_INVALID_ARG
;
1219 nsCOMPtr
<nsIPrincipal
> prin
= BasePrincipal::CreateContentPrincipal(aOrigin
);
1220 prin
.forget(aPrincipal
);
1221 return *aPrincipal
? NS_OK
: NS_ERROR_FAILURE
;
1225 nsScriptSecurityManager::PrincipalToJSON(nsIPrincipal
* aPrincipal
,
1226 nsACString
& aJSON
) {
1229 return NS_ERROR_FAILURE
;
1232 BasePrincipal::Cast(aPrincipal
)->ToJSON(aJSON
);
1234 if (aJSON
.IsEmpty()) {
1235 return NS_ERROR_FAILURE
;
1242 nsScriptSecurityManager::JSONToPrincipal(const nsACString
& aJSON
,
1243 nsIPrincipal
** aPrincipal
) {
1244 if (aJSON
.IsEmpty()) {
1245 return NS_ERROR_FAILURE
;
1248 nsCOMPtr
<nsIPrincipal
> principal
= BasePrincipal::FromJSON(aJSON
);
1251 return NS_ERROR_FAILURE
;
1254 principal
.forget(aPrincipal
);
1259 nsScriptSecurityManager::CreateNullPrincipal(
1260 JS::Handle
<JS::Value
> aOriginAttributes
, JSContext
* aCx
,
1261 nsIPrincipal
** aPrincipal
) {
1262 OriginAttributes attrs
;
1263 if (!aOriginAttributes
.isObject() || !attrs
.Init(aCx
, aOriginAttributes
)) {
1264 return NS_ERROR_INVALID_ARG
;
1266 nsCOMPtr
<nsIPrincipal
> prin
= NullPrincipal::Create(attrs
);
1267 prin
.forget(aPrincipal
);
1272 nsScriptSecurityManager::GetLoadContextContentPrincipal(
1273 nsIURI
* aURI
, nsILoadContext
* aLoadContext
, nsIPrincipal
** aPrincipal
) {
1274 NS_ENSURE_STATE(aLoadContext
);
1275 OriginAttributes docShellAttrs
;
1276 aLoadContext
->GetOriginAttributes(docShellAttrs
);
1278 nsCOMPtr
<nsIPrincipal
> prin
=
1279 BasePrincipal::CreateContentPrincipal(aURI
, docShellAttrs
);
1280 prin
.forget(aPrincipal
);
1281 return *aPrincipal
? NS_OK
: NS_ERROR_FAILURE
;
1285 nsScriptSecurityManager::GetDocShellContentPrincipal(
1286 nsIURI
* aURI
, nsIDocShell
* aDocShell
, nsIPrincipal
** aPrincipal
) {
1287 nsCOMPtr
<nsIPrincipal
> prin
= BasePrincipal::CreateContentPrincipal(
1288 aURI
, nsDocShell::Cast(aDocShell
)->GetOriginAttributes());
1289 prin
.forget(aPrincipal
);
1290 return *aPrincipal
? NS_OK
: NS_ERROR_FAILURE
;
1294 nsScriptSecurityManager::PrincipalWithOA(
1295 nsIPrincipal
* aPrincipal
, JS::Handle
<JS::Value
> aOriginAttributes
,
1296 JSContext
* aCx
, nsIPrincipal
** aReturnPrincipal
) {
1300 if (aPrincipal
->GetIsContentPrincipal()) {
1301 OriginAttributes attrs
;
1302 if (!aOriginAttributes
.isObject() || !attrs
.Init(aCx
, aOriginAttributes
)) {
1303 return NS_ERROR_INVALID_ARG
;
1305 RefPtr
<ContentPrincipal
> copy
= new ContentPrincipal();
1306 auto* contentPrincipal
= static_cast<ContentPrincipal
*>(aPrincipal
);
1307 nsresult rv
= copy
->Init(contentPrincipal
, attrs
);
1308 NS_ENSURE_SUCCESS(rv
, rv
);
1309 copy
.forget(aReturnPrincipal
);
1311 // We do this for null principals, system principals (both fine)
1312 // ... and expanded principals, where we should probably do something
1313 // cleverer, but I also don't think we care too much.
1314 nsCOMPtr
<nsIPrincipal
> prin
= aPrincipal
;
1315 prin
.forget(aReturnPrincipal
);
1318 return *aReturnPrincipal
? NS_OK
: NS_ERROR_FAILURE
;
1322 nsScriptSecurityManager::CanCreateWrapper(JSContext
* cx
, const nsIID
& aIID
,
1324 nsIClassInfo
* aClassInfo
) {
1325 // XXX Special case for Exception ?
1327 // We give remote-XUL allowlisted domains a free pass here. See bug 932906.
1328 JS::Rooted
<JS::Realm
*> contextRealm(cx
, JS::GetCurrentRealmOrNull(cx
));
1329 MOZ_RELEASE_ASSERT(contextRealm
);
1330 if (!xpc::AllowContentXBLScope(contextRealm
)) {
1334 if (nsContentUtils::IsCallerChrome()) {
1338 //-- Access denied, report an error
1339 nsAutoCString originUTF8
;
1340 nsIPrincipal
* subjectPrincipal
= nsContentUtils::SubjectPrincipal();
1341 GetPrincipalDomainOrigin(subjectPrincipal
, originUTF8
);
1342 NS_ConvertUTF8toUTF16
originUTF16(originUTF8
);
1343 nsAutoCString classInfoNameUTF8
;
1345 aClassInfo
->GetClassDescription(classInfoNameUTF8
);
1347 if (classInfoNameUTF8
.IsEmpty()) {
1348 classInfoNameUTF8
.AssignLiteral("UnnamedClass");
1351 nsCOMPtr
<nsIStringBundle
> bundle
= BundleHelper::GetOrCreate();
1352 if (NS_WARN_IF(!bundle
)) {
1356 NS_ConvertUTF8toUTF16
classInfoUTF16(classInfoNameUTF8
);
1358 nsAutoString errorMsg
;
1359 if (originUTF16
.IsEmpty()) {
1360 AutoTArray
<nsString
, 1> formatStrings
= {classInfoUTF16
};
1361 rv
= bundle
->FormatStringFromName("CreateWrapperDenied", formatStrings
,
1364 AutoTArray
<nsString
, 2> formatStrings
= {classInfoUTF16
, originUTF16
};
1365 rv
= bundle
->FormatStringFromName("CreateWrapperDeniedForOrigin",
1366 formatStrings
, errorMsg
);
1368 NS_ENSURE_SUCCESS(rv
, rv
);
1370 SetPendingException(cx
, errorMsg
.get());
1371 return NS_ERROR_DOM_XPCONNECT_ACCESS_DENIED
;
1375 nsScriptSecurityManager::CanCreateInstance(JSContext
* cx
, const nsCID
& aCID
) {
1376 if (nsContentUtils::IsCallerChrome()) {
1380 //-- Access denied, report an error
1381 nsAutoCString
errorMsg("Permission denied to create instance of class. CID=");
1382 char cidStr
[NSID_LENGTH
];
1383 aCID
.ToProvidedString(cidStr
);
1384 errorMsg
.Append(cidStr
);
1385 SetPendingExceptionASCII(cx
, errorMsg
.get());
1386 return NS_ERROR_DOM_XPCONNECT_ACCESS_DENIED
;
1390 nsScriptSecurityManager::CanGetService(JSContext
* cx
, const nsCID
& aCID
) {
1391 if (nsContentUtils::IsCallerChrome()) {
1395 //-- Access denied, report an error
1396 nsAutoCString
errorMsg("Permission denied to get service. CID=");
1397 char cidStr
[NSID_LENGTH
];
1398 aCID
.ToProvidedString(cidStr
);
1399 errorMsg
.Append(cidStr
);
1400 SetPendingExceptionASCII(cx
, errorMsg
.get());
1401 return NS_ERROR_DOM_XPCONNECT_ACCESS_DENIED
;
1404 const char sJSEnabledPrefName
[] = "javascript.enabled";
1405 const char sFileOriginPolicyPrefName
[] =
1406 "security.fileuri.strict_origin_policy";
1408 static const char* kObservedPrefs
[] = {sJSEnabledPrefName
,
1409 sFileOriginPolicyPrefName
,
1410 "capability.policy.", nullptr};
1412 /////////////////////////////////////////////
1413 // Constructor, Destructor, Initialization //
1414 /////////////////////////////////////////////
1415 nsScriptSecurityManager::nsScriptSecurityManager(void)
1416 : mPrefInitialized(false), mIsJavaScriptEnabled(false) {
1418 sizeof(intptr_t) == sizeof(void*),
1419 "intptr_t and void* have different lengths on this platform. "
1420 "This may cause a security failure with the SecurityLevel union.");
1423 nsresult
nsScriptSecurityManager::Init() {
1424 nsresult rv
= CallGetService(NS_IOSERVICE_CONTRACTID
, &sIOService
);
1425 NS_ENSURE_SUCCESS(rv
, rv
);
1429 // Create our system principal singleton
1430 RefPtr
<SystemPrincipal
> system
= SystemPrincipal::Create();
1432 mSystemPrincipal
= system
;
1437 void nsScriptSecurityManager::InitJSCallbacks(JSContext
* aCx
) {
1438 //-- Register security check callback in the JS engine
1439 // Currently this is used to control access to function.caller
1441 static const JSSecurityCallbacks securityCallbacks
= {
1442 ContentSecurityPolicyPermitsJSAction
,
1443 JSPrincipalsSubsume
,
1446 MOZ_ASSERT(!JS_GetSecurityCallbacks(aCx
));
1447 JS_SetSecurityCallbacks(aCx
, &securityCallbacks
);
1448 JS_InitDestroyPrincipalsCallback(aCx
, nsJSPrincipals::Destroy
);
1450 JS_SetTrustedPrincipals(aCx
, BasePrincipal::Cast(mSystemPrincipal
));
1454 void nsScriptSecurityManager::ClearJSCallbacks(JSContext
* aCx
) {
1455 JS_SetSecurityCallbacks(aCx
, nullptr);
1456 JS_SetTrustedPrincipals(aCx
, nullptr);
1459 static StaticRefPtr
<nsScriptSecurityManager
> gScriptSecMan
;
1461 nsScriptSecurityManager::~nsScriptSecurityManager(void) {
1462 Preferences::UnregisterPrefixCallbacks(
1463 nsScriptSecurityManager::ScriptSecurityPrefChanged
, kObservedPrefs
, this);
1464 if (mDomainPolicy
) {
1465 mDomainPolicy
->Deactivate();
1467 // ContentChild might hold a reference to the domain policy,
1468 // and it might release it only after the security manager is
1469 // gone. But we can still assert this for the main process.
1470 MOZ_ASSERT_IF(XRE_IsParentProcess(), !mDomainPolicy
);
1473 void nsScriptSecurityManager::Shutdown() {
1474 NS_IF_RELEASE(sIOService
);
1475 BundleHelper::Shutdown();
1478 nsScriptSecurityManager
* nsScriptSecurityManager::GetScriptSecurityManager() {
1479 return gScriptSecMan
;
1483 void nsScriptSecurityManager::InitStatics() {
1484 RefPtr
<nsScriptSecurityManager
> ssManager
= new nsScriptSecurityManager();
1485 nsresult rv
= ssManager
->Init();
1486 if (NS_FAILED(rv
)) {
1487 MOZ_CRASH("ssManager->Init() failed");
1490 ClearOnShutdown(&gScriptSecMan
);
1491 gScriptSecMan
= ssManager
;
1494 // Currently this nsGenericFactory constructor is used only from FastLoad
1495 // (XPCOM object deserialization) code, when "creating" the system principal
1497 already_AddRefed
<SystemPrincipal
>
1498 nsScriptSecurityManager::SystemPrincipalSingletonConstructor() {
1500 return do_AddRef(gScriptSecMan
->mSystemPrincipal
)
1501 .downcast
<SystemPrincipal
>();
1505 struct IsWhitespace
{
1506 static bool Test(char aChar
) { return NS_IsAsciiWhitespace(aChar
); };
1508 struct IsWhitespaceOrComma
{
1509 static bool Test(char aChar
) {
1510 return aChar
== ',' || NS_IsAsciiWhitespace(aChar
);
1514 template <typename Predicate
>
1515 uint32_t SkipPast(const nsCString
& str
, uint32_t base
) {
1516 while (base
< str
.Length() && Predicate::Test(str
[base
])) {
1522 template <typename Predicate
>
1523 uint32_t SkipUntil(const nsCString
& str
, uint32_t base
) {
1524 while (base
< str
.Length() && !Predicate::Test(str
[base
])) {
1531 void nsScriptSecurityManager::ScriptSecurityPrefChanged(const char* aPref
,
1533 static_cast<nsScriptSecurityManager
*>(aSelf
)->ScriptSecurityPrefChanged(
1537 inline void nsScriptSecurityManager::ScriptSecurityPrefChanged(
1538 const char* aPref
) {
1539 MOZ_ASSERT(mPrefInitialized
);
1540 mIsJavaScriptEnabled
=
1541 Preferences::GetBool(sJSEnabledPrefName
, mIsJavaScriptEnabled
);
1542 sStrictFileOriginPolicy
=
1543 Preferences::GetBool(sFileOriginPolicyPrefName
, false);
1544 mFileURIAllowlist
.reset();
1547 void nsScriptSecurityManager::AddSitesToFileURIAllowlist(
1548 const nsCString
& aSiteList
) {
1549 for (uint32_t base
= SkipPast
<IsWhitespace
>(aSiteList
, 0), bound
= 0;
1550 base
< aSiteList
.Length();
1551 base
= SkipPast
<IsWhitespace
>(aSiteList
, bound
)) {
1552 // Grab the current site.
1553 bound
= SkipUntil
<IsWhitespace
>(aSiteList
, base
);
1554 nsAutoCString
site(Substring(aSiteList
, base
, bound
- base
));
1556 // Check if the URI is schemeless. If so, add both http and https.
1557 nsAutoCString unused
;
1558 if (NS_FAILED(sIOService
->ExtractScheme(site
, unused
))) {
1559 AddSitesToFileURIAllowlist("http://"_ns
+ site
);
1560 AddSitesToFileURIAllowlist("https://"_ns
+ site
);
1564 // Convert it to a URI and add it to our list.
1565 nsCOMPtr
<nsIURI
> uri
;
1566 nsresult rv
= NS_NewURI(getter_AddRefs(uri
), site
);
1567 if (NS_SUCCEEDED(rv
)) {
1568 mFileURIAllowlist
.ref().AppendElement(uri
);
1570 nsCOMPtr
<nsIConsoleService
> console(
1571 do_GetService("@mozilla.org/consoleservice;1"));
1574 u
"Unable to to add site to file:// URI allowlist: "_ns
+
1575 NS_ConvertASCIItoUTF16(site
);
1576 console
->LogStringMessage(msg
.get());
1582 nsresult
nsScriptSecurityManager::InitPrefs() {
1583 nsIPrefBranch
* branch
= Preferences::GetRootBranch();
1584 NS_ENSURE_TRUE(branch
, NS_ERROR_FAILURE
);
1586 mPrefInitialized
= true;
1588 // Set the initial value of the "javascript.enabled" prefs
1589 ScriptSecurityPrefChanged();
1591 // set observer callbacks in case the value of the prefs change
1592 Preferences::RegisterPrefixCallbacks(
1593 nsScriptSecurityManager::ScriptSecurityPrefChanged
, kObservedPrefs
, this);
1599 nsScriptSecurityManager::GetDomainPolicyActive(bool* aRv
) {
1600 *aRv
= !!mDomainPolicy
;
1605 nsScriptSecurityManager::ActivateDomainPolicy(nsIDomainPolicy
** aRv
) {
1606 if (!XRE_IsParentProcess()) {
1607 return NS_ERROR_SERVICE_NOT_AVAILABLE
;
1610 return ActivateDomainPolicyInternal(aRv
);
1614 nsScriptSecurityManager::ActivateDomainPolicyInternal(nsIDomainPolicy
** aRv
) {
1615 // We only allow one domain policy at a time. The holder of the previous
1616 // policy must explicitly deactivate it first.
1617 if (mDomainPolicy
) {
1618 return NS_ERROR_SERVICE_NOT_AVAILABLE
;
1621 mDomainPolicy
= new DomainPolicy();
1622 nsCOMPtr
<nsIDomainPolicy
> ptr
= mDomainPolicy
;
1627 // Intentionally non-scriptable. Script must have a reference to the
1628 // nsIDomainPolicy to deactivate it.
1629 void nsScriptSecurityManager::DeactivateDomainPolicy() {
1630 mDomainPolicy
= nullptr;
1633 void nsScriptSecurityManager::CloneDomainPolicy(DomainPolicyClone
* aClone
) {
1635 if (mDomainPolicy
) {
1636 mDomainPolicy
->CloneDomainPolicy(aClone
);
1638 aClone
->active() = false;
1643 nsScriptSecurityManager::PolicyAllowsScript(nsIURI
* aURI
, bool* aRv
) {
1646 // Compute our rule. If we don't have any domain policy set up that might
1647 // provide exceptions to this rule, we're done.
1648 *aRv
= mIsJavaScriptEnabled
;
1649 if (!mDomainPolicy
) {
1653 // We have a domain policy. Grab the appropriate set of exceptions to the
1654 // rule (either the blocklist or the allowlist, depending on whether script
1655 // is enabled or disabled by default).
1656 nsCOMPtr
<nsIDomainSet
> exceptions
;
1657 nsCOMPtr
<nsIDomainSet
> superExceptions
;
1659 mDomainPolicy
->GetBlocklist(getter_AddRefs(exceptions
));
1660 mDomainPolicy
->GetSuperBlocklist(getter_AddRefs(superExceptions
));
1662 mDomainPolicy
->GetAllowlist(getter_AddRefs(exceptions
));
1663 mDomainPolicy
->GetSuperAllowlist(getter_AddRefs(superExceptions
));
1667 rv
= exceptions
->Contains(aURI
, &contains
);
1668 NS_ENSURE_SUCCESS(rv
, rv
);
1673 rv
= superExceptions
->ContainsSuperDomain(aURI
, &contains
);
1674 NS_ENSURE_SUCCESS(rv
, rv
);
1682 const nsTArray
<nsCOMPtr
<nsIURI
>>&
1683 nsScriptSecurityManager::EnsureFileURIAllowlist() {
1684 if (mFileURIAllowlist
.isSome()) {
1685 return mFileURIAllowlist
.ref();
1689 // Rebuild the set of principals for which we allow file:// URI loads. This
1690 // implements a small subset of an old pref-based CAPS people that people
1691 // have come to depend on. See bug 995943.
1694 mFileURIAllowlist
.emplace();
1695 nsAutoCString policies
;
1696 mozilla::Preferences::GetCString("capability.policy.policynames", policies
);
1697 for (uint32_t base
= SkipPast
<IsWhitespaceOrComma
>(policies
, 0), bound
= 0;
1698 base
< policies
.Length();
1699 base
= SkipPast
<IsWhitespaceOrComma
>(policies
, bound
)) {
1700 // Grab the current policy name.
1701 bound
= SkipUntil
<IsWhitespaceOrComma
>(policies
, base
);
1702 auto policyName
= Substring(policies
, base
, bound
- base
);
1704 // Figure out if this policy allows loading file:// URIs. If not, we can
1706 nsCString checkLoadURIPrefName
=
1707 "capability.policy."_ns
+ policyName
+ ".checkloaduri.enabled"_ns
;
1709 nsresult rv
= Preferences::GetString(checkLoadURIPrefName
.get(), value
);
1710 if (NS_FAILED(rv
) || !value
.LowerCaseEqualsLiteral("allaccess")) {
1714 // Grab the list of domains associated with this policy.
1715 nsCString domainPrefName
=
1716 "capability.policy."_ns
+ policyName
+ ".sites"_ns
;
1717 nsAutoCString siteList
;
1718 Preferences::GetCString(domainPrefName
.get(), siteList
);
1719 AddSitesToFileURIAllowlist(siteList
);
1722 return mFileURIAllowlist
.ref();