On Dec 19, 2005, at 2:40 PM, Ian Hickson wrote:


"Untrusted content" is unclear. It implies the existence of
something that isn't "untrusted content", i.e. "trusted content".
Where is that defined? I do not believe it is defined anywhere, in
which case specifying its behavior seems non-useful.

I have rephrased this sentence.

I think this section is still somewhat problematic because a reasonable
behavior is to allow "get" posts to "file:" URLs from a local file
document that is not marked trusted in any special way, as such a
document can already do normal "file:" URL loads anyway through other
mechanisms.

Um, they shouldn't be able to. Or at least, in many UAs they can't.

Do you know of UAs that will prevent a file: URL document from loading another file: URL in a frame or iframe? Or apply any restrictions to scripting access to the resulting document. I don't know of any that will. Form submission to a file: URL with the get method doesn't afford any new avenues of attack that this capability doesn't.

And this is much less risky than allowing execution of prgrams or
writing/deleting of files.

Depends on what file you allow access to (/dev/mouse?)

I don't think reading /dev/mouse will specifically do anything bad, but I see your point. For file: in file: inclusion I think it would be wise to exclude certain system paths such as /dev and /etc. I think this may be done already.

Regards,
Maciej

Reply via email to