mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-01 06:35:42 +00:00
9533a3d17b
As of the writing of this patch, NSSDialogService pops up a prompter on Android as follows (assuming at least one label is requested): 1. NSSDialogService.js calls Prompt.jsm methods and eventually requests the prompt be displayed. 2. Prompt.jsm sends a messages to the Java side. 3. The Java side receives the message and eventually calls org.mozilla.gecko.prompts.PromptInput.LabelInput.getView(). 4. LabelInput.getView() calls android.text.Html.fromHtml(). At no point is any HTML injection prevention done, so in theory NSSDialogService could be an injection vector. In practice, it appears that fromHtml() doesn't actually allow anything malicious to be done. This patch introduces HTML escaping at the NSSDialogService level just to be safe. MozReview-Commit-ID: LhHuZKSqx01 --HG-- extra : transplant_source : l%C9%A2%95%9A.%05%1F%CF%5D%02%5E%12N%C1%B7O%7C%1B%8B |
||
---|---|---|
.. | ||
en-US | ||
all-locales | ||
filter.py | ||
jar.mn | ||
l10n.ini | ||
maemo-locales | ||
Makefile.in | ||
moz.build |