| Summary: | Incorrect Sec-Fetch-Site values on sandboxed iframes | ||
|---|---|---|---|
| Product: | WebKit | Reporter: | Jerry Zhang <jerryzz> |
| Component: | Frames | Assignee: | youenn fablet <youennf> |
| Status: | RESOLVED FIXED | ||
| Severity: | Normal | CC: | achristensen, annevk, bfulgham, cdumez, jerryzz, pgriffis, vincentlee, webkit-bug-importer, wilander, youennf |
| Priority: | P2 | Keywords: | InRadar |
| Version: | Safari 16 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| See Also: | https://bugs.webkit.org/show_bug.cgi?id=256472 | ||
|
Description
Jerry Zhang
2023-08-16 13:06:27 PDT
Hi, what's the status on this? We'd love to roll out serverside security checks for Safari based on the Sec-Fetch headers, but Sec-Fetch-Site not being correct is giving us pause. We've rolled out on all other browsers, so only Safari is left. This appears to still be a bug in Safari 17.5 Actually, on further reading of the spec, I'm Chrome and FF might be the ones with the bug here. Sandboxing an iframe without `allow-same-origin` means the origin becomes opaque, and if I'm reading the language correctly for Sec-Fetch-Site, the algorithm for setting the header asserts that the request is from a "potentially trustworthy origin", which an opaque origin is not. I think Chrome and FF are correct here. The env origin is the top level frame. Pull request: https://github.com/WebKit/WebKit/pull/29450 Committed 280065@main (deeefb52b7fd): <https://commits.webkit.org/280065@main> Reviewed commits have been landed. Closing PR #29450 and removing active labels. |