<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://bugs.webkit.org/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4.1"
          urlbase="https://bugs.webkit.org/"
          
          maintainer="admin@webkit.org"
>

    <bug>
          <bug_id>27639</bug_id>
          
          <creation_ts>2009-07-23 22:36:43 -0700</creation_ts>
          <short_desc>XSS Auditor interferes with -[WebView stringByEvaluatingJavaScriptFromString:]</short_desc>
          <delta_ts>2011-05-27 16:49:45 -0700</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>WebKit</product>
          <component>WebCore Misc.</component>
          <version>528+ (Nightly build)</version>
          <rep_platform>Mac</rep_platform>
          <op_sys>OS X 10.5</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>XSSAuditor</keywords>
          <priority>P2</priority>
          <bug_severity>Normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Mark Rowe (bdash)">mrowe</reporter>
          <assigned_to name="Adam Barth">abarth</assigned_to>
          <cc>abarth</cc>
    
    <cc>dbates</cc>
          

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>134365</commentid>
    <comment_count>0</comment_count>
    <who name="Mark Rowe (bdash)">mrowe</who>
    <bug_when>2009-07-23 22:36:43 -0700</bug_when>
    <thetext>I tracked down an assertion failure in DumpRenderTree this afternoon that is caused by the XSS auditor causing the following API invocation to fail: [webView stringByEvaluatingJavaScriptFromString:@&quot;0&quot;];  With the XSS auditor enabled, this returns the empty string rather than &quot;0&quot; as expected.  This was being tripped over by DumpRenderTree on machines that had never run the layout tests before due to the default preferences being incorrectly configured (&lt;http://trac.webkit.org/changeset/46304&gt;), but it seems undesirable for the XSS auditor to have any effect on these sorts of APIs.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134367</commentid>
    <comment_count>1</comment_count>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-23 22:41:50 -0700</bug_when>
    <thetext>We should actually do two things here:

1) If the canonical string is empty, we should allow the script.
2) We should white list the API to never be blocked.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134475</commentid>
    <comment_count>2</comment_count>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-24 02:26:44 -0700</bug_when>
    <thetext>Assigned to myself to resolution in the morning.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134613</commentid>
    <comment_count>3</comment_count>
      <attachid>33457</attachid>
    <who name="Daniel Bates">dbates</who>
    <bug_when>2009-07-24 11:52:00 -0700</bug_when>
    <thetext>Created attachment 33457
Patch to check that canonicalString is not empty

This patch does not include the white list functionality.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134625</commentid>
    <comment_count>4</comment_count>
      <attachid>33457</attachid>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-24 12:27:54 -0700</bug_when>
    <thetext>Comment on attachment 33457
Patch to check that canonicalString is not empty

Thank.  We just need a test.  :)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134626</commentid>
    <comment_count>5</comment_count>
      <attachid>33457</attachid>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-24 12:27:56 -0700</bug_when>
    <thetext>Comment on attachment 33457
Patch to check that canonicalString is not empty

Thanks.  We just need a test.  :)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134634</commentid>
    <comment_count>6</comment_count>
      <attachid>33464</attachid>
    <who name="Daniel Bates">dbates</who>
    <bug_when>2009-07-24 12:52:21 -0700</bug_when>
    <thetext>Created attachment 33464
Patch with test

Added test.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134639</commentid>
    <comment_count>7</comment_count>
      <attachid>33464</attachid>
    <who name="Mark Rowe (bdash)">mrowe</who>
    <bug_when>2009-07-24 13:02:52 -0700</bug_when>
    <thetext>Comment on attachment 33464
Patch with test

Do we also plan on adding a more explicit mechanism for preventing legitimate JavaScript-related WebKit API calls from being touched by the XSS auditor?</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134640</commentid>
    <comment_count>8</comment_count>
      <attachid>33464</attachid>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-24 13:02:54 -0700</bug_when>
    <thetext>Comment on attachment 33464
Patch with test

A patch of beauty.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134641</commentid>
    <comment_count>9</comment_count>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-24 13:03:48 -0700</bug_when>
    <thetext>(In reply to comment #7)
&gt; (From update of attachment 33464 [details])
&gt; Do we also plan on adding a more explicit mechanism for preventing legitimate
&gt; JavaScript-related WebKit API calls from being touched by the XSS auditor?

Yes.  We also want to do this patch and it&apos;s easier.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134642</commentid>
    <comment_count>10</comment_count>
    <who name="Daniel Bates">dbates</who>
    <bug_when>2009-07-24 13:09:51 -0700</bug_when>
    <thetext>I have not looked into this, but we may need to be mindful of plugins which use the API to evaluate JavaScript scripts. In which case, we wouldn&apos;t want to disable the filter.

(In reply to comment #9)
&gt; (In reply to comment #7)
&gt; &gt; (From update of attachment 33464 [details] [details])
&gt; &gt; Do we also plan on adding a more explicit mechanism for preventing legitimate
&gt; &gt; JavaScript-related WebKit API calls from being touched by the XSS auditor?
&gt; 
&gt; Yes.  We also want to do this patch and it&apos;s easier.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134643</commentid>
    <comment_count>11</comment_count>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-24 13:13:16 -0700</bug_when>
    <thetext>(In reply to comment #10)
&gt; I have not looked into this, but we may need to be mindful of plugins which use
&gt; the API to evaluate JavaScript scripts. In which case, we wouldn&apos;t want to
&gt; disable the filter.

We should look at all the clients of evaluateScript and think about whether they need XSS filtering.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134652</commentid>
    <comment_count>12</comment_count>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-24 13:59:56 -0700</bug_when>
    <thetext>Committing to http://svn.webkit.org/repository/webkit/trunk ...
	M	LayoutTests/ChangeLog
	A	LayoutTests/http/tests/security/xssAuditor/script-tag-safe-expected.txt
	A	LayoutTests/http/tests/security/xssAuditor/script-tag-safe.html
	M	WebCore/ChangeLog
	M	WebCore/page/XSSAuditor.cpp
Committed r46372
	M	WebCore/ChangeLog
	M	WebCore/page/XSSAuditor.cpp
	A	LayoutTests/http/tests/security/xssAuditor/script-tag-safe-expected.txt
	A	LayoutTests/http/tests/security/xssAuditor/script-tag-safe.html
	M	LayoutTests/ChangeLog
r46372 = 20701f1ff156a5bec23db64671d4cd7556a2cde8 (trunk)
No changes between current HEAD and refs/remotes/trunk
Resetting to the latest refs/remotes/trunk
http://trac.webkit.org/changeset/46372</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134667</commentid>
    <comment_count>13</comment_count>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-24 14:41:12 -0700</bug_when>
    <thetext>I think we should keep this bug open to do the whitelisting part.  (Or we could file another bug, I guess.)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>134668</commentid>
    <comment_count>14</comment_count>
      <attachid>33464</attachid>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-24 14:41:31 -0700</bug_when>
    <thetext>Comment on attachment 33464
Patch with test

Removing from commit queue.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>411712</commentid>
    <comment_count>15</comment_count>
    <who name="Adam Barth">abarth</who>
    <bug_when>2011-05-27 16:49:45 -0700</bug_when>
    <thetext>I&apos;d be surprised of this was still an issue given the new XSS auditor design.  If there&apos;s something to fix here, please re-open with an example!  Thx.</thetext>
  </long_desc>
      
          <attachment
              isobsolete="1"
              ispatch="1"
              isprivate="0"
          >
            <attachid>33457</attachid>
            <date>2009-07-24 11:52:00 -0700</date>
            <delta_ts>2009-07-24 12:52:21 -0700</delta_ts>
            <desc>Patch to check that canonicalString is not empty</desc>
            <filename>Bug27639_1.patch</filename>
            <type>text/plain</type>
            <size>1893</size>
            <attacher name="Daniel Bates">dbates</attacher>
            
              <data encoding="base64">SW5kZXg6IFdlYkNvcmUvQ2hhbmdlTG9nCj09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09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</data>

          </attachment>
          <attachment
              isobsolete="1"
              ispatch="1"
              isprivate="0"
          >
            <attachid>33464</attachid>
            <date>2009-07-24 12:52:21 -0700</date>
            <delta_ts>2009-07-24 14:41:31 -0700</delta_ts>
            <desc>Patch with test</desc>
            <filename>Bug27639_2.patch</filename>
            <type>text/plain</type>
            <size>3565</size>
            <attacher name="Daniel Bates">dbates</attacher>
            
              <data encoding="base64">SW5kZXg6IFdlYkNvcmUvQ2hhbmdlTG9nCj09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09
PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT0KLS0tIFdlYkNvcmUvQ2hhbmdlTG9n
CShyZXZpc2lvbiA0NjM3MCkKKysrIFdlYkNvcmUvQ2hhbmdlTG9nCSh3b3JraW5nIGNvcHkpCkBA
IC0xLDMgKzEsMTggQEAKKzIwMDktMDctMjQgIERhbmllbCBCYXRlcyAgPGRiYXRlc0BpbnR1ZGF0
YS5jb20+CisKKyAgICAgICAgUmV2aWV3ZWQgYnkgTk9CT0RZIChPT1BTISkuCisKKyAgICAgICAg
aHR0cHM6Ly9idWdzLndlYmtpdC5vcmcvc2hvd19idWcuY2dpP2lkPTI3NjM5CisKKyAgICAgICAg
Rml4ZXMgZmFsc2UgcG9zaXRpdmVzIHdoZW4gZXZhbHVhdGluZyBjZXJ0YWluIHN0cmluZ3MgdGhh
dCBvbmx5IGNvbnRhaW4gCisgICAgICAgIG5vbi1jYW5vbmljYWwgY2hhcmFjdGVycy4KKworICAg
ICAgICBUZXN0OiBodHRwL3Rlc3RzL3NlY3VyaXR5L3hzc0F1ZGl0b3Ivc2NyaXB0LXRhZy1zYWZl
Lmh0bWwKKworICAgICAgICAqIHBhZ2UvWFNTQXVkaXRvci5jcHA6CisgICAgICAgIChXZWJDb3Jl
Ojppc05vbkNhbm9uaWNhbENoYXJhY3Rlcik6CisgICAgICAgIChXZWJDb3JlOjpYU1NBdWRpdG9y
OjpmaW5kSW5SZXF1ZXN0KToKKwogMjAwOS0wNy0yNCAgRHJldyBXaWxzb24gIDxhdHdpbHNvbkBn
b29nbGUuY29tPgogCiAgICAgICAgIFJldmlld2VkIGJ5IEFkYW0gQmFydGguCkluZGV4OiBXZWJD
b3JlL3BhZ2UvWFNTQXVkaXRvci5jcHAKPT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09
PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PQotLS0gV2ViQ29yZS9wYWdlL1hTU0F1
ZGl0b3IuY3BwCShyZXZpc2lvbiA0NjI1MCkKKysrIFdlYkNvcmUvcGFnZS9YU1NBdWRpdG9yLmNw
cAkod29ya2luZyBjb3B5KQpAQCAtNDgsNiArNDgsMTEgQEAgbmFtZXNwYWNlIFdlYkNvcmUgewog
CiBzdGF0aWMgYm9vbCBpc05vbkNhbm9uaWNhbENoYXJhY3RlcihVQ2hhciBjKQogeworICAgIC8v
IE5vdGUsIHdlIGRvbid0IHJlbW92ZSBiYWNrc2xhc2hlcyBsaWtlIFBIUCBzdHJpcHNsYXNoZXMo
KSwgd2hpY2ggYW1vbmcgb3RoZXIgdGhpbmdzIGNvbnZlcnRzICJcXDAiIHRvIHRoZSBcMCBjaGFy
YWN0ZXIuCisgICAgLy8gSW5zdGVhZCwgd2UgcmVtb3ZlIGJhY2tzbGFzaGVzIGFuZCB6ZXJvcyAo
c2luY2UgdGhlIHN0cmluZyAiXFwwIiA9KHJlbW92ZSBiYWNrc2xhc2hlcyk9PiAiMCIpLiBIb3dl
dmVyLCB0aGlzIGhhcyB0aGUgCisgICAgLy8gYWR2ZXJzZSBlZmZlY3QgdGhhdCB3ZSByZW1vdmUg
YW55IGxlZ2l0aW1hdGUgemVyb3MgZnJvbSBhIHN0cmluZy4KKyAgICAvLworICAgIC8vIEZvciBp
bnN0YW5jZTogbmV3IFN0cmluZygiaHR0cDovL2xvY2FsaG9zdDo4MDAwIikgPT4gbmV3IFN0cmlu
ZygiaHR0cDovL2xvY2FsaG9zdDo4IikuCiAgICAgcmV0dXJuIChjID09ICdcXCcgfHwgYyA9PSAn
MCcgfHwgYyA8ICcgJyB8fCBjID09IDEyNyk7CiB9CiAKQEAgLTIzMSw2ICsyMzYsOSBAQCBib29s
IFhTU0F1ZGl0b3I6OmZpbmRJblJlcXVlc3QoRnJhbWUqIGZyCiAgICAgICAgIHJldHVybiBmYWxz
ZTsKIAogICAgIFN0cmluZyBjYW5vbmljYWxpemVkU3RyaW5nID0gY2Fub25pY2FsaXplKHN0cmlu
Zyk7CisgICAgaWYgKGNhbm9uaWNhbGl6ZWRTdHJpbmcuaXNFbXB0eSgpKQorICAgICAgICByZXR1
cm4gZmFsc2U7CisKICAgICBpZiAoc3RyaW5nLmxlbmd0aCgpIDwgcGFnZVVSTC5sZW5ndGgoKSkg
ewogICAgICAgICAvLyBUaGUgc3RyaW5nIGNhbiBhY3R1YWxseSBmaXQgaW5zaWRlIHRoZSBwYWdl
VVJMLgogICAgICAgICBTdHJpbmcgZGVjb2RlZFBhZ2VVUkwgPSBjYW5vbmljYWxpemUoZGVjb2Rl
VVJMKHBhZ2VVUkwsIGZyYW1lLT5kb2N1bWVudCgpLT5kZWNvZGVyKCktPmVuY29kaW5nKCksIGRl
Y29kZUhUTUxlbnRpdGllcykpOwpJbmRleDogTGF5b3V0VGVzdHMvQ2hhbmdlTG9nCj09PT09PT09
PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09
PT0KLS0tIExheW91dFRlc3RzL0NoYW5nZUxvZwkocmV2aXNpb24gNDYzNzApCisrKyBMYXlvdXRU
ZXN0cy9DaGFuZ2VMb2cJKHdvcmtpbmcgY29weSkKQEAgLTEsMyArMSwxNSBAQAorMjAwOS0wNy0y
NCAgRGFuaWVsIEJhdGVzICA8ZGJhdGVzQGludHVkYXRhLmNvbT4KKworICAgICAgICBSZXZpZXdl
ZCBieSBOT0JPRFkgKE9PUFMhKS4KKworICAgICAgICBodHRwczovL2J1Z3Mud2Via2l0Lm9yZy9z
aG93X2J1Zy5jZ2k/aWQ9Mjc2MzkKKyAgICAgICAgCisgICAgICAgIFRlc3RzIHRoYXQgWFNTQXVk
aXRvciBkb2VzIG5vdCBwcmV2ZW50IGV2YWx1YXRpb24gb2Ygc2NyaXB0cyB0aGF0IG9ubHkgY29u
dGFpbiAKKyAgICAgICAgbm9uLWNhbm9uaWNhbCBjaGFyYWN0ZXJzLgorCisgICAgICAgICogaHR0
cC90ZXN0cy9zZWN1cml0eS94c3NBdWRpdG9yL3NjcmlwdC10YWctc2FmZS1leHBlY3RlZC50eHQ6
IEFkZGVkLgorICAgICAgICAqIGh0dHAvdGVzdHMvc2VjdXJpdHkveHNzQXVkaXRvci9zY3JpcHQt
dGFnLXNhZmUuaHRtbDogQWRkZWQuCisKIDIwMDktMDctMjQgIEVyaWMgU2VpZGVsICA8ZXJpY0B3
ZWJraXQub3JnPgogCiAgICAgICAgIFJldmlld2VkIGJ5IEFkYW0gQmFydGguCkluZGV4OiBMYXlv
dXRUZXN0cy9odHRwL3Rlc3RzL3NlY3VyaXR5L3hzc0F1ZGl0b3Ivc2NyaXB0LXRhZy1zYWZlLWV4
cGVjdGVkLnR4dAo9PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09
PT09PT09PT09PT09PT09PT09PT09Ci0tLSBMYXlvdXRUZXN0cy9odHRwL3Rlc3RzL3NlY3VyaXR5
L3hzc0F1ZGl0b3Ivc2NyaXB0LXRhZy1zYWZlLWV4cGVjdGVkLnR4dAkocmV2aXNpb24gMCkKKysr
IExheW91dFRlc3RzL2h0dHAvdGVzdHMvc2VjdXJpdHkveHNzQXVkaXRvci9zY3JpcHQtdGFnLXNh
ZmUtZXhwZWN0ZWQudHh0CShyZXZpc2lvbiAwKQpAQCAtMCwwICsxIEBACisKSW5kZXg6IExheW91
dFRlc3RzL2h0dHAvdGVzdHMvc2VjdXJpdHkveHNzQXVkaXRvci9zY3JpcHQtdGFnLXNhZmUuaHRt
bAo9PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09
PT09PT09PT09PT09Ci0tLSBMYXlvdXRUZXN0cy9odHRwL3Rlc3RzL3NlY3VyaXR5L3hzc0F1ZGl0
b3Ivc2NyaXB0LXRhZy1zYWZlLmh0bWwJKHJldmlzaW9uIDApCisrKyBMYXlvdXRUZXN0cy9odHRw
L3Rlc3RzL3NlY3VyaXR5L3hzc0F1ZGl0b3Ivc2NyaXB0LXRhZy1zYWZlLmh0bWwJKHJldmlzaW9u
IDApCkBAIC0wLDAgKzEsMTQgQEAKKzwhRE9DVFlQRSBodG1sPgorPGh0bWw+Cis8aGVhZD4KKzxz
Y3JpcHQ+CitpZiAod2luZG93LmxheW91dFRlc3RDb250cm9sbGVyKSB7CisgIGxheW91dFRlc3RD
b250cm9sbGVyLmR1bXBBc1RleHQoKTsKKyAgbGF5b3V0VGVzdENvbnRyb2xsZXIuc2V0WFNTQXVk
aXRvckVuYWJsZWQodHJ1ZSk7Cit9Cis8L3NjcmlwdD4KKzwvaGVhZD4KKzxib2R5PgorPHNjcmlw
dD4wPC9zY3JpcHQ+Cis8L2JvZHk+Cis8L2h0bWw+Cg==
</data>

          </attachment>
      

    </bug>

</bugzilla>