<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://bugs.webkit.org/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4.1"
          urlbase="https://bugs.webkit.org/"
          
          maintainer="admin@webkit.org"
>

    <bug>
          <bug_id>96559</bug_id>
          
          <creation_ts>2012-09-12 14:17:20 -0700</creation_ts>
          <short_desc>Web Inspector: information leak in JS console</short_desc>
          <delta_ts>2012-09-13 00:51:49 -0700</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>WebKit</product>
          <component>Web Inspector (Deprecated)</component>
          <version>528+ (Nightly build)</version>
          <rep_platform>All</rep_platform>
          <op_sys>All</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>INVALID</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P2</priority>
          <bug_severity>Major</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>0</everconfirmed>
          <reporter name="Thaddee Tyl">thaddee.tyl</reporter>
          <assigned_to name="Nobody">webkit-unassigned</assigned_to>
          <cc>apavlov</cc>
    
    <cc>bweinstein</cc>
    
    <cc>caseq</cc>
    
    <cc>joepeck</cc>
    
    <cc>keishi</cc>
    
    <cc>loislo</cc>
    
    <cc>paulirish</cc>
    
    <cc>pfeldman</cc>
    
    <cc>pmuellr</cc>
    
    <cc>rik</cc>
    
    <cc>timothy</cc>
    
    <cc>yurys</cc>
          

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>718710</commentid>
    <comment_count>0</comment_count>
    <who name="Thaddee Tyl">thaddee.tyl</who>
    <bug_when>2012-09-12 14:17:20 -0700</bug_when>
    <thetext>How to reproduce:

1. Go to the following URL: data:text/html,&lt;!doctype&gt;&lt;title&gt;&lt;/title&gt;&lt;script&gt;window.eval = function (e) { console.log(&apos;sending &apos; + e + &apos; to a malicious website!&apos;); };&lt;/script&gt;
2. Open the JS console.
3. Enter something.

What happens:
The JS console is, in this case, rendered useless because it outputs

    sending with ((window &amp;&amp; window.console &amp;&amp; window.console._commandLineAPI) || {}) {
    something
    } to a malicious website!

With more malicious use of this issue, it could cause information leak from all developers on the website.

What should happen:
The JS console should execute the JS code entered in the console.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>719121</commentid>
    <comment_count>1</comment_count>
    <who name="Pavel Feldman">pfeldman</who>
    <bug_when>2012-09-12 23:59:26 -0700</bug_when>
    <thetext>1) we no longer use window&apos;s eval for it. See newer Canary / nightly
2) even when we did I don&apos;t see how that could be exploited</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>719173</commentid>
    <comment_count>2</comment_count>
    <who name="Thaddee Tyl">thaddee.tyl</who>
    <bug_when>2012-09-13 00:51:49 -0700</bug_when>
    <thetext>Outstanding!</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>