DescriptionThe so-called "Rosetta Flash" vulnerability is that allowing arbitrary
yet identifier-like text at the beginning of a JSONP response is
sufficient for it to be interpreted as a Flash file executing in that
origin. See for more information:
http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/
JSONP responses from the proxy servlet now:
* are prefixed with "/**/", which still allows them to execute as JSONP
but removes requester control over the first bytes of the response.
* have the response header Content-Disposition: attachment.
Another recommended mitigation, "X-Content-Type-Options: nosniff", was
already present.
Bug: <https://code.google.com/p/google-caja/issues/detail?id=1923>
@r5697
Patch Set 1 #
MessagesTotal messages: 2
|
|||||||||||||||||||||||||||||||||||||