123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151 |
- /* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
- this.EXPORTED_SYMBOLS = [ "InsecurePasswordUtils" ];
- const { classes: Cc, interfaces: Ci, results: Cr, utils: Cu } = Components;
- const STRINGS_URI = "chrome://global/locale/security/security.properties";
- Cu.import("resource://gre/modules/Services.jsm");
- Cu.import("resource://gre/modules/XPCOMUtils.jsm");
- XPCOMUtils.defineLazyModuleGetter(this, "devtools",
- "resource://devtools/shared/Loader.jsm");
- XPCOMUtils.defineLazyServiceGetter(this, "gContentSecurityManager",
- "@mozilla.org/contentsecuritymanager;1",
- "nsIContentSecurityManager");
- XPCOMUtils.defineLazyServiceGetter(this, "gScriptSecurityManager",
- "@mozilla.org/scriptsecuritymanager;1",
- "nsIScriptSecurityManager");
- XPCOMUtils.defineLazyGetter(this, "WebConsoleUtils", () => {
- return this.devtools.require("devtools/server/actors/utils/webconsole-utils").Utils;
- });
- /*
- * A module that provides utility functions for form security.
- *
- * Note:
- * This module uses isSecureContextIfOpenerIgnored instead of isSecureContext.
- *
- * We don't want to expose JavaScript APIs in a non-Secure Context even if
- * the context is only insecure because the windows has an insecure opener.
- * Doing so prevents sites from implementing postMessage workarounds to enable
- * an insecure opener to gain access to Secure Context-only APIs. However,
- * in the case of form fields such as password fields we don't need to worry
- * about whether the opener is secure or not. In fact to flag a password
- * field as insecure in such circumstances would unnecessarily confuse our
- * users.
- */
- this.InsecurePasswordUtils = {
- _formRootsWarned: new WeakMap(),
- _sendWebConsoleMessage(messageTag, domDoc) {
- let windowId = WebConsoleUtils.getInnerWindowId(domDoc.defaultView);
- let category = "Insecure Password Field";
- // All web console messages are warnings for now.
- let flag = Ci.nsIScriptError.warningFlag;
- let bundle = Services.strings.createBundle(STRINGS_URI);
- let message = bundle.GetStringFromName(messageTag);
- let consoleMsg = Cc["@mozilla.org/scripterror;1"].createInstance(Ci.nsIScriptError);
- consoleMsg.initWithWindowID(message, domDoc.location.href, 0, 0, 0, flag, category, windowId);
- Services.console.logMessage(consoleMsg);
- },
- /**
- * Gets the security state of the passed form.
- *
- * @param {FormLike} aForm A form-like object. @See {FormLikeFactory}
- *
- * @returns {Object} An object with the following boolean values:
- * isFormSubmitHTTP: if the submit action is an http:// URL
- * isFormSubmitSecure: if the submit action URL is secure,
- * either because it is HTTPS or because its origin is considered trustworthy
- */
- _checkFormSecurity(aForm) {
- let isFormSubmitHTTP = false, isFormSubmitSecure = false;
- if (aForm.rootElement instanceof Ci.nsIDOMHTMLFormElement) {
- let uri = Services.io.newURI(aForm.rootElement.action || aForm.rootElement.baseURI,
- null, null);
- let principal = gScriptSecurityManager.getCodebasePrincipal(uri);
- if (uri.schemeIs("http")) {
- isFormSubmitHTTP = true;
- if (gContentSecurityManager.isOriginPotentiallyTrustworthy(principal)) {
- isFormSubmitSecure = true;
- }
- } else {
- isFormSubmitSecure = true;
- }
- }
- return { isFormSubmitHTTP, isFormSubmitSecure };
- },
- /**
- * Checks if there are insecure password fields present on the form's document
- * i.e. passwords inside forms with http action, inside iframes with http src,
- * or on insecure web pages.
- *
- * @param {FormLike} aForm A form-like object. @See {LoginFormFactory}
- * @return {boolean} whether the form is secure
- */
- isFormSecure(aForm) {
- // Ignores window.opener, see top level documentation.
- let isSafePage = aForm.ownerDocument.defaultView.isSecureContextIfOpenerIgnored;
- let { isFormSubmitSecure, isFormSubmitHTTP } = this._checkFormSecurity(aForm);
- return isSafePage && (isFormSubmitSecure || !isFormSubmitHTTP);
- },
- /**
- * Report insecure password fields in a form to the web console to warn developers.
- *
- * @param {FormLike} aForm A form-like object. @See {FormLikeFactory}
- */
- reportInsecurePasswords(aForm) {
- if (this._formRootsWarned.has(aForm.rootElement) ||
- this._formRootsWarned.get(aForm.rootElement)) {
- return;
- }
- let domDoc = aForm.ownerDocument;
- // Ignores window.opener, see top level documentation.
- let isSafePage = domDoc.defaultView.isSecureContextIfOpenerIgnored;
- let { isFormSubmitHTTP, isFormSubmitSecure } = this._checkFormSecurity(aForm);
- if (!isSafePage) {
- if (domDoc.defaultView == domDoc.defaultView.parent) {
- this._sendWebConsoleMessage("InsecurePasswordsPresentOnPage", domDoc);
- } else {
- this._sendWebConsoleMessage("InsecurePasswordsPresentOnIframe", domDoc);
- }
- this._formRootsWarned.set(aForm.rootElement, true);
- } else if (isFormSubmitHTTP && !isFormSubmitSecure) {
- this._sendWebConsoleMessage("InsecureFormActionPasswordsPresent", domDoc);
- this._formRootsWarned.set(aForm.rootElement, true);
- }
- // The safety of a password field determined by the form action and the page protocol
- let passwordSafety;
- if (isSafePage) {
- if (isFormSubmitSecure) {
- passwordSafety = 0;
- } else if (isFormSubmitHTTP) {
- passwordSafety = 1;
- } else {
- passwordSafety = 2;
- }
- } else if (isFormSubmitSecure) {
- passwordSafety = 3;
- } else if (isFormSubmitHTTP) {
- passwordSafety = 4;
- } else {
- passwordSafety = 5;
- }
- Services.telemetry.getHistogramById("PWMGR_LOGIN_PAGE_SAFETY").add(passwordSafety);
- },
- };
|