diff --git a/index.html b/index.html index 8fa6ae7..bfa443f 100644 --- a/index.html +++ b/index.html @@ -35,6 +35,15 @@ browsers: ["chrome", "firefox", "safari", "edge", "and_chr", "and_ff", "ios_saf"], }, xref: "web-platform", + // The Wylecial breaks the link checker with bad HTTP code response, so disabling this for now. + // localBiblio: { + // "Wylecial": { + // "date": "2020-08-25", + // "title": "Stealing local files using Safari Web Share API", + // "Author": "Pawel Wylecial", + // "href": "https://blog.redteam.pl/2020/08/stealing-local-files-using-safari-web.html" + // } + // } }; @@ -176,6 +185,9 @@
+ Share targets that dereference a shared URL and forward that + information on might inadvertently forward information that might + be otherwise confidential. This can lead to unexpected information + leakage if shares reference content that is only accessible by that + application, the host on which it runs, or its network location. +
++ Malicious sites might exploit share targets that leak information + by providing URLs that ultimately resolve to local resources, + including, but not limited to, "file:" URLs or local services that + might otherwise be inaccessible. Even though this API limits shared + URLS to "http:" and "https:", use of redirects to other URLs or + tweaks to DNS records for hosts in those URLs might be used to + cause applications to acquire content. +
++ To avoid being used in these attacks, share targets can consume the + URL, retrieve the content, and process that information without + sharing it. For instance, a photo editing application might + retrieve an image that is "shared" with it. A share target can also + share the URL without fetching any of the referenced content. +
++ Share targets that fetch content for the purposes of offering a + preview or for sharing content risk information leakage. Content + that is previewed and authorized by a user might be safe to + forward, however it is not always possible for a person to identify + when information should be confidential, so forwarding any content + presents a risk. In particular, the {{ShareData/title}} might be + used by an attacker to trick a user into misinterpreting the nature + of the content. + +
+