diff --git a/index.html b/index.html index 8fa6ae7..bfa443f 100644 --- a/index.html +++ b/index.html @@ -35,6 +35,15 @@ browsers: ["chrome", "firefox", "safari", "edge", "and_chr", "and_ff", "ios_saf"], }, xref: "web-platform", + // The Wylecial breaks the link checker with bad HTTP code response, so disabling this for now. + // localBiblio: { + // "Wylecial": { + // "date": "2020-08-25", + // "title": "Stealing local files using Safari Web Share API", + // "Author": "Pawel Wylecial", + // "href": "https://blog.redteam.pl/2020/08/stealing-local-files-using-safari-web.html" + // } + // } }; @@ -176,6 +185,9 @@

  • If |url| is failure, return a promise rejected with {{TypeError}}.
  • +
  • If |url|'s [=URL/scheme=] is not "http" or "https", return + a promise rejected with {{TypeError}}. +
  • Set |data| to a copy of |data|, with its {{ShareData/url}} member set to the result of running the URL serializer on |url|. @@ -464,6 +476,45 @@

    guard against this, but implementors will want to be aware that it is a possibility.

  • +
  • +

    + Share targets that dereference a shared URL and forward that + information on might inadvertently forward information that might + be otherwise confidential. This can lead to unexpected information + leakage if shares reference content that is only accessible by that + application, the host on which it runs, or its network location. +

    +

    + Malicious sites might exploit share targets that leak information + by providing URLs that ultimately resolve to local resources, + including, but not limited to, "file:" URLs or local services that + might otherwise be inaccessible. Even though this API limits shared + URLS to "http:" and "https:", use of redirects to other URLs or + tweaks to DNS records for hosts in those URLs might be used to + cause applications to acquire content. +

    +

    + To avoid being used in these attacks, share targets can consume the + URL, retrieve the content, and process that information without + sharing it. For instance, a photo editing application might + retrieve an image that is "shared" with it. A share target can also + share the URL without fetching any of the referenced content. +

    +

    + Share targets that fetch content for the purposes of offering a + preview or for sharing content risk information leakage. Content + that is previewed and authorized by a user might be safe to + forward, however it is not always possible for a person to identify + when information should be confidential, so forwarding any content + presents a risk. In particular, the {{ShareData/title}} might be + used by an attacker to trick a user into misinterpreting the nature + of the content. + +

    +