Block top-level navigations to nested URLs with extension origins from non-extension processes.
Before this CL, it was possible for a web iframe with an unblessed extension frame to exploit the renderer, create a blob: or filesystem: URL in the extension frame context, then create a new top-level window and navigate it to that URL, which could end up putting the new window into a privileged extension process running attacker's code. BUG=645028 Review-Url: https://codereview.chromium.org/2345473003 Cr-Commit-Position: refs/heads/master@{#419019}
Showing
This diff is collapsed.
Please register or sign in to comment