Difference between revisions of "Cross-Origin iFrame"

From MgmtWiki
Jump to: navigation, search
(Problems)
(Problems)
Line 9: Line 9:
 
==Problems==
 
==Problems==
 
* Limitations that have been placed on iFrames can (with the exception of running plugins) be disabled by the source web site which may not fully share the user's security concerns.
 
* Limitations that have been placed on iFrames can (with the exception of running plugins) be disabled by the source web site which may not fully share the user's security concerns.
 +
# Run plug-ins
 
# Submit forms - disabled by allow-forms
 
# Submit forms - disabled by allow-forms
 
# Change the parent web page’s URL - disabled by allow-top-navigation
 
# Change the parent web page’s URL - disabled by allow-top-navigation
# Run plug-ins
 
 
# Read cookies or local storage, even if it’s from the parent domain
 
# Read cookies or local storage, even if it’s from the parent domain
 
# Open new tabs, new windows or pop-up windows - partially disabled by allow-popups
 
# Open new tabs, new windows or pop-up windows - partially disabled by allow-popups

Revision as of 10:47, 12 March 2021

Full Title or Meme

The Inline Frame, or iFrame was introduced to allow isolated web pages from unrelated entities to embed content seamlessly into a web page.

Context

  • Frames and Framesets were introduced early in browser history to enable refreshing only a portion of a web page to improve responsiveness of web pages in the days of low bandwidth data communications.
  • Identity features like OpenID Connect and WebAuthn 2 depends on the Cross-Origin iFrame for a seamless User Experience when identity is provided by a different web site than the Relying Party.
  • Early on security was addressed If they’re not from the same domain, the parent HTML document and the iframe don’t have access to each other’s CSS styles, DOM or JavaScript functions, cookies, or local storage.

Problems

  • Limitations that have been placed on iFrames can (with the exception of running plugins) be disabled by the source web site which may not fully share the user's security concerns.
  1. Run plug-ins
  2. Submit forms - disabled by allow-forms
  3. Change the parent web page’s URL - disabled by allow-top-navigation
  4. Read cookies or local storage, even if it’s from the parent domain
  5. Open new tabs, new windows or pop-up windows - partially disabled by allow-popups
  6. Run any JavaScript (even if it would only impact what’s inside the iframe) - disabled by allow-scripts.
  7. Access data from Origin URL - allow-same-origin

Solutions

References