| Left: | ||
| Right: |
| LEFT | RIGHT |
|---|---|
| 1 /* | 1 /* |
| 2 * This file is part of Adblock Plus <https://adblockplus.org/>, | 2 * This file is part of Adblock Plus <https://adblockplus.org/>, |
| 3 * Copyright (C) 2006-present eyeo GmbH | 3 * Copyright (C) 2006-present eyeo GmbH |
| 4 * | 4 * |
| 5 * Adblock Plus is free software: you can redistribute it and/or modify | 5 * Adblock Plus is free software: you can redistribute it and/or modify |
| 6 * it under the terms of the GNU General Public License version 3 as | 6 * it under the terms of the GNU General Public License version 3 as |
| 7 * published by the Free Software Foundation. | 7 * published by the Free Software Foundation. |
| 8 * | 8 * |
| 9 * Adblock Plus is distributed in the hope that it will be useful, | 9 * Adblock Plus is distributed in the hope that it will be useful, |
| 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of | 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| (...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 74 | 74 |
| 75 function injectIntoAllFrames() | 75 function injectIntoAllFrames() |
| 76 { | 76 { |
| 77 for (let i = 0; i < window.length; i++) | 77 for (let i = 0; i < window.length; i++) |
| 78 injectIntoContentWindow(window[i]); | 78 injectIntoContentWindow(window[i]); |
| 79 } | 79 } |
| 80 | 80 |
| 81 function wrapAPIForInjection(object, api, callback) | 81 function wrapAPIForInjection(object, api, callback) |
| 82 { | 82 { |
| 83 let func = object[api]; | 83 let func = object[api]; |
| 84 object[api] = function(...args) | 84 if (!func || typeof func != "function") |
| 85 { | 85 return; |
| 86 let returnValue = func.apply(this, args); | 86 let applyFunc = Function.prototype.apply.bind(func); |
|
kzar
2017/12/11 08:48:13
I think func.apply could have been messed with at
Manish Jethani
2018/02/21 16:37:39
Thanks, for this one in particular now I've bound
| |
| 87 callback(returnValue); | 87 Object.defineProperty(object, api, { |
| 88 return returnValue; | 88 value(...args) |
| 89 }; | 89 { |
| 90 let returnValue = applyFunc(this, args); | |
| 91 callback(returnValue); | |
| 92 return returnValue; | |
| 93 } | |
| 94 }); | |
| 90 } | 95 } |
| 91 | 96 |
| 92 function wrapPropertyAPIForInjection(object, api, method, callback) | 97 function wrapPropertyAPIForInjection(object, api, method, callback) |
| 93 { | 98 { |
| 94 let descriptor = Object.getOwnPropertyDescriptor(object, api); | 99 let descriptor = Object.getOwnPropertyDescriptor(object, api); |
| 100 // Apparently HTMLObjectElement.prototype.contentWindow does not exist in | |
| 101 // older versions of Chrome such as 42. | |
| 102 if (!descriptor) | |
| 103 return; | |
| 95 wrapAPIForInjection(descriptor, method, callback); | 104 wrapAPIForInjection(descriptor, method, callback); |
| 96 Object.defineProperty(object, api, descriptor); | 105 Object.defineProperty(object, api, descriptor); |
| 97 } | 106 } |
| 98 | 107 |
| 99 wrapAPIForInjection(Node.prototype, "appendChild", injectIntoAllFrames); | 108 wrapAPIForInjection(Node.prototype, "appendChild", injectIntoAllFrames); |
| 100 wrapAPIForInjection(Node.prototype, "insertBefore", injectIntoAllFrames); | 109 wrapAPIForInjection(Node.prototype, "insertBefore", injectIntoAllFrames); |
| 101 wrapAPIForInjection(Node.prototype, "replaceChild", injectIntoAllFrames); | 110 wrapAPIForInjection(Node.prototype, "replaceChild", injectIntoAllFrames); |
| 102 | 111 |
| 103 wrapPropertyAPIForInjection(Element.prototype, | 112 wrapPropertyAPIForInjection(Element.prototype, |
| 104 "innerHTML", "set", injectIntoAllFrames); | 113 "innerHTML", "set", injectIntoAllFrames); |
| 105 | 114 |
| 106 wrapPropertyAPIForInjection(HTMLObjectElement.prototype, | 115 wrapPropertyAPIForInjection(HTMLObjectElement.prototype, |
|
Manish Jethani
2017/10/24 01:43:28
HTMLFrameElement and HTMLIFrameElement don't need
kzar
2017/12/11 08:48:13
Fair enough but did you check that it's OK with Ch
Manish Jethani
2018/02/21 16:37:39
I've added a check now so if the descriptor is not
| |
| 107 "contentWindow", "get", injectIntoContentWindow); | 116 "contentWindow", "get", injectIntoContentWindow); |
| 108 wrapPropertyAPIForInjection(HTMLObjectElement.prototype, | 117 wrapPropertyAPIForInjection( |
| 109 "contentDocument", "get", | 118 HTMLObjectElement.prototype, |
| 110 doc => injectIntoContentWindow(doc.defaultView)); | 119 "contentDocument", "get", |
| 120 contentDocument => | |
| 121 { | |
| 122 if (contentDocument) | |
| 123 injectIntoContentWindow(contentDocument.defaultView); | |
| 124 } | |
| 125 ); | |
| 111 | 126 |
| 112 /* | 127 /* |
| 113 * Shadow root getter wrapper | 128 * Shadow root getter wrapper |
| 114 * | 129 * |
| 115 * After creating our shadowRoot we must wrap the getter to prevent the | 130 * After creating our shadowRoot we must wrap the getter to prevent the |
| 116 * website from accessing it (#4191, #4298). This is required as a | 131 * website from accessing it (#4191, #4298). This is required as a |
| 117 * workaround for the lack of user style support in Chrome. | 132 * workaround for the lack of user style support in Chrome. |
| 118 * See https://bugs.chromium.org/p/chromium/issues/detail?id=632009&desc=2 | 133 * See https://bugs.chromium.org/p/chromium/issues/detail?id=632009&desc=2 |
| 119 */ | 134 */ |
| 120 if ("shadowRoot" in Element.prototype) | 135 if ("shadowRoot" in Element.prototype) |
| (...skipping 96 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 217 | 232 |
| 218 /* | 233 /* |
| 219 * RTCPeerConnection wrapper | 234 * RTCPeerConnection wrapper |
| 220 * | 235 * |
| 221 * The webRequest API in Chrome does not yet allow the blocking of | 236 * The webRequest API in Chrome does not yet allow the blocking of |
| 222 * WebRTC connections. | 237 * WebRTC connections. |
| 223 * See https://bugs.chromium.org/p/chromium/issues/detail?id=707683 | 238 * See https://bugs.chromium.org/p/chromium/issues/detail?id=707683 |
| 224 */ | 239 */ |
| 225 let RealRTCPeerConnection = window.RTCPeerConnection || | 240 let RealRTCPeerConnection = window.RTCPeerConnection || |
| 226 window.webkitRTCPeerConnection; | 241 window.webkitRTCPeerConnection; |
| 227 let closeRTCPeerConnection = Function.prototype.call.bind( | 242 |
| 228 RealRTCPeerConnection.prototype.close | 243 // Firefox has the option (media.peerconnection.enabled) to disable WebRTC |
| 229 ); | 244 // in which case RealRTCPeerConnection is undefined. |
| 230 let RealArray = Array; | 245 if (typeof RealRTCPeerConnection != "undefined") |
| 231 let RealString = String; | 246 { |
| 232 let {create: createObject, defineProperty} = Object; | 247 let closeRTCPeerConnection = Function.prototype.call.bind( |
| 233 | 248 RealRTCPeerConnection.prototype.close |
| 234 function normalizeUrl(url) | 249 ); |
| 235 { | 250 let RealArray = Array; |
| 236 if (typeof url != "undefined") | 251 let RealString = String; |
| 237 return RealString(url); | 252 let {create: createObject, defineProperty} = Object; |
| 238 } | 253 |
| 239 | 254 let normalizeUrl = url => |
| 240 function safeCopyArray(originalArray, transform) | 255 { |
| 241 { | 256 if (typeof url != "undefined") |
| 242 if (originalArray == null || typeof originalArray != "object") | 257 return RealString(url); |
| 243 return originalArray; | 258 }; |
| 244 | 259 |
| 245 let safeArray = RealArray(originalArray.length); | 260 let safeCopyArray = (originalArray, transform) => |
| 246 for (let i = 0; i < safeArray.length; i++) | 261 { |
| 247 { | 262 if (originalArray == null || typeof originalArray != "object") |
| 248 defineProperty(safeArray, i, { | 263 return originalArray; |
| 264 | |
| 265 let safeArray = RealArray(originalArray.length); | |
| 266 for (let i = 0; i < safeArray.length; i++) | |
| 267 { | |
| 268 defineProperty(safeArray, i, { | |
| 269 configurable: false, enumerable: false, writable: false, | |
| 270 value: transform(originalArray[i]) | |
| 271 }); | |
| 272 } | |
| 273 defineProperty(safeArray, "length", { | |
| 249 configurable: false, enumerable: false, writable: false, | 274 configurable: false, enumerable: false, writable: false, |
| 250 value: transform(originalArray[i]) | 275 value: safeArray.length |
| 251 }); | 276 }); |
| 252 } | 277 return safeArray; |
| 253 defineProperty(safeArray, "length", { | 278 }; |
| 254 configurable: false, enumerable: false, writable: false, | 279 |
| 255 value: safeArray.length | 280 // It would be much easier to use the .getConfiguration method to obtain |
| 256 }); | 281 // the normalized and safe configuration from the RTCPeerConnection |
| 257 return safeArray; | 282 // instance. Unfortunately its not implemented as of Chrome unstable 59. |
| 258 } | 283 // See https://www.chromestatus.com/feature/5271355306016768 |
| 259 | 284 let protectConfiguration = configuration => |
| 260 // It would be much easier to use the .getConfiguration method to obtain | 285 { |
| 261 // the normalized and safe configuration from the RTCPeerConnection | 286 if (configuration == null || typeof configuration != "object") |
| 262 // instance. Unfortunately its not implemented as of Chrome unstable 59. | 287 return configuration; |
| 263 // See https://www.chromestatus.com/feature/5271355306016768 | 288 |
| 264 function protectConfiguration(configuration) | 289 let iceServers = safeCopyArray( |
| 265 { | 290 configuration.iceServers, |
| 266 if (configuration == null || typeof configuration != "object") | 291 iceServer => |
| 267 return configuration; | 292 { |
| 268 | 293 let {url, urls} = iceServer; |
| 269 let iceServers = safeCopyArray( | 294 |
| 270 configuration.iceServers, | 295 // RTCPeerConnection doesn't iterate through pseudo Arrays of urls. |
| 271 iceServer => | 296 if (typeof urls != "undefined" && !(urls instanceof RealArray)) |
| 272 { | 297 urls = [urls]; |
| 273 let {url, urls} = iceServer; | 298 |
| 274 | 299 return createObject(iceServer, { |
| 275 // RTCPeerConnection doesn't iterate through pseudo Arrays of urls. | 300 url: { |
| 276 if (typeof urls != "undefined" && !(urls instanceof RealArray)) | 301 configurable: false, enumerable: false, writable: false, |
| 277 urls = [urls]; | 302 value: normalizeUrl(url) |
| 278 | 303 }, |
| 279 return createObject(iceServer, { | 304 urls: { |
| 280 url: { | 305 configurable: false, enumerable: false, writable: false, |
| 281 configurable: false, enumerable: false, writable: false, | 306 value: safeCopyArray(urls, normalizeUrl) |
| 282 value: normalizeUrl(url) | 307 } |
| 283 }, | 308 }); |
| 284 urls: { | 309 } |
| 285 configurable: false, enumerable: false, writable: false, | 310 ); |
| 286 value: safeCopyArray(urls, normalizeUrl) | 311 |
| 312 return createObject(configuration, { | |
| 313 iceServers: { | |
| 314 configurable: false, enumerable: false, writable: false, | |
| 315 value: iceServers | |
| 316 } | |
| 317 }); | |
| 318 }; | |
| 319 | |
| 320 let checkUrl = (peerconnection, url) => | |
| 321 { | |
| 322 checkRequest("webrtc", url, blocked => | |
| 323 { | |
| 324 if (blocked) | |
| 325 { | |
| 326 // Calling .close() throws if already closed. | |
| 327 try | |
| 328 { | |
| 329 closeRTCPeerConnection(peerconnection); | |
| 287 } | 330 } |
| 288 }); | 331 catch (e) {} |
| 289 } | 332 } |
| 290 ); | 333 }); |
| 291 | 334 }; |
| 292 return createObject(configuration, { | 335 |
| 293 iceServers: { | 336 let checkConfiguration = (peerconnection, configuration) => |
| 294 configurable: false, enumerable: false, writable: false, | 337 { |
| 295 value: iceServers | 338 if (configuration && configuration.iceServers) |
| 296 } | 339 { |
| 297 }); | 340 for (let i = 0; i < configuration.iceServers.length; i++) |
| 298 } | |
| 299 | |
| 300 function checkUrl(peerconnection, url) | |
| 301 { | |
| 302 checkRequest("webrtc", url, blocked => | |
| 303 { | |
| 304 if (blocked) | |
| 305 { | |
| 306 // Calling .close() throws if already closed. | |
| 307 try | |
| 308 { | 341 { |
| 309 closeRTCPeerConnection(peerconnection); | 342 let iceServer = configuration.iceServers[i]; |
| 310 } | 343 if (iceServer) |
| 311 catch (e) {} | |
| 312 } | |
| 313 }); | |
| 314 } | |
| 315 | |
| 316 function checkConfiguration(peerconnection, configuration) | |
| 317 { | |
| 318 if (configuration && configuration.iceServers) | |
| 319 { | |
| 320 for (let i = 0; i < configuration.iceServers.length; i++) | |
| 321 { | |
| 322 let iceServer = configuration.iceServers[i]; | |
| 323 if (iceServer) | |
| 324 { | |
| 325 if (iceServer.url) | |
| 326 checkUrl(peerconnection, iceServer.url); | |
| 327 | |
| 328 if (iceServer.urls) | |
| 329 { | 344 { |
| 330 for (let j = 0; j < iceServer.urls.length; j++) | 345 if (iceServer.url) |
| 331 checkUrl(peerconnection, iceServer.urls[j]); | 346 checkUrl(peerconnection, iceServer.url); |
| 347 | |
| 348 if (iceServer.urls) | |
| 349 { | |
| 350 for (let j = 0; j < iceServer.urls.length; j++) | |
| 351 checkUrl(peerconnection, iceServer.urls[j]); | |
| 352 } | |
| 332 } | 353 } |
| 333 } | 354 } |
| 334 } | 355 } |
| 356 }; | |
| 357 | |
| 358 // Chrome unstable (tested with 59) has already implemented | |
| 359 // setConfiguration, so we need to wrap that if it exists too. | |
| 360 // https://www.chromestatus.com/feature/5596193748942848 | |
| 361 if (RealRTCPeerConnection.prototype.setConfiguration) | |
| 362 { | |
| 363 let realSetConfiguration = Function.prototype.call.bind( | |
| 364 RealRTCPeerConnection.prototype.setConfiguration | |
| 365 ); | |
| 366 | |
| 367 RealRTCPeerConnection.prototype.setConfiguration = function(configuration) | |
| 368 { | |
| 369 configuration = protectConfiguration(configuration); | |
| 370 | |
| 371 // Call the real method first, so that validates the configuration for | |
| 372 // us. Also we might as well since checkRequest is asynchronous anyway. | |
| 373 realSetConfiguration(this, configuration); | |
| 374 checkConfiguration(this, configuration); | |
| 375 }; | |
| 335 } | 376 } |
| 336 } | 377 |
| 337 | 378 let WrappedRTCPeerConnection = function(...args) |
| 338 // Chrome unstable (tested with 59) has already implemented | 379 { |
| 339 // setConfiguration, so we need to wrap that if it exists too. | 380 if (!(this instanceof WrappedRTCPeerConnection)) |
| 340 // https://www.chromestatus.com/feature/5596193748942848 | 381 return RealRTCPeerConnection(); |
| 341 if (RealRTCPeerConnection.prototype.setConfiguration) | 382 |
| 342 { | 383 let configuration = protectConfiguration(args[0]); |
| 343 let realSetConfiguration = Function.prototype.call.bind( | 384 |
| 344 RealRTCPeerConnection.prototype.setConfiguration | 385 // Since the old webkitRTCPeerConnection constructor takes an optional |
| 345 ); | 386 // second argument we need to take care to pass that through. Necessary |
| 346 | 387 // for older versions of Chrome such as 49. |
| 347 RealRTCPeerConnection.prototype.setConfiguration = function(configuration) | 388 let constraints = undefined; |
| 348 { | 389 if (args.length > 1) |
| 349 configuration = protectConfiguration(configuration); | 390 constraints = args[1]; |
| 350 | 391 |
| 351 // Call the real method first, so that validates the configuration for | 392 let peerconnection = new RealRTCPeerConnection(configuration, |
| 352 // us. Also we might as well since checkRequest is asynchronous anyway. | 393 constraints); |
| 353 realSetConfiguration(this, configuration); | 394 checkConfiguration(peerconnection, configuration); |
| 354 checkConfiguration(this, configuration); | 395 return peerconnection; |
| 355 }; | 396 }; |
| 356 } | 397 |
| 357 | 398 WrappedRTCPeerConnection.prototype = RealRTCPeerConnection.prototype; |
| 358 function WrappedRTCPeerConnection(...args) | 399 |
| 359 { | 400 let boundWrappedRTCPeerConnection = WrappedRTCPeerConnection.bind(); |
| 360 if (!(this instanceof WrappedRTCPeerConnection)) | 401 copyProperties(RealRTCPeerConnection, boundWrappedRTCPeerConnection, |
| 361 return RealRTCPeerConnection(); | 402 ["generateCertificate", "name", "prototype"]); |
| 362 | 403 RealRTCPeerConnection.prototype.constructor = boundWrappedRTCPeerConnection; |
| 363 let configuration = protectConfiguration(args[0]); | 404 |
| 364 | 405 if ("RTCPeerConnection" in window) |
| 365 // Since the old webkitRTCPeerConnection constructor takes an optional | 406 window.RTCPeerConnection = boundWrappedRTCPeerConnection; |
| 366 // second argument we need to take care to pass that through. Necessary | 407 if ("webkitRTCPeerConnection" in window) |
| 367 // for older versions of Chrome such as 49. | 408 window.webkitRTCPeerConnection = boundWrappedRTCPeerConnection; |
| 368 let constraints = undefined; | 409 } |
| 369 if (args.length > 1) | |
| 370 constraints = args[1]; | |
| 371 | |
| 372 let peerconnection = new RealRTCPeerConnection(configuration, constraints); | |
| 373 checkConfiguration(peerconnection, configuration); | |
| 374 return peerconnection; | |
| 375 } | |
| 376 | |
| 377 WrappedRTCPeerConnection.prototype = RealRTCPeerConnection.prototype; | |
| 378 | |
| 379 let boundWrappedRTCPeerConnection = WrappedRTCPeerConnection.bind(); | |
| 380 copyProperties(RealRTCPeerConnection, boundWrappedRTCPeerConnection, | |
| 381 ["generateCertificate", "name", "prototype"]); | |
| 382 RealRTCPeerConnection.prototype.constructor = boundWrappedRTCPeerConnection; | |
| 383 | |
| 384 if ("RTCPeerConnection" in window) | |
| 385 window.RTCPeerConnection = boundWrappedRTCPeerConnection; | |
| 386 if ("webkitRTCPeerConnection" in window) | |
| 387 window.webkitRTCPeerConnection = boundWrappedRTCPeerConnection; | |
| 388 } | 410 } |
| 389 | 411 |
| 390 if (document instanceof HTMLDocument) | 412 if (document instanceof HTMLDocument) |
| 391 { | 413 { |
| 392 let sandbox = window.frameElement && | 414 let sandbox = window.frameElement && |
| 393 window.frameElement.getAttribute("sandbox"); | 415 window.frameElement.getAttribute("sandbox"); |
| 394 | 416 |
| 395 if (typeof sandbox != "string" || /(^|\s)allow-scripts(\s|$)/i.test(sandbox)) | 417 if (typeof sandbox != "string" || /(^|\s)allow-scripts(\s|$)/i.test(sandbox)) |
| 396 { | 418 { |
| 397 let script = document.createElement("script"); | 419 let script = document.createElement("script"); |
| 398 script.type = "application/javascript"; | 420 script.type = "application/javascript"; |
| 399 script.async = false; | 421 script.async = false; |
| 400 script.textContent = "(" + injected + ")('" + randomEventName + "');"; | 422 // Firefox 58 only bypasses site CSPs when assigning to 'src'. |
| 423 let url = URL.createObjectURL(new Blob([ | |
| 424 "(" + injected + ")('" + randomEventName + "');" | |
| 425 ])); | |
| 426 script.src = url; | |
| 401 document.documentElement.appendChild(script); | 427 document.documentElement.appendChild(script); |
| 402 document.documentElement.removeChild(script); | 428 document.documentElement.removeChild(script); |
| 429 URL.revokeObjectURL(url); | |
| 403 } | 430 } |
| 404 } | 431 } |
| LEFT | RIGHT |