![]() |
|
Message-ID: <20250623234529.GA10997@openwall.com> Date: Tue, 24 Jun 2025 01:45:29 +0200 From: Solar Designer <solar@...nwall.com> To: grape mingijung <mingijung.grape@...il.com> Cc: oss-security@...ts.openwall.com Subject: Re: xdg-open bypassing SameSite=Strict Hello Mingi Jung, Thank you for your report and handling of this issue. On Mon, Jun 23, 2025 at 08:59:46PM +0900, grape mingijung wrote: > During discussions with several Linux distro security teams, the following > suggestions were raised: > > 1. Introduce an "untrusted" mode or flag in browser CLI tools for > opening external URLs > 2. Extend xdg-open to support passing this "untrusted" flag or context > to the browser > 3. Modify desktop environments or applications to invoke xdg-open with > the "untrusted" option when appropriate > > In summary, it was suggested that the *browser should be updated first*, > followed by gradual support at the xdg-open and system levels. > > Accordingly, the issue has been forwarded to *browser vendors*, who are > currently reviewing it and exploring potential fixes. What about having browser CLI tools instead treat URLs as untrusted by default? So in step 1, a "trusted" mode or flag could be introduced (if needed for something else), and steps 2 and 3 would be unneeded. Would this cause too much breakage? What is expected to break? Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.