Version bump: 10.1.8.23rc1.

This commit is contained in:
hackademix 2018-08-25 11:32:25 +02:00
commit c646f09a2b
3 changed files with 10 additions and 9 deletions

View File

@ -425,23 +425,25 @@ var RequestGuard = (() => {
(!content.type || /^\s*(?:video|audio|application)\//.test(content.type))) {
debug(`Suspicious content type "%s" in request %o with capabilities %o`,
content.type, request, capabilities);
blockedTypes = CSP.types.filter(t => !capabilities.has(t));
blockedTypes = new Set(CSP.types.filter(t => !capabilities.has(t)));
} else if(!canScript) {
blockedTypes = ["script"];
blockedTypes = new Set(["script"]);
forbidData.add("object"); // data: URIs loaded in objects may run scripts
} else {
blockedTypes = new Set();
}
for (let type of forbidData) { // object, font, media
if (blockedTypes.includes(type)) continue;
if (blockedTypes.has(type)) continue;
// HTTP is blocked in onBeforeRequest, let's allow it only and block
// for instance data: and blob: URIs
let dataBlocker = {name: type, value: "http: https:"};
if (blockedTypes) blockedTypes.push(dataBlocker)
else blockedTypes = [dataBlocker];
blockedTypes.add(dataBlocker)
}
if (blockedTypes.size) {
debug("Blocked types", blockedTypes);
if (blockedTypes && blockedTypes.length) {
blocker = CSP.createBlocker(...blockedTypes);
}

View File

@ -180,7 +180,6 @@ async function init(oldPage = false) {
if (canScript) {
if (oldPage) {
probe();
setTimeout(() => init(), 200);
return;
}
if (!shouldScript &&

View File

@ -8,7 +8,7 @@
"strict_min_version": "59.0"
}
},
"version": "10.1.8.21",
"version": "10.1.8.23rc1",
"description": "__MSG_Description__",
"content_security_policy": "script-src 'self' 'unsafe-eval'; object-src 'none'",