As described in Christoph Kern's "Securing the Tangled Web",
Google has been fairly successful at combating DOM-based XSS attacks by relying on a set of
typed objects instead of
strings to represent HTML snippets, URLs, etc. Compilation-time analysis done for JavaScript code
ensures that only these types can be used with various DOM APIs that can be used as DOM-based XSS
sinks (el.innerHTML
, location.href
, ScriptElement.src
and so on). These types do not obliterate
DOM XSS in themselves, as authors may still create an instance of a type with an untrusted value.
Instead, it simplifies the security analysis of the application - security reviewers don't need to
deeply understand and review each and every usage of a given sink, but can instead focus their
efforts on the code that generates the typed objects. As long as these "trusted" types are always
generated from a small, reviewable subset of overall application code - safe templating libraries,
sanitizers, and so on, developers can have a high degree of confidence that the risk of DOM-based
XSS remains low.
Google's internal implementation has a number of bells and whistles (and makes a number of assumptions about requirements) that probably aren't suitable for the world at large. It would be interesting to explore how we might extract some more generic version of this concept from those internal tools in order to bring this kind of functionality to the web in a generic fashion. For example, different applications might have different opinions about what makes a particular HTML snippet "safe", but regardless of the definition, it seems clear that the browser is well-positioned to enforce type constraints dynamically at runtime. That would be a substantial improvement over the tight link between the type system and the compiler.
While we could jam all sorts of sanitization functionality into such a system, it seems reasonable to start small until we know how existing templating systems and sanitizers will layer any primitives we introduce into their existing systems. The following approach seems compelling as a first step:
-
Introduce a number of types that correspond to the sinks we wish to protect. For example, to cover DOM XSS vulnerabilities we could define a
TrustedHTML
object that marks it as suitable for using viainnerHTML
(instead of a string). Or aTrustedScriptURL
object that's suitable to be assigned to aScriptElement.src
attribute.These types should be pretty minimal in nature, making them polyfillable in browsers that don't support them natively.
-
Enumerate all the sinks we wish to protect, and overload each of them with a variant that accepts the matching type. For example,
Element.innerHTML
's setter could acceptTrustedHTML
, and we could overloaddocument.write(DOMString)
withdocument.write(TrustedHTML)
.As above, this mechanism should be polyfillable; the polyfilled types define stringifiers which would enable them to be automatically cast into strings when called on existing setters.
-
Introduce a mechanism for disabling the raw string version of each of the sinks identified above. For example, to signify that the application opts into DOM XSS sink protection
Content-Security-Policy: require-trusted-types-for 'script'
header could be used: This causes theinnerHTML
setter to throw aTypeError
if a raw string was passed in.This is possible to polyfill for many setters and methods, apart from the ones that are marked as
[LegacyUnforgeable]
.This approach could later be extended to cover other types of risky and easy to misuse APIs (e.g. to cover CSS-based data exfiltration attacks).
We identified three types that match the different contexts relevant for DOM XSS:
-
TrustedHTML: This type would be used to represent a trusted snippet that could be passed into an HTML context.
interface TrustedHTML { stringifier; }
-
TrustedScriptURL: This type would be used to represent a URL that could be used to load resources that may result in script execution in the current document.
interface TrustedScriptURL { stringifier; }
-
TrustedScript: This type would be used to represent a trusted JavaScript code block i.e. something that is trusted by the author to be executed by adding it to a
<script>
element content, inline event handler or passing to aneval
function family.interface TrustedScript { stringifier; }
Introducing and requiring typed objects is, sadly, not sufficient: Exposing raw Trusted Types constructors to the web authors presents a significant problem, in that it only marginally improves the situation: while it allows certain libraries to produce and use typed values in place of strings, it also allows constructing the types at will (see #31), and every typed value construction in the application is a potential DOM XSS. Consider the following code snippet from the previous version of the API:
// DEPRECATED.
node.innerHTML = TrustedHTML.unsafelyCreate(variable)
Reasoning about DOM XSS susceptibility of an application riddled with the statements like above is just as hard, as it was in the original DOM API. Therefore we propose the concept of policies (not to be confused with CSP).
Raw typed object constructors from a string are forbidden. Instead, we introduce a programmatic JavaScript API, allowing web authors to specify how the aforementioned objects can be created. An application can create multiple named policies for a document. Typed objects can be constructed from a string only by invoking one of those policies.
For example, an application may define a policy, in which TrustedScriptURL
is a same-origin URL or the domain is from a whitelisted domain list. A
separate policy may pass a string through a custom HTML sanitization function before producing a
TrustedHTML
object. As authors may create multiple policies with different rules, application may
hand over certain policies to separate submodules of its codebase, guarding how those submodules can
interact with DOM.
For example: the application author trusts the Foo library not to cause DOM XSS (it's known
to have a very robust HTML sanitizer, was already security reviewed and is well-maintained), so it
may initialize Foo with a no-op policy. At the same time, a 3rd party chat widget, or an Analytics
script should only be trusted to create <div>
and <img>
elements, so it's initialized with a
policy that only allows for that, and escapes (or removes) any other content.
Such API allows the authors to specify a set of policies that guard the typed objects creation. As valid trusted type objects must originate from a policy, those policies alone form the trusted codebase in regards to DOM XSS, reducing the attack and security review surface considerably.
interface TrustedTypePolicyFactory {
TrustedTypePolicy createPolicy(DOMString policyName, TrustedTypeInnerPolicy policy);
}
We propose to provide a TrustedTypePolicyFactory
implementation under window.trustedTypes
. The most important function available in a TrustedTypePolicyFactory
is createPolicy
.
The policy rules for creating individual types are configured via the properties of TrustedTypeInnerPolicy
object. Note that the functions operate on strings. The actual type construction is provided by the private API, not exposed to the authors.
interface TrustedTypeInnerPolicy {
string createHTML(string);
string createScriptURL(string);
string createScript(string);
}
Policy (with a unique name) can be created like this:
const myPolicy = trustedTypes.createPolicy('mypolicy', {
createHTML: (s) => { return customSanitize(s) },
createScriptURL: (s) => { /* parse and validate the url. throw if non-conformant */ },
})
The policy object is returned, and can be used as a capability to create typed objects i.e. code parts without a reference to the policy object cannot use it.
The policy object can be used directly to create typed values that conform to its rules:
const trustedHtml = myPolicy.createHTML('<p>ok<script>not ok</script></p>')
document.body.innerHTML = trustedHtml // does not throw.
trustedHtml.toString() // <p>ok</p>, as the customSanitize removed the script.
This forms the core of the API, but there are additional features in development, it's best to see the polyfill code.
Applications may want to further limit how policies are created; We propose to allow for allow-listing policy names in a CSP, e.g. in a following fashion:
Content-Security-Policy: trusted-types foo bar
That will assure that no additional policies are created at runtime. Creating a policy with a name
that was already created, or was not specified in the CSP throws, so introduction of non-reviewed
policies breaks the application functionally. There's also an escape hatch - 'allow-duplicate'
CSP keyword that allows the applications to create a given policy multiple times (that's useful
if a dependency is used twice in an application).
One of the policies the application may create is special, in that it allows to use strings with the injection sinks. These strings would be passed to a single user-defined policy that sanitizes the value or rejects it. The intention is to allow for a gradual migration of the code from strings towards Trusted Types. Please check the specification draft for details.
Using javascript:
URLs as a payload for DOM XSS exploitation is quite common. At the same time,
there are many sinks in the platform that accept URLs, and it would be prohibitive for the authors to have to r
rewrite all of their HTMLAnchorElement.href
assignments only because a javascript:
URL could be used.
Instead of that we propose a simple workaround - with Trusted Types enforcement (require-trusted-types-for 'script'
)
navigation to javascript:
URLs will be guarded via a default policy mechanism. Commonly, they will simply stop working.
To reenable them, the application needs to create a default policy that allows it to control the code before it
executes like so:
trustedTypes.createPolicy('default', {
createScript: payload => {
if (payload === 'void(0)') { // javascript:void(0) navigation or, e.g. eval('void(0)')
return 'void(0)';
} // returning undefined rejects a value and stops navigation.
}
});
This mechanism complements CSP's 'unsafe-inline'
, allowing the authors to enable strong security
controls in their application even if it occasionally uses javascript:
URLs for legitimate purposes.
-
HTML Contexts: Given something like
typedef (DOMString or TrustedHTML) HTMLString
, we'd poke at a number of methods and attribute setters to accept the new type:partial interface Element { attribute HTMLString innerHTML; attribute HTMLString outerHTML; void insertAdjacentHTML(DOMString position, HTMLString text); };
partial interface Document { void write(HTMLString text); void writeln(HTMLString text); };
partial interface DOMParser { Document parseFromString(HTMLString str, SupportedType type); };
partial interface Range { DocumentFragment createContextualFragment(HTMLString fragment); };
partial interface HTMLIFrameElement { DOMString srcdoc; };
-
Script URL Context: Given something like
typedef (USVString or TrustedScriptURL) ScriptURLString
, we'd poke at a number of methods and attribute setters to accept the new type:partial interface WorkerGlobalScope { void importScripts(ScriptURLString... urls); };
// A few element types go here. `HTMLEmbedElement`, `HTMLScriptElement` // from a quick skim through HTML. // // The same applies to their SVG variants. partial interface HTMLXXXElement : HTMLElement { attribute ScriptURLString src; };
-
JavaScript Contexts: Replace
DOMString
in the following with something reasonable.partial interface Window { void eval(DOMString code); void setTimeout(DOMString code, int timeout); void setInterval(DOMString code, int timeout); };
partial interface HTMLScriptElement : HTMLElement { attribute DOMString innerText; attribute DOMString text; attribute DOMString textContent; };
With the API described as above, the application may protect itself against DOM XSS using the following approach:
-
Identify the places where the injection sinks are being used (e.g. with
Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri /csp
). Apart frominnerHTML
, these are usually places responsible for dynamic script loading, JSONP, or HTML sanitization and templating. -
Rewrite those places to use Trusted Types instead, via dedicated policies. Where appropriate, move the sanitization and filtering logic to the policies. Where possible, enable the use of policies in your dependencies and rewrite legacy code not to use the sinks when unneccessary.
-
(Optional) Create a default policy to address direct sink usage in 3rd party dependencies.
-
Enforce Trusted Types at DOM XSS sinks, changing the report-only CSP to an enforcing one. From now on only the trusted types policies can introduce DOM XSS.
-
(Optional) Guard policy creation by using
trusted-types
directive.