From dc564b9b59d67bc32f17097f5086b38e24bbec78 Mon Sep 17 00:00:00 2001
From: Domenic Denicola
Date: Mon, 8 May 2023 18:48:58 -0400
Subject: [PATCH] Do not do same-URL replace navigations when initiated
cross-origin
This allows attackers to do a boolean probe on the URL of a cross-origin iframe, by attempting to navigate it to a given URL, and if history.length does not increase, they know that the iframe is currently pointed to that URL.
Closes #2018, at least the actionable part where you can get more information than just what is retrieved using the load event.
---
source | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/source b/source
index 2f570282645..3a2d5b56947 100644
--- a/source
+++ b/source
@@ -91851,7 +91851,9 @@ location.href = '#foo';
url's scheme is "javascript
"; or