1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #include "base/command_line.h" 6 #include "base/containers/hash_tables.h" 7 #include "content/browser/dom_storage/dom_storage_context_wrapper.h" 8 #include "content/browser/dom_storage/session_storage_namespace_impl.h" 9 #include "content/browser/renderer_host/render_view_host_factory.h" 10 #include "content/browser/renderer_host/render_view_host_impl.h" 11 #include "content/browser/web_contents/web_contents_impl.h" 12 #include "content/common/view_messages.h" 13 #include "content/public/browser/browser_context.h" 14 #include "content/public/browser/notification_service.h" 15 #include "content/public/browser/notification_types.h" 16 #include "content/public/browser/storage_partition.h" 17 #include "content/public/common/content_switches.h" 18 #include "content/public/test/browser_test_utils.h" 19 #include "content/public/test/test_utils.h" 20 #include "content/shell/browser/shell.h" 21 #include "content/test/content_browser_test.h" 22 #include "content/test/content_browser_test_utils.h" 23 24 namespace content { 25 26 namespace { 27 28 // This is a helper function for the tests which attempt to create a 29 // duplicate RenderViewHost or RenderWidgetHost. It tries to create two objects 30 // with the same process and routing ids, which causes a collision. 31 // It creates a couple of windows in process 1, which causes a few routing ids 32 // to be allocated. Then a cross-process navigation is initiated, which causes a 33 // new process 2 to be created and have a pending RenderViewHost for it. The 34 // routing id of the RenderViewHost which is target for a duplicate is set 35 // into |target_routing_id| and the pending RenderViewHost which is used for 36 // the attempt is the return value. 37 RenderViewHostImpl* PrepareToDuplicateHosts(Shell* shell, 38 int* target_routing_id) { 39 GURL foo("http://foo.com/files/simple_page.html"); 40 41 // Start off with initial navigation, so we get the first process allocated. 42 NavigateToURL(shell, foo); 43 44 // Open another window, so we generate some more routing ids. 45 ShellAddedObserver shell2_observer; 46 EXPECT_TRUE(ExecuteScript( 47 shell->web_contents(), "window.open(document.URL + '#2');")); 48 Shell* shell2 = shell2_observer.GetShell(); 49 50 // The new window must be in the same process, but have a new routing id. 51 EXPECT_EQ(shell->web_contents()->GetRenderViewHost()->GetProcess()->GetID(), 52 shell2->web_contents()->GetRenderViewHost()->GetProcess()->GetID()); 53 *target_routing_id = 54 shell2->web_contents()->GetRenderViewHost()->GetRoutingID(); 55 EXPECT_NE(*target_routing_id, 56 shell->web_contents()->GetRenderViewHost()->GetRoutingID()); 57 58 // Now, simulate a link click coming from the renderer. 59 GURL extension_url("https://bar.com/files/simple_page.html"); 60 WebContentsImpl* wc = static_cast<WebContentsImpl*>(shell->web_contents()); 61 wc->RequestOpenURL( 62 shell->web_contents()->GetRenderViewHost(), extension_url, 63 Referrer(), CURRENT_TAB, wc->GetFrameTree()->root()->frame_id(), 64 false, true); 65 66 // Since the navigation above requires a cross-process swap, there will be a 67 // pending RenderViewHost. Ensure it exists and is in a different process 68 // than the initial page. 69 RenderViewHostImpl* pending_rvh = 70 wc->GetRenderManagerForTesting()->pending_render_view_host(); 71 EXPECT_TRUE(pending_rvh != NULL); 72 EXPECT_NE(shell->web_contents()->GetRenderViewHost()->GetProcess()->GetID(), 73 pending_rvh->GetProcess()->GetID()); 74 75 return pending_rvh; 76 } 77 78 } // namespace 79 80 81 // The goal of these tests will be to "simulate" exploited renderer processes, 82 // which can send arbitrary IPC messages and confuse browser process internal 83 // state, leading to security bugs. We are trying to verify that the browser 84 // doesn't perform any dangerous operations in such cases. 85 class SecurityExploitBrowserTest : public ContentBrowserTest { 86 public: 87 SecurityExploitBrowserTest() {} 88 virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE { 89 ASSERT_TRUE(test_server()->Start()); 90 91 // Add a host resolver rule to map all outgoing requests to the test server. 92 // This allows us to use "real" hostnames in URLs, which we can use to 93 // create arbitrary SiteInstances. 94 command_line->AppendSwitchASCII( 95 switches::kHostResolverRules, 96 "MAP * " + test_server()->host_port_pair().ToString() + 97 ",EXCLUDE localhost"); 98 } 99 }; 100 101 // Ensure that we kill the renderer process if we try to give it WebUI 102 // properties and it doesn't have enabled WebUI bindings. 103 IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, SetWebUIProperty) { 104 GURL foo("http://foo.com/files/simple_page.html"); 105 106 NavigateToURL(shell(), foo); 107 EXPECT_EQ(0, 108 shell()->web_contents()->GetRenderViewHost()->GetEnabledBindings()); 109 110 content::WindowedNotificationObserver terminated( 111 content::NOTIFICATION_RENDERER_PROCESS_CLOSED, 112 content::NotificationService::AllSources()); 113 shell()->web_contents()->GetRenderViewHost()->SetWebUIProperty( 114 "toolkit", "views"); 115 terminated.Wait(); 116 } 117 118 // This is a test for crbug.com/312016 attempting to create duplicate 119 // RenderViewHosts. SetupForDuplicateHosts sets up this test case and leaves 120 // it in a state with pending RenderViewHost. Before the commit of the new 121 // pending RenderViewHost, this test case creates a new window through the new 122 // process. 123 IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, 124 AttemptDuplicateRenderViewHost) { 125 int duplicate_routing_id = MSG_ROUTING_NONE; 126 RenderViewHostImpl* pending_rvh = 127 PrepareToDuplicateHosts(shell(), &duplicate_routing_id); 128 EXPECT_NE(MSG_ROUTING_NONE, duplicate_routing_id); 129 130 // Since this test executes on the UI thread and hopping threads might cause 131 // different timing in the test, let's simulate a CreateNewWindow call coming 132 // from the IO thread. 133 ViewHostMsg_CreateWindow_Params params; 134 DOMStorageContextWrapper* dom_storage_context = 135 static_cast<DOMStorageContextWrapper*>( 136 BrowserContext::GetStoragePartition( 137 shell()->web_contents()->GetBrowserContext(), 138 pending_rvh->GetSiteInstance())->GetDOMStorageContext()); 139 scoped_refptr<SessionStorageNamespaceImpl> session_storage( 140 new SessionStorageNamespaceImpl(dom_storage_context)); 141 // Cause a deliberate collision in routing ids. 142 int main_frame_routing_id = duplicate_routing_id + 1; 143 pending_rvh->CreateNewWindow( 144 duplicate_routing_id, main_frame_routing_id, params, session_storage); 145 146 // If the above operation doesn't cause a crash, the test has succeeded! 147 } 148 149 // This is a test for crbug.com/312016. It tries to create two RenderWidgetHosts 150 // with the same process and routing ids, which causes a collision. It is almost 151 // identical to the AttemptDuplicateRenderViewHost test case. 152 IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, 153 AttemptDuplicateRenderWidgetHost) { 154 int duplicate_routing_id = MSG_ROUTING_NONE; 155 RenderViewHostImpl* pending_rvh = 156 PrepareToDuplicateHosts(shell(), &duplicate_routing_id); 157 EXPECT_NE(MSG_ROUTING_NONE, duplicate_routing_id); 158 159 // Since this test executes on the UI thread and hopping threads might cause 160 // different timing in the test, let's simulate a CreateNewWidget call coming 161 // from the IO thread. Use the existing window routing id to cause a 162 // deliberate collision. 163 pending_rvh->CreateNewWidget(duplicate_routing_id, blink::WebPopupTypeSelect); 164 165 // If the above operation doesn't crash, the test has succeeded! 166 } 167 168 } // namespace content 169