TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Blocking Top-Level Navigations to Data URLs for Firefox 58

118 pointsby mgliwkaover 7 years ago

10 comments

eridiusover 7 years ago
Wouldn't it make more sense just to fix the URL bar to make data URIs look different? You could even go to the extreme of making it just show "data:…" and requiring you to put focus on it to find out the full URI.
评论 #15821604 未加载
discreditableover 7 years ago
I'm glad they aren't blocking explicit entries. This morning I discovered I could quickly send snippets of text to my phone by writing it as a data uri and sending the tab via Fx sync.
评论 #15819900 未加载
评论 #15819486 未加载
评论 #15838934 未加载
tetromino_over 7 years ago
Depending on how exactly this block works, it may break an important functionality of our application :&#x2F;<p>We generate SVG graphs in the browser, and have a button with a data:image&#x2F;svg+xml URL to allow users to download these graphs, for example to include in a publication.
评论 #15820300 未加载
daurnimatorover 7 years ago
Hrm, I think this will block the only data uri I use: the &#x27;this form&#x27; button on <a href="http:&#x2F;&#x2F;sprunge.us&#x2F;" rel="nofollow">http:&#x2F;&#x2F;sprunge.us&#x2F;</a>
评论 #15821896 未加载
badrabbitover 7 years ago
Thank you so much for this mozilla. It is ridiculously easy to trick even tech savvy users with a data: uri phish.
theandrewbaileyover 7 years ago
Hopefully data:image&#x2F; still works for favicons. Embedding a highly compressible ~450 byte string in HTML is faster than issuing a new request, under most instances.
评论 #15820186 未加载
评论 #15828414 未加载
chriswarboover 7 years ago
Does anyone have a (non-malicious) example of this sort of &quot;attack&quot;? I don&#x27;t quite get it; some people are mentioning Javascript, but the description sounds more like a phishing, e.g. `data:text&#x2F;html;base64,MyBank.com&#x2F;account&#x2F;xxxxx`<p>Presumably such leading junk is hidden in the rendered page, making the user think they&#x27;re on MyBank.com?
评论 #15820921 未加载
评论 #15820906 未加载
评论 #15823087 未加载
jancsikaover 7 years ago
&gt; Opening “data:image&#x2F;*” in top-level window, unless it’s “data:image&#x2F;svg+xml”<p>Just curious-- why the exception for svg?
评论 #15819910 未加载
eximiusover 7 years ago
Hm. But will I still be able to open them from the developer console...?
risover 7 years ago
I&#x27;m trying to figure out if this will kill Bookmarklets (<a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Bookmarklet" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Bookmarklet</a>)
评论 #15819371 未加载