Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Have Trusted Types API built directly into the jQuery Core Files #4409

Closed
ghost opened this issue May 27, 2019 · 24 comments · Fixed by #4927
Closed

Have Trusted Types API built directly into the jQuery Core Files #4409

ghost opened this issue May 27, 2019 · 24 comments · Fixed by #4927

Comments

@ghost
Copy link

ghost commented May 27, 2019

The latest version of jQuery V3.4.1 has 5 innerHTML() which are not sanitized by default. Does the jQuery team plan on addressing these DOM XSS things in the near future with regards to the new Trusted Types API see here: https://github.com/WICG/trusted-types

@mgol
Copy link
Member

mgol commented May 27, 2019

Thanks for the report. What would you expect jQuery to do here?

@mgol
Copy link
Member

mgol commented May 27, 2019

Note, though, that jQuery doesn't support experimental APIs as they may change and then we're left with obsolete code. It's fine to experiment & think of the approaches but we'd wait with landing any actual code in the library for the spec to stabilize & to be implemented in at least 2 major browser engines.

@dmethvin
Copy link
Member

Yeah, this is a tough one. The team has discussed it for years and had issues determining how to make things safer without seriously redesigning the API. Most of our HTML goes through jQuery.parseHTML() and jQuery.htmlPrefilter() so it is currently possible to try and sanitize through that. There's the one fast path for .html(string) that assigns directly to .innerHTML but that already goes through the prefilter and could just be taken out if needed. The others are Sizzle feature checks for browsers we won't support in 4.0 anyway.

Perhaps we could recognize a Trusted Type and pass it through as if were HTML, but not actually do any manipulation with it, e.g. $("div").append(someTrustedType). (As an aside, I would hope that a Trusted Type doesn't return an HTML representation when you call .toString() on it.)

Seems like they've taken old browsers into account with a simple polyfill that just returns strings if the browser doesn't support Trusted Types.

But given where the implementations are at, it is probably too early to add any code.

@ghost
Copy link
Author

ghost commented May 27, 2019

I will add an extra comment as you added a 'needs info' label. I totally understand that the Trusted Types API is right now in a trial. I thought maybe this issue could be dealt with in your future updates like in V4.0.0 and by then the API would have changed from a trial / draft spec to a more stable spec.

When I did a quick play around with Trusted Types API and jQuery V3.4.1 I got the following results:

58434496-dc989800-80b3-11e9-9f2f-2eabe3d329a4

DomPurifer have added this API see here for further details: https://github.com/cure53/DOMPurify#what-about-dompurify-and-trusted-types

I can't really say anymore and leave this issue open to other people to comment and add extra info and ideas.

I feel it would be a good feature request for jQuery in the near future and decided to open this issue in that regard. We all know about this problem for a long time, but a full solution has never been added yet.

@mgol mgol added this to the 4.0.0 milestone Jun 3, 2019
@mgol
Copy link
Member

mgol commented Jun 3, 2019

I added it to the 4.0.0 milestone so that we don’t forget about it when we get closer to the release.

@timmywil
Copy link
Member

I'm in favor of this. We'll keep an eye on the spec status and revisit later.

@mgol
Copy link
Member

mgol commented May 26, 2020

angular/angular.js#17028 has some code that I'd like to backport to jQuery, at least to the master branch. It might be hard to do on the 3.x line as IE 9 needs the existing approach so we'd have to fork logic, increasing the size significantly which we usually try to avoid.

@koto
Copy link

koto commented May 27, 2020

Bringing in the comment from angular/angular.js#17028

I've been thinking about including similar improvements [Trusted Types support] to jQuery. AngularJS has included code specific to APIs not available cross-browser like Chrome apps and now possibly trusted types but jQuery has historically avoided such things. Avoiding innerHTML for wrapping like done in this PR would work but we wouldn't want to mention the TrustedHTML constructor explicitly as long as it's a Blink-only feature.

To clarify, TT are intended to be rolled out as a regular web API, but you're correct - for now this is only implemented in Blink (and polyfilled in other browsers).

Do you think there's any other way to support this use case without mentioning any trusted types API explicitly? I'm asking here as if it's possible maybe the same technique could be applied here. If you prefer to continue this part of the discussion on the jQuery side, there's an open issue about trusted types support: #4409.

In general most of jQuery APIs seem to fit well into what we call "tt-agnostic" bucket. In other words, they should be able to accept TT instances (in place of strings) and pass them without modification to DOM.

Some of jQuery behavior violates that. For example, some of the tag wrapping code + self-closing tag expansion that was just changed due to XSS issues. Large parts of these patterns could be gated on browser checks, especially if they workaround some legacy browser behavior.

Some things still remain though, e.g. jQuery IIRC still expands <script> nodes and tries to execute them separately -- and in general jQuery APIs are quite polymorphic, trying to detect the parameter type and do the appropriate thing (jQuery()function for example is very much like that). This paradigm may make it difficult to untangle and simply add support for a new value type, as you might often collide with types already passed to your functions in the wild.

Usually there is a way to become tt-agnostic with no backward compatibility issues without referencing TrustedTypes at all, as DOM APIs are very rarely called with Objects, and Trusted Type instances are Objects. Unfortunately, jQuery offers a very limited API for jQuery(plainObject) case. The only way I see is to not recognise TrustedTypes as isPlainObjects and introduce a branch for "immutable HTML objects" in jQuery(), opting them out of modifications. But this requires referencing TT.

Adding such support should not cause b/w compatibility issues, as it's simply a new way of using jQuery APIs (one that happens not to violate TT restrictions that might be present in your CSP), that some applications may use. I'm confident that with relatively small changes we might be able to support most use cases.

That said, I'm a bit skeptical all applications using jQuery could migrate to "TT mode" by a single configuration switch. Quite likely some jQuery functions would have to change the behavior, error out, or produce types internally when called with Trusted Types (script node reparsing comes to mind). It's a judgement call on how to treat each of the cases like this. For example, perhaps jQuery customer could configure it with a policy to call when it needs to change HTML - giving users a hook to sanitize the resulting HTML. You could call it a htmlPostFilter function and not reference TT there at all. But some things (e.g. cross-frame issues) will likely remain incompatible with TT, and would need a change in the application.

One important thing to note is that TT should not be treated as "better strings for HTML", and you should never return a Trusted Type when the caller expects a string - we got bit by this when making DOMPurify.sanitizereturn a TrustedHTML, that broke projects that called DOMPurify.sanitize(foo).replace - a method that does not exist. But jQuery, to my understanding should not return a Trusted Type, but rather accept it (or, perhaps produce it and use internally).

I'm happy to help with fleshing out the integration, or even brainstorming about issues with one. While I don't have tons experience with recent jQuery, we have done our share of TT integrations already and know some best practices and antipatterns. What would be the next best steps?

@mgol
Copy link
Member

mgol commented May 29, 2020

@koto Thanks for a detailed comment!

In general most of jQuery APIs seem to fit well into what we call "tt-agnostic" bucket. In other words, they should be able to accept TT instances (in place of strings) and pass them without modification to DOM.

Some of jQuery behavior violates that. For example, some of the tag wrapping code + self-closing tag expansion that was just changed due to XSS issues.

Fortunately, that function has been changed to an identity function in jQuery 3.5.0 so it'd no longer break a trusted type wrapped HTML.

Large parts of these patterns could be gated on browser checks, especially if they workaround some legacy browser behavior.

There's an important aspect here. jQuery generally avoids browser detection, instead opting for support tests. The master branch doesn't contain a lot of them right now as most were meant for IE which we now just detect via document.documentMode but that's the only browser sniffing we accept (as IE is feature-dead so the risk is low). Those feature tests sometimes need to use innerHTML-based assignments, see e.g. this test for a Safari 8 issue:
https://github.com/jquery/jquery/blob/3.5.1/src/core/support.js#L13-L17
While we don't have many tests like that - and none on master at the moment, we can't be sure there won't be a need for a new one in the future.

We already had to be careful here due to CSP issues which we test for:
https://github.com/jquery/jquery/blob/3.5.1/test/unit/support.js#L40-L55
but it doesn't block innerHTML as a whole which Trusted Types enforcement would do.

I feel this is a more generic issue with CSP, though: what we need is a way to run support tests in a secure way that's not blocked by CSP. The environment where we run them could be isolated from the real webpage in which case there would be no security risk even if we used inline code, raw HTML strings, etc. Is it likely we'll get something like that?

Some things still remain though, e.g. jQuery IIRC still expands <script> nodes and tries to execute them separately

That's a good argument for us to stop doing that by default in jQuery 4. This would be a significant breaking change, though, so we'd still need to add a non-default way to keep the old behavior.

Usually there is a way to become tt-agnostic with no backward compatibility issues without referencing TrustedTypes at all, as DOM APIs are very rarely called with Objects, and Trusted Type instances are Objects. Unfortunately, jQuery offers a very limited API for jQuery(plainObject) case. The only way I see is to not recognise TrustedTypes as isPlainObjects and introduce a branch for "immutable HTML objects" in jQuery(), opting them out of modifications. But this requires referencing TT.

This API only accepts plain objects, though. We could perhaps make that explicit & treat non-plain objects in a different manner. The only issue is that the jQuery() function mostly serves two purposes: as a shortcut of jQuery(cssSelector) to $(document).find(cssSelector) and as a mechanism to create new elements representing a provided HTML string which more or less depends on whether the string starts with <, possibly preceded by whitespace:
https://github.com/jquery/jquery/blob/3.5.1/src/core/init.js#L36-L41
or:
https://github.com/jquery/jquery/blob/3.5.1/src/core/init.js#L50-L51
This is such a fundamental property of the library that it's impossible to give up on this polymorphism. Maybe it's not an issue since trusted HTML stringifies to the underlying HTML, though, we'd just need to cast it to string before running the checks?

I feel a bit uneasy to explicitly mention the API in jQuery source; we've seen it a few times that APIs only supported by one browser may disappear or change significantly before being accepted accross all the major engines and then we'd often have to support both the old & new APIs. I'd like to first research how far we can go without relying on the API explicitly.

I'm happy to help with fleshing out the integration, or even brainstorming about issues with one. While I don't have tons experience with recent jQuery, we have done our share of TT integrations already and know some best practices and antipatterns. What would be the next best steps?

I think I'll first backport the AngularJS changes to jQuery master & then the next step would be to try to fix the jQuery() method to not break on trusted types via means I described above. For now I'd focus on the master branch; if we make it there, we could consider whether that's possible to backport to the 3.x line, although I'm a bit skeptical here.

It'd also help if we had an answer for how to handle support tests in a secure, CSP-compliant way; in particular, if we can get any browser APIs that would allow them to run in a sandboxed environment even with CSP enabled.

mgol added a commit that referenced this issue May 31, 2020
Concatenating HTML strings in buildFragment is a possible security risk as it
creates an opportunity of escaping the concatenated wrapper. It also makes it
impossible to support secure HTML wrappers like
[trusted types](https://web.dev/trusted-types/). It's safer to create wrapper
elements using `document.createElement` & `appendChild`.

The previous way was needed in jQuery <4 because IE <10 doesn't accept table
parts set via `innerHTML`, even if the element which contents are set is
a proper table element, e.g.:
```js
tr.innerHTML = "<td></td>";
```
The whole structure needs to be passed in one HTML string. jQuery 4 drops
support for IE <11 so this is no longer an issue; in older version we'd have to
duplicate the code paths.

IE <10 needed to have `<option>` elements wrapped in
`<select multiple="multiple">` but we no longer need that on master which makes
the `document.createElement` way shorter.

jQuery 1.x sometimes needed to have more than one element in the wrapper that
would precede parts wrapping HTML input so descending needed to use `lastChild`.
Since all wrappers are single-element now, we can use `firstChild` which
compresses better as it's used in other places in the code as well.

All these improvements, apart from making logic more secure, decrease the
gzipped size by 55 bytes.

Ref gh-4409
@mgol mgol mentioned this issue May 31, 2020
Closed
@mgol
Copy link
Member

mgol commented May 31, 2020

The first PR (backporting some AngularJS changes) is ready for review at #4724.

mgol added a commit to mgol/jquery that referenced this issue May 31, 2020
Concatenating HTML strings in buildFragment is a possible security risk as it
creates an opportunity of escaping the concatenated wrapper. It also makes it
impossible to support secure HTML wrappers like
[trusted types](https://web.dev/trusted-types/). It's safer to create wrapper
elements using `document.createElement` & `appendChild`.

The previous way was needed in jQuery <4 because IE <10 doesn't accept table
parts set via `innerHTML`, even if the element which contents are set is
a proper table element, e.g.:
```js
tr.innerHTML = "<td></td>";
```
The whole structure needs to be passed in one HTML string. jQuery 4 drops
support for IE <11 so this is no longer an issue; in older version we'd have to
duplicate the code paths.

IE <10 needed to have `<option>` elements wrapped in
`<select multiple="multiple">` but we no longer need that on master which makes
the `document.createElement` way shorter.

jQuery 1.x sometimes needed to have more than one element in the wrapper that
would precede parts wrapping HTML input so descending needed to use `lastChild`.
Since all wrappers are single-element now, we can use `firstChild` which
compresses better as it's used in other places in the code as well.

All these improvements, apart from making logic more secure, decrease the
gzipped size by 55 bytes.

Ref jquerygh-4409
mgol added a commit to mgol/jquery that referenced this issue Jun 1, 2020
Concatenating HTML strings in buildFragment is a possible security risk as it
creates an opportunity of escaping the concatenated wrapper. It also makes it
impossible to support secure HTML wrappers like
[trusted types](https://web.dev/trusted-types/). It's safer to create wrapper
elements using `document.createElement` & `appendChild`.

The previous way was needed in jQuery <4 because IE <10 doesn't accept table
parts set via `innerHTML`, even if the element which contents are set is
a proper table element, e.g.:
```js
tr.innerHTML = "<td></td>";
```
The whole structure needs to be passed in one HTML string. jQuery 4 drops
support for IE <11 so this is no longer an issue; in older version we'd have to
duplicate the code paths.

IE <10 needed to have `<option>` elements wrapped in
`<select multiple="multiple">` but we no longer need that on master which makes
the `document.createElement` way shorter as we don't have to call
`setAttribute`.

jQuery 1.x sometimes needed to have more than one element in the wrapper that
would precede parts wrapping HTML input so descending needed to use `lastChild`.
Since all wrappers are single-element now, we can use `firstChild` which
compresses better as it's used in other places in the code as well.

All these improvements, apart from making logic more secure, decrease the
gzipped size by 55 bytes.

Ref jquerygh-4409
mgol added a commit to mgol/jquery that referenced this issue Jun 1, 2020
Concatenating HTML strings in buildFragment is a possible security risk as it
creates an opportunity of escaping the concatenated wrapper. It also makes it
impossible to support secure HTML wrappers like
[trusted types](https://web.dev/trusted-types/). It's safer to create wrapper
elements using `document.createElement` & `appendChild`.

The previous way was needed in jQuery <4 because IE <10 doesn't accept table
parts set via `innerHTML`, even if the element which contents are set is
a proper table element, e.g.:
```js
tr.innerHTML = "<td></td>";
```
The whole structure needs to be passed in one HTML string. jQuery 4 drops
support for IE <11 so this is no longer an issue; in older version we'd have to
duplicate the code paths.

IE <10 needed to have `<option>` elements wrapped in
`<select multiple="multiple">` but we no longer need that on master which makes
the `document.createElement` way shorter as we don't have to call
`setAttribute`.

jQuery 1.x sometimes needed to have more than one element in the wrapper that
would precede parts wrapping HTML input so descending needed to use `lastChild`.
Since all wrappers are single-element now, we can use `firstChild` which
compresses better as it's used in other places in the code as well.

All these improvements, apart from making logic more secure, decrease the
gzipped size by 55 bytes.

Ref jquerygh-4409
Ref angular/angular.js#17028
@koto
Copy link

koto commented Jun 3, 2020

Large parts of these patterns could be gated on browser checks, especially if they workaround some legacy browser behavior.

There's an important aspect here. jQuery generally avoids browser detection, instead opting for support tests. The master branch doesn't contain a lot of them right now as most were meant for IE which we now just detect via document.documentMode but that's the only browser sniffing we accept (as IE is feature-dead so the risk is low). Those feature tests sometimes need to use innerHTML-based assignments, see e.g. this test for a Safari 8 issue:
https://github.com/jquery/jquery/blob/3.5.1/src/core/support.js#L13-L17
While we don't have many tests like that - and none on master at the moment, we can't be sure there won't be a need for a new one in the future.

Understood. There's always a possibility that innerHTML (or other TT-conflicting functions) may be necessary to feature test a browser bug, but for the most part perhaps some of this could be gated on another feature test (e.g.documentMode for IE family). It's hard to predict without having a specific bug in mind, but -- potentially -- perhaps some of such problematic tests might be skipped in configuration. I see the problem though, thanks for the context.

We already had to be careful here due to CSP issues which we test for:
https://github.com/jquery/jquery/blob/3.5.1/test/unit/support.js#L40-L55
but it doesn't block innerHTML as a whole which Trusted Types enforcement would do.

I feel this is a more generic issue with CSP, though: what we need is a way to run support tests in a secure way that's not blocked by CSP. The environment where we run them could be isolated from the real webpage in which case there would be no security risk even if we used inline code, raw HTML strings, etc. Is it likely we'll get something like that?

I'm not sure I understand fully the use case here. Is this about production code doing feature testing that clashes with some CSP restrictions, or being able to configure the test environment easily? Can you reduce it to the smallest code snippet to distill the issue? In any case, browser changes take years to deploy, so it's not great either way :/

Some things still remain though, e.g. jQuery IIRC still expands <script> nodes and tries to execute them separately

That's a good argument for us to stop doing that by default in jQuery 4. This would be a significant breaking change, though, so we'd still need to add a non-default way to keep the old behavior.

Understood. In general I think we can't get away with some configuration settings to control the behavior - after all, the whole idea is to reduce the attack surface, so it feels OK if jQuery users could voluntarily simply turn off the settings they don't need or find problematic. Trusted Types are here just an easy way of surfacing those risky areas. The exact shape of the configuration and what should the defaults be is of course decided by library owners.

This API only accepts plain objects, though. We could perhaps make that explicit & treat non-plain objects in a different manner.

The problem I'm seeing is I don't know how to distinguish POJO (or even typed objects) from Trusted Type objects without literally having TrustedHTML somewhere in the codebase. Calling a constructor for TT throws, so that's some indication, but perhaps calling a constructor for each non-string, non-element is too aggressive.

One of the ideas of making the lib TT agnostic would be e.g. allowing the users to specify which types they want jQuery to passthrough:

$.addPassThroughHtmlType(TrustedHTML)

and then jQuery would just make a for loop with instanceof checks to determine if jQuery(object) branch or jQuery(passthroughHtml) should be used.

Maybe it's not an issue since trusted HTML stringifies to the underlying HTML, though, we'd just need to cast it to string before running the checks?

If you're sure an object with a toString function was never used as a jQuery(object) case, that would work too. For POJO, it's simple, but there might be some backwards compatibility issue if typed objects (e.g. with a toString function) are actually used.

I feel a bit uneasy to explicitly mention the API in jQuery source; we've seen it a few times that APIs only supported by one browser may disappear or change significantly before being accepted accross all the major engines and then we'd often have to support both the old & new APIs.

Of course, no disagreements here - if it turns out feasible, that's ideal.

It'd also help if we had an answer for how to handle support tests in a secure, CSP-compliant way; in particular, if we can get any browser APIs that would allow them to run in a sandboxed environment even with CSP enabled.

I want to hear more about that. I'm not sure I'm answering the right question here, but there is a way to "break-out" of CSP restrictions, including Trusted Types. You either iframe a separate document that was loaded from a server (CSPs don't inherit), or iframe a Blob: URL (CSP bug). That gives you a fresh environment.

Slightly tangential to this, we were considering exposing a JS API to probe for the current CSP restrictions (https://w3c.github.io/webappsec-csp/api/ and w3c/trusted-types#36), but we did not have strong enough use cases for this.

mgol added a commit to mgol/jquery that referenced this issue Jun 5, 2020
Concatenating HTML strings in buildFragment is a possible security risk as it
creates an opportunity of escaping the concatenated wrapper. It also makes it
impossible to support secure HTML wrappers like
[trusted types](https://web.dev/trusted-types/). It's safer to create wrapper
elements using `document.createElement` & `appendChild`.

The previous way was needed in jQuery <4 because IE <10 doesn't accept table
parts set via `innerHTML`, even if the element which contents are set is
a proper table element, e.g.:
```js
tr.innerHTML = "<td></td>";
```
The whole structure needs to be passed in one HTML string. jQuery 4 drops
support for IE <11 so this is no longer an issue; in older version we'd have to
duplicate the code paths.

IE <10 needed to have `<option>` elements wrapped in
`<select multiple="multiple">` but we no longer need that on master which makes
the `document.createElement` way shorter as we don't have to call
`setAttribute`.

jQuery 1.x sometimes needed to have more than one element in the wrapper that
would precede parts wrapping HTML input so descending needed to use `lastChild`.
Since all wrappers are single-element now, we can use `firstChild` which
compresses better as it's used in other places in the code as well.

All these improvements, apart from making logic more secure, decrease the
gzipped size by 55 bytes.

Ref jquerygh-4409
Ref angular/angular.js#17028
@mgol
Copy link
Member

mgol commented Jun 5, 2020

We already had to be careful here due to CSP issues which we test for:
/test/unit/support.js@3.5.1#L40-L55
but it doesn't block innerHTML as a whole which Trusted Types enforcement would do.
I feel this is a more generic issue with CSP, though: what we need is a way to run support tests in a secure way that's not blocked by CSP. The environment where we run them could be isolated from the real webpage in which case there would be no security risk even if we used inline code, raw HTML strings, etc. Is it likely we'll get something like that?

I'm not sure I understand fully the use case here. Is this about production code doing feature testing that clashes with some CSP restrictions, or being able to configure the test environment easily? Can you reduce it to the smallest code snippet to distill the issue? In any case, browser changes take years to deploy, so it's not great either way :/

One example is the test case I provided before: https://github.com/jquery/jquery/blob/3.5.1/src/core/support.js#L13-L17. It's a test for a Safari 8 issue and it requires innerHTML usage to detect a bug as it's a bug in HTML serialization logic in Safari. The function should return true but it returns false in Safari 8.

Things like that would be impossible on pages that enforce trusted types via CSP right now. I feel that browsers need an API that would allow to bypass CSP for test cases like that in a secure way (i.e. no access to cookies/other types of storage, to the current DOM, etc.).

...unless this works:

I want to hear more about that. I'm not sure I'm answering the right question here, but there is a way to "break-out" of CSP restrictions, including Trusted Types. You either iframe a separate document that was loaded from a server (CSPs don't inherit), or iframe a Blob: URL (CSP bug). That gives you a fresh environment.

Since this is a library we can't really load anything else from the server other than what the user already loads but if an iframe with a blob URL works, that's worth checking for a potential future use.

This API only accepts plain objects, though. We could perhaps make that explicit & treat non-plain objects in a different manner.

The problem I'm seeing is I don't know how to distinguish POJO (or even typed objects) from Trusted Type objects without literally having TrustedHTML somewhere in the codebase. Calling a constructor for TT throws, so that's some indication, but perhaps calling a constructor for each non-string, non-element is too aggressive.

jQuery has a $.isPlainObject API for such purposes:

jquery/src/core.js

Lines 202 to 221 in 40c3abd

isPlainObject: function( obj ) {
var proto, Ctor;
// Detect obvious negatives
// Use toString instead of jQuery.type to catch host objects
if ( !obj || toString.call( obj ) !== "[object Object]" ) {
return false;
}
proto = getProto( obj );
// Objects with no prototype (e.g., `Object.create( null )`) are plain
if ( !proto ) {
return true;
}
// Objects with prototype are plain iff they were constructed by a global Object function
Ctor = hasOwn.call( proto, "constructor" ) && proto.constructor;
return typeof Ctor === "function" && fnToString.call( Ctor ) === ObjectFunctionString;
},

It's true we have to be mindful about performance but this API is already used in another place in the jQuery.fn.init code so it might be doable.

One of the ideas of making the lib TT agnostic would be e.g. allowing the users to specify which types they want jQuery to passthrough:

$.addPassThroughHtmlType(TrustedHTML)

and then jQuery would just make a for loop with instanceof checks to determine if jQuery(object) branch or jQuery(passthroughHtml) should be used.

I think at the beginning I'd try to do it without explicit hatches like that to increase probability of at least some jQuery plugins working with trusted types out of the box but I'll keep this in mind if that doesn't work.

Maybe it's not an issue since trusted HTML stringifies to the underlying HTML, though, we'd just need to cast it to string before running the checks?

If you're sure an object with a toString function was never used as a jQuery(object) case, that would work too. For POJO, it's simple, but there might be some backwards compatibility issue if typed objects (e.g. with a toString function) are actually used.

This would be an edge case so I think it's fine for a major update at least.

@mgol mgol added Manipulation Discuss in Meeting Reserved for Issues and PRs that anyone would like to discuss in the weekly meeting. labels Jun 5, 2020
@mgol
Copy link
Member

mgol commented Sep 9, 2021

I submitted a pull request adding support for TrustedHTML, including unit tests, please take a look: #4927.

@koto could you give an update of where we are with regards to browser support? Are maintainers of other browser engines in favor, neutral or opposed to the standard? Such information matters a lot for a project like jQuery.

@koto
Copy link

koto commented Sep 10, 2021

Thanks a lot, @mgol, I'll take a look at the PR (I already like the ones merged!). The code size delta is impressively small!

There are sadly no updates w.r.t. to other browsers support. Trusted Types are currently shipped in Edge, Chrome, Opera, Blink etc.) + there is a polyfill. We see the usage of the API slowly growing, and have released a report of the current TT coverage. The recent large integrations we know of are Angular and webpack.

For library integrations, we are trying to make sure that the code, either:

  • stops using sinks (infeasible for jQuery - the whole point is that it does), or
  • does not downgrade passed TT to strings (jQuery case), or
  • if TT APIs are used, it's done with feature testing (e.g. window.trustedTypes?.createPolicy() in modern JS lingo)

That way many integrations bring value even without the TT enforcement due to untangling their data flows. My biased take is that this is worth +38 bytes, but these are obviously not my bytes to govern :)

@mgol
Copy link
Member

mgol commented Sep 10, 2021

@koto Thanks for the updates. Up to 4.5% of page loads with TT enforcement in Chrome looks like a lot! Do you know what pages contribute the most to such a percentage? I imagine the vast majority of web developers doesn't even know about trusted types so I'd expect such traffic to come mostly from a few popular websites.

EDIT: I should have looked at the report before asking, I see there's more detailed data there. :)

mgol added a commit to mgol/jquery that referenced this issue Sep 13, 2021
mgol added a commit to mgol/jquery that referenced this issue Sep 13, 2021
This ensures HTML wrapped in TrustedHTML can be used as an input to jQuery
manipulation methods in a way that doesn't violate the
`require-trusted-types-for` Content Security Policy directive.
This commit builds on previous work needed for trusted types support, including
jquerygh-4642 and jquerygh-4724.

One restriction is that while any TrustedHTML wrapper should work as input
for jQuery methods like `.html()` or `.append()`, for passing directly to the
`jQuery` factory the string must start with `<` and end with `>`; no trailing
or leading whitespaces are allowed. This is necessary as we cannot parse out
a part of the input for further construction; that would violate the CSP rule -
and that's what's done to HTML input not matching these constraints.

No trusted types API is used explicitly in source; the majority of the work is
ensuring we don't pass the input converted to string to APIs that would
eventually assign it to `innerHTML`. This extra cautiousness is caused by the
API being Blink-only, at least for now.

The ban on passing strings to `innerHTML` means support tests relying on such
assignments are impossible. We don't currently have such tests on the `main`
branch but we used to have many of them in the 3.x & older lines. If there's
a need to re-add such a test, we'll need an escape hatch to skip them for apps
needing CSP-enforced TrustedHTML.

See https://web.dev/trusted-types/ for more information about TrustedHTML.

Fixes jquerygh-4409
Ref jquerygh-4642
Ref jquerygh-4724
mgol added a commit to mgol/jquery that referenced this issue Sep 14, 2021
This ensures HTML wrapped in TrustedHTML can be used as an input to jQuery
manipulation methods in a way that doesn't violate the
`require-trusted-types-for` Content Security Policy directive.
This commit builds on previous work needed for trusted types support, including
jquerygh-4642 and jquerygh-4724.

One restriction is that while any TrustedHTML wrapper should work as input
for jQuery methods like `.html()` or `.append()`, for passing directly to the
`jQuery` factory the string must start with `<` and end with `>`; no trailing
or leading whitespaces are allowed. This is necessary as we cannot parse out
a part of the input for further construction; that would violate the CSP rule -
and that's what's done to HTML input not matching these constraints.

No trusted types API is used explicitly in source; the majority of the work is
ensuring we don't pass the input converted to string to APIs that would
eventually assign it to `innerHTML`. This extra cautiousness is caused by the
API being Blink-only, at least for now.

The ban on passing strings to `innerHTML` means support tests relying on such
assignments are impossible. We don't currently have such tests on the `main`
branch but we used to have many of them in the 3.x & older lines. If there's
a need to re-add such a test, we'll need an escape hatch to skip them for apps
needing CSP-enforced TrustedHTML.

See https://web.dev/trusted-types/ for more information about TrustedHTML.

Fixes jquerygh-4409
Ref jquerygh-4642
Ref jquerygh-4724
@zwjohn
Copy link

zwjohn commented Sep 15, 2021

I have a Chrome extension that uses Jquery, I am now getting about 5 "This document requires 'TrustedHTML' assignment" errors in the Chrome console whenever the browser loads jquery, causing the extension to stop working (because Jquery failed to load due to the error mentioned above). I tried the latest version 3.6 and got the same error. Apparently, Jquery uses innerHTML somewhere in the code, so I had to window.trustedTypes to bypass the failure, it's more a hack.
Is there a better solution to solve this error for Jquery?

Thanks

@koto
Copy link

koto commented Sep 15, 2021

@zwjohn I don't know exactly your setup, but I believe some feature testing done by jQuery at load times interfere with Trusted Types restrictions your Chrome extension has (or the restriction the page has, where the extension is loading its content script).

I "fixed" this in the past by using the default policy (the code is old, so it might need some adjusting: https://github.com/koto/web/blob/trusted-types-angular/src/trusted-types/default.ts). Note that it will not address any other DOM writes you might be doing through jQuery or its plugins.

@zwjohn
Copy link

zwjohn commented Sep 15, 2021

@koto thanks for sharing your solution, I will take a look. I could use DOMPurify library to purify the strings, however, I think Jquery should handle this in the library or replace usage of innerHTML to avoid this error, otherwise, every developer using Jquery will run into this issue sooner or later.

mgol added a commit to mgol/jquery that referenced this issue Sep 17, 2021
This ensures HTML wrapped in TrustedHTML can be used as an input to jQuery
manipulation methods in a way that doesn't violate the
`require-trusted-types-for` Content Security Policy directive.
This commit builds on previous work needed for trusted types support, including
jquerygh-4642 and jquerygh-4724.

One restriction is that while any TrustedHTML wrapper should work as input
for jQuery methods like `.html()` or `.append()`, for passing directly to the
`jQuery` factory the string must start with `<` and end with `>`; no trailing
or leading whitespaces are allowed. This is necessary as we cannot parse out
a part of the input for further construction; that would violate the CSP rule -
and that's what's done to HTML input not matching these constraints.

No trusted types API is used explicitly in source; the majority of the work is
ensuring we don't pass the input converted to string to APIs that would
eventually assign it to `innerHTML`. This extra cautiousness is caused by the
API being Blink-only, at least for now.

The ban on passing strings to `innerHTML` means support tests relying on such
assignments are impossible. We don't currently have such tests on the `main`
branch but we used to have many of them in the 3.x & older lines. If there's
a need to re-add such a test, we'll need an escape hatch to skip them for apps
needing CSP-enforced TrustedHTML.

See https://web.dev/trusted-types/ for more information about TrustedHTML.

Fixes jquerygh-4409
Ref jquerygh-4642
Ref jquerygh-4724
mgol added a commit to mgol/jquery that referenced this issue Sep 23, 2021
This ensures HTML wrapped in TrustedHTML can be used as an input to jQuery
manipulation methods in a way that doesn't violate the
`require-trusted-types-for` Content Security Policy directive.
This commit builds on previous work needed for trusted types support, including
jquerygh-4642 and jquerygh-4724.

One restriction is that while any TrustedHTML wrapper should work as input
for jQuery methods like `.html()` or `.append()`, for passing directly to the
`jQuery` factory the string must start with `<` and end with `>`; no trailing
or leading whitespaces are allowed. This is necessary as we cannot parse out
a part of the input for further construction; that would violate the CSP rule -
and that's what's done to HTML input not matching these constraints.

No trusted types API is used explicitly in source; the majority of the work is
ensuring we don't pass the input converted to string to APIs that would
eventually assign it to `innerHTML`. This extra cautiousness is caused by the
API being Blink-only, at least for now.

The ban on passing strings to `innerHTML` means support tests relying on such
assignments are impossible. We don't currently have such tests on the `main`
branch but we used to have many of them in the 3.x & older lines. If there's
a need to re-add such a test, we'll need an escape hatch to skip them for apps
needing CSP-enforced TrustedHTML.

See https://web.dev/trusted-types/ for more information about TrustedHTML.

Fixes jquerygh-4409
Ref jquerygh-4642
Ref jquerygh-4724
mgol added a commit to mgol/jquery that referenced this issue Sep 29, 2021
This ensures HTML wrapped in TrustedHTML can be used as an input to jQuery
manipulation methods in a way that doesn't violate the
`require-trusted-types-for` Content Security Policy directive.
This commit builds on previous work needed for trusted types support, including
jquerygh-4642 and jquerygh-4724.

One restriction is that while any TrustedHTML wrapper should work as input
for jQuery methods like `.html()` or `.append()`, for passing directly to the
`jQuery` factory the string must start with `<` and end with `>`; no trailing
or leading whitespaces are allowed. This is necessary as we cannot parse out
a part of the input for further construction; that would violate the CSP rule -
and that's what's done to HTML input not matching these constraints.

No trusted types API is used explicitly in source; the majority of the work is
ensuring we don't pass the input converted to string to APIs that would
eventually assign it to `innerHTML`. This extra cautiousness is caused by the
API being Blink-only, at least for now.

The ban on passing strings to `innerHTML` means support tests relying on such
assignments are impossible. We don't currently have such tests on the `main`
branch but we used to have many of them in the 3.x & older lines. If there's
a need to re-add such a test, we'll need an escape hatch to skip them for apps
needing CSP-enforced TrustedHTML.

See https://web.dev/trusted-types/ for more information about TrustedHTML.

Fixes jquerygh-4409
Ref jquerygh-4642
Ref jquerygh-4724
mgol added a commit to mgol/jquery that referenced this issue Sep 29, 2021
This ensures HTML wrapped in TrustedHTML can be used as an input to jQuery
manipulation methods in a way that doesn't violate the
`require-trusted-types-for` Content Security Policy directive.
This commit builds on previous work needed for trusted types support, including
jquerygh-4642 and jquerygh-4724.

One restriction is that while any TrustedHTML wrapper should work as input
for jQuery methods like `.html()` or `.append()`, for passing directly to the
`jQuery` factory the string must start with `<` and end with `>`; no trailing
or leading whitespaces are allowed. This is necessary as we cannot parse out
a part of the input for further construction; that would violate the CSP rule -
and that's what's done to HTML input not matching these constraints.

No trusted types API is used explicitly in source; the majority of the work is
ensuring we don't pass the input converted to string to APIs that would
eventually assign it to `innerHTML`. This extra cautiousness is caused by the
API being Blink-only, at least for now.

The ban on passing strings to `innerHTML` means support tests relying on such
assignments are impossible. We don't currently have such tests on the `main`
branch but we used to have many of them in the 3.x & older lines. If there's
a need to re-add such a test, we'll need an escape hatch to skip them for apps
needing CSP-enforced TrustedHTML.

See https://web.dev/trusted-types/ for more information about TrustedHTML.

Fixes jquerygh-4409
Ref jquerygh-4642
Ref jquerygh-4724
@mgol mgol added the Core label Sep 30, 2021
mgol added a commit that referenced this issue Sep 30, 2021
This ensures HTML wrapped in TrustedHTML can be used as an input to jQuery
manipulation methods in a way that doesn't violate the
`require-trusted-types-for` Content Security Policy directive.
This commit builds on previous work needed for trusted types support, including
gh-4642 and gh-4724.

One restriction is that while any TrustedHTML wrapper should work as input
for jQuery methods like `.html()` or `.append()`, for passing directly to the
`jQuery` factory the string must start with `<` and end with `>`; no trailing
or leading whitespaces are allowed. This is necessary as we cannot parse out
a part of the input for further construction; that would violate the CSP rule -
and that's what's done to HTML input not matching these constraints.

No trusted types API is used explicitly in source; the majority of the work is
ensuring we don't pass the input converted to string to APIs that would
eventually assign it to `innerHTML`. This extra cautiousness is caused by the
API being Blink-only, at least for now.

The ban on passing strings to `innerHTML` means support tests relying on such
assignments are impossible. We don't currently have such tests on the `main`
branch but we used to have many of them in the 3.x & older lines. If there's
a need to re-add such a test, we'll need an escape hatch to skip them for apps
needing CSP-enforced TrustedHTML.

See https://web.dev/trusted-types/ for more information about TrustedHTML.

Fixes gh-4409
Closes gh-4927
Ref gh-4642
Ref gh-4724
@mgol
Copy link
Member

mgol commented Sep 30, 2021

This has landed in #4927 and will be included in jQuery 4.0.0. Thanks for all the discussions!

@koto
Copy link

koto commented Sep 30, 2021

Thank you Michał, that's great news!

@koto
Copy link

koto commented Oct 7, 2021

I noticed one violation still in jQuery.attr, where the value of the attribute is stringified before calling setAttribute:

const policy = trustedTypes.createPolicy('a', {createScriptURL: s=>s})
jQuery(aScript, policy.createScriptURL('foo'));

Uncaught TypeError: Failed to execute 'setAttribute' on 'Element': This document requires 'TrustedScriptURL' assignment.
    at attr (jquery.js:6997)
    at access (jquery.js:3467)
    at jQuery.fn.init.attr (jquery.js:6955)
    at <anonymous>:1:6

There is a workaround via .attr hooks, but it might be worth addressing nonetheless.

It seems like this was introduced in ff75767, I suspect to workaround an IE <= 9 bug, which incorrectly stringified objects passed to setAttribute.

I'm not sure what the most elegant solution would be here, I guess it depends on whether jQuery 4 aims to support IE9. If not, it's safe not to stringify values (browser API would). If yes, then there's only a less-than-ideal option of testing for the bug? IIRC this would be a good test:

with (document.createElement('div')) {
  setAttribute('title', {toString:()=>''}); 
  getAttribute('title') === ''
}

@mgol
Copy link
Member

mgol commented Oct 7, 2021

@koto Thanks for the info. jQuery 4.x will only support IE 11 so if this was just to please IE <=9 we should be good to remove the manual stringification.

@mgol
Copy link
Member

mgol commented Oct 7, 2021

@koto I created #4948 out of your last comment.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

Successfully merging a pull request may close this issue.

6 participants
@koto @dmethvin @timmywil @mgol @zwjohn and others