File: browser-safebrowsing.js

package info (click to toggle)
firefox 141.0.3-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,550,588 kB
  • sloc: cpp: 7,426,506; javascript: 6,367,238; ansic: 3,707,351; python: 1,369,002; xml: 623,983; asm: 426,918; java: 184,324; sh: 64,488; makefile: 19,203; objc: 13,059; perl: 12,955; yacc: 4,583; cs: 3,846; pascal: 3,352; lex: 1,720; ruby: 1,071; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10
file content (117 lines) | stat: -rw-r--r-- 4,086 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

// This file is loaded into the browser window scope.
/* eslint-env mozilla/browser-window */

var gSafeBrowsing = {
  setReportPhishingMenu() {
    // In order to detect whether or not we're at the phishing warning
    // page, we have to check the documentURI instead of the currentURI.
    // This is because when the DocShell loads an error page, the
    // currentURI stays at the original target, while the documentURI
    // will point to the internal error page we loaded instead.
    var docURI = gBrowser.selectedBrowser.documentURI;
    var isPhishingPage =
      docURI && docURI.spec.startsWith("about:blocked?e=deceptiveBlocked");

    // Show/hide the appropriate menu item.
    const reportMenu = document.getElementById(
      "menu_HelpPopup_reportPhishingtoolmenu"
    );
    reportMenu.hidden = isPhishingPage;
    const reportErrorMenu = document.getElementById(
      "menu_HelpPopup_reportPhishingErrortoolmenu"
    );
    reportErrorMenu.hidden = !isPhishingPage;

    // Now look at the currentURI to learn which page we were trying
    // to browse to.
    const uri = gBrowser.currentURI;
    const isReportablePage =
      uri && (uri.schemeIs("http") || uri.schemeIs("https"));

    const disabledByPolicy = !Services.policies.isAllowed("feedbackCommands");

    if (disabledByPolicy || isPhishingPage || !isReportablePage) {
      reportMenu.setAttribute("disabled", "true");
    } else {
      reportMenu.removeAttribute("disabled");
    }

    if (disabledByPolicy || !isPhishingPage || !isReportablePage) {
      reportErrorMenu.setAttribute("disabled", "true");
    } else {
      reportErrorMenu.removeAttribute("disabled");
    }
  },

  /**
   * Used to report a phishing page or a false positive
   *
   * @param name
   *        String One of "PhishMistake", "MalwareMistake", or "Phish"
   * @param info
   *        Information about the reasons for blocking the resource.
   *        In the case false positive, it may contain SafeBrowsing
   *        matching list and provider of the list
   * @return String the report phishing URL.
   */
  getReportURL(name, info) {
    let reportInfo = info;
    if (!reportInfo) {
      let pageUri = gBrowser.currentURI;

      // Remove the query to avoid including potentially sensitive data
      if (pageUri instanceof Ci.nsIURL) {
        pageUri = pageUri.mutate().setQuery("").finalize();
      }

      reportInfo = { uri: pageUri.asciiSpec };
    }
    return SafeBrowsing.getReportURL(name, reportInfo);
  },

  reportFalseDeceptiveSite() {
    let contextsToVisit = [gBrowser.selectedBrowser.browsingContext];
    while (contextsToVisit.length) {
      let currentContext = contextsToVisit.pop();
      let global = currentContext.currentWindowGlobal;

      if (!global) {
        continue;
      }
      let docURI = global.documentURI;
      // Ensure the page is an about:blocked pagae before handling.
      if (
        docURI &&
        docURI.spec.startsWith("about:blocked?e=deceptiveBlocked")
      ) {
        let actor = global.getActor("BlockedSite");
        actor.sendQuery("DeceptiveBlockedDetails").then(data => {
          let reportUrl = gSafeBrowsing.getReportURL(
            "PhishMistake",
            data.blockedInfo
          );
          if (reportUrl) {
            openTrustedLinkIn(reportUrl, "tab");
          } else {
            let bundle = Services.strings.createBundle(
              "chrome://browser/locale/safebrowsing/safebrowsing.properties"
            );
            Services.prompt.alert(
              window,
              bundle.GetStringFromName("errorReportFalseDeceptiveTitle"),
              bundle.formatStringFromName("errorReportFalseDeceptiveMessage", [
                data.blockedInfo.provider,
              ])
            );
          }
        });
      }

      contextsToVisit.push(...currentContext.children);
    }
  },
};