[whatwg/fetch] Block subresource requests whose URLs include credentials. (#465)

Hard-coding credentials into subresource requests (e.g.
`https://user:pass@host/`) is problematic from a security perspective,
as it's allowed folks to brute-force credentials in the past, enables
session fixation attacks for sites using basic auth, and can allow
attackers access to well-known, poorly-coded devices (such as users'
routers). Moreover, the ability to hard-code credentials leads to
inadvertant leakage via XSS on the one hand, and poor development
practice on the other. Sifting through HTTPArchive, for example, yields
a number of credentials for test servers and other internal
architecture.

Usage of the `http://user:pass@host/` pattern has [declined significantly
in the last few years][1]; given that low usage, closing this small
security hole seems quite reasonable.

[1]: https://www.chromestatus.com/metrics/feature/timeline/popularity/532
You can view, comment on, or merge this pull request online at:

  https://github.com/whatwg/fetch/pull/465

-- Commit Summary --

  * Block subresource requests whose URLs include credentials.

-- File Changes --

    M fetch.bs (5)

-- Patch Links --

https://github.com/whatwg/fetch/pull/465.patch
https://github.com/whatwg/fetch/pull/465.diff

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/whatwg/fetch/pull/465

Received on Tuesday, 24 January 2017 12:17:12 UTC