We try our best to keep ZeroClipboard secure, but there are some rules that you should follow to keep your site safe.
Basically, if an attacker gets access to the main window/global object via an XSS exploit, it's pretty much an instant "GAME OVER" unless ALL of the following are true:
- The
ZeroClipboard
object itself is not globally accessible. - The
ZeroClipboard.prototype
object itself is not globally accessible. - No
ZeroClipboard
instances are globally accessible. - No callback functions for dispatched ZeroClipboard events are globally accessible.
- If a variable is used to set the path to the SWF via
ZeroClipboard#setDefaults
, that variable must not be globally accessible.
- Having
ZeroClipboard
instances globally accessible (versus encapsulated in a closure). This allows an attacker to manually call a client'ssetText
method and inject their own text. - As with all globally accessible functions in JavaScript, any globally accessible callback functions (hooked to events) can be overridden by an attacker. This isn't terribly dangerous but could be annoying.
- If we add a
"dataRequested"
event (see #46), then users would need to apply the safety precautions mentioned in_both_ of the aforementioned examples to avoid allowing an attacker to inject their own text. - Overriding any of the
ZeroClipboard
,ZeroClipboard
, orZeroClipboard.prototype
properties or methods, if globally accessible.
If you find any security holes, please submit a pull request, or file an issue. We will be very appreciative.