-
-
Notifications
You must be signed in to change notification settings - Fork 600
Description
I propose to add a check to make sure that only trusted content can be loaded in a WebView. Let's say you are using a webview, you often wouldn't want the user to navigate away from your controlled pages/domains. Newly loaded pages could be malicious, exploit webview bindings and phish the user.
The closest one that is related is 6.4, but doesn't quite cover the phishing aspect, and it's angle is a bit different:
6.4 If native methods of the app are exposed to a WebView, verify that the WebView only renders JavaScript contained within the app package.
The MSTG also doesn't cover this aspect, since there is only one mention of shouldOverrideUrlLoading and it's in a section about XSS.
So my proposition:
6.12: Restrict content of WebViews to trusted or local resources if necessary.
This could be a level1 and level2, but maybe something extra is needed to fine-tune the scope more.