Skip to content

Maintain control over WebView content #370

@TheDauntless

Description

@TheDauntless

I propose to add a check to make sure that only trusted content can be loaded in a WebView. Let's say you are using a webview, you often wouldn't want the user to navigate away from your controlled pages/domains. Newly loaded pages could be malicious, exploit webview bindings and phish the user.

The closest one that is related is 6.4, but doesn't quite cover the phishing aspect, and it's angle is a bit different:

6.4 If native methods of the app are exposed to a WebView, verify that the WebView only renders JavaScript contained within the app package.

The MSTG also doesn't cover this aspect, since there is only one mention of shouldOverrideUrlLoading and it's in a section about XSS.

So my proposition:

6.12: Restrict content of WebViews to trusted or local resources if necessary.

This could be a level1 and level2, but maybe something extra is needed to fine-tune the scope more.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions