Skip to content

Commit 061d6ce

Browse files
renanvalentingaearon
authored andcommitted
fix(react-dom): access iframe contentWindow instead of contentDocument (#15099)
MDN has a list of methods for obtaining the window reference of an iframe: https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage#Syntax fix(react-dom): check if iframe belongs to the same origin Accessing the contentDocument of a HTMLIframeElement can cause the browser to throw, e.g. if it has a cross-origin src attribute. Safari will show an error in the console when the access results in "Blocked a frame with origin". e.g: ```javascript try { $0.contentDocument.defaultView } catch (err) { console.log('err', err) } > Blocked a frame with origin X from accessing a frame with origin Y. Protocols, domains, and ports must match. > err – TypeError: null is not an object (evaluating '$0.contentDocument.defaultView') ``` A safety way is to access one of the cross origin properties: Window or Location Which might result in "SecurityError" DOM Exception and it is compatible to Safari. ```javascript try { $0.contentWindow.location.href } catch (err) { console.log('err', err) } > err – SecurityError: Blocked a frame with origin "http://localhost:3001" from accessing a cross-origin frame. Protocols, domains, and ports must match. ``` https://html.spec.whatwg.org/multipage/browsers.html#integration-with-idl
1 parent b83e01c commit 061d6ce

File tree

1 file changed

+19
-5
lines changed

1 file changed

+19
-5
lines changed

packages/react-dom/src/client/ReactInputSelection.js

+19-5
Original file line numberDiff line numberDiff line change
@@ -40,15 +40,29 @@ function isInDocument(node) {
4040
);
4141
}
4242

43+
function isSameOriginFrame(iframe) {
44+
try {
45+
// Accessing the contentDocument of a HTMLIframeElement can cause the browser
46+
// to throw, e.g. if it has a cross-origin src attribute.
47+
// Safari will show an error in the console when the access results in "Blocked a frame with origin". e.g:
48+
// iframe.contentDocument.defaultView;
49+
// A safety way is to access one of the cross origin properties: Window or Location
50+
// Which might result in "SecurityError" DOM Exception and it is compatible to Safari.
51+
// https://html.spec.whatwg.org/multipage/browsers.html#integration-with-idl
52+
53+
return typeof iframe.contentWindow.location.href === 'string';
54+
} catch (err) {
55+
return false;
56+
}
57+
}
58+
4359
function getActiveElementDeep() {
4460
let win = window;
4561
let element = getActiveElement();
4662
while (element instanceof win.HTMLIFrameElement) {
47-
// Accessing the contentDocument of a HTMLIframeElement can cause the browser
48-
// to throw, e.g. if it has a cross-origin src attribute
49-
try {
50-
win = element.contentDocument.defaultView;
51-
} catch (e) {
63+
if (isSameOriginFrame(element)) {
64+
win = element.contentWindow;
65+
} else {
5266
return element;
5367
}
5468
element = getActiveElement(win.document);

0 commit comments

Comments
 (0)