CSP "script-src" includes "unsafe-inline" in weblate.org and demo.weblate.org
None
Vulnerability Details
Weblate is using unsafe-inline in script-src csp headers which allows the use of inline resources, such as inline <script> elements, javascript: URLs, inline event handlers, and inline <style> elements.
#POC:
HTTP/1.1 200 OK
Server: nginx
Date: Tue, 23 May 2017 10:49:15 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Content-Language: en
Content-Security-Policy: default-src 'self'; style-src 'self' 'unsafe-inline' maxcdn.bootstrapcdn.com; img-src 'self' stats.cihar.com; script-src 'self' 'unsafe-inline' cdnjs.cloudflare.com stats.cihar.com maxcdn.bootstrapcdn.com code.jquery.com; connect-src api.rollbar.com; object-src 'none'; font-src maxcdn.bootstrapcdn.com; child-src 'none'; frame-ancestors 'none';
Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
X-Content-Type-Options: nosniff
Content-Length: 20336
Above CSP headers containing "script-src: header which have "unsafe-src" attribute in it.
This does not result in an immediate threat, but should be excluded, if possible, as a best practice. For further information, see
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src
Regards,
Mr_R3boot.
Actions
View on HackerOneReport Stats
- Report ID: 231062
- State: Closed
- Substate: informative
- Upvotes: 1