CSP "script-src" includes "unsafe-inline" in weblate.org and demo.weblate.org

Disclosed: 2017-05-23 11:23:24 By mrnull1337 To weblate
None
Vulnerability Details
Weblate is using unsafe-inline in script-src csp headers which allows the use of inline resources, such as inline <script> elements, javascript: URLs, inline event handlers, and inline <style> elements. #POC: HTTP/1.1 200 OK Server: nginx Date: Tue, 23 May 2017 10:49:15 GMT Content-Type: text/html; charset=utf-8 Connection: close Vary: Accept-Encoding Vary: Accept-Encoding X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Content-Language: en Content-Security-Policy: default-src 'self'; style-src 'self' 'unsafe-inline' maxcdn.bootstrapcdn.com; img-src 'self' stats.cihar.com; script-src 'self' 'unsafe-inline' cdnjs.cloudflare.com stats.cihar.com maxcdn.bootstrapcdn.com code.jquery.com; connect-src api.rollbar.com; object-src 'none'; font-src maxcdn.bootstrapcdn.com; child-src 'none'; frame-ancestors 'none'; Strict-Transport-Security: max-age=31536000; includeSubdomains; preload X-Content-Type-Options: nosniff Content-Length: 20336 Above CSP headers containing "script-src: header which have "unsafe-src" attribute in it. This does not result in an immediate threat, but should be excluded, if possible, as a best practice. For further information, see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src Regards, Mr_R3boot.
Actions
View on HackerOne
Report Stats
  • Report ID: 231062
  • State: Closed
  • Substate: informative
  • Upvotes: 1
Share this report