[werkenbijmcdonalds.nl] Unsafe-inline in "script-src" results in "bootstrapping" or passing data to JavaScript from HTML pages.

Disclosed: 2017-11-15 09:01:29 By sumit7 To radancy
Medium
Vulnerability Details
Hi Dear Maximum Team Hope you are good! **Vulnerablity Summary** The HTTP header of the werkenbijmcdonalds.nl website includes an unsafe-inline parameter for "script-src". **Impact:** However, the "script-src" parameter is set to "unsafe-inline" or "unsafe-eval", which allows injection of user passed values, which in result can be misused for Cross-Site Scripting attacks.This is to allow "bootstrapping" or passing data to JavaScript from HTML pages. It's a dangerous setting, so I recommend here to fix it soon by passing data to JavaScript in the DOM instead of creating JavaScript variables from HTML. **Mitigation** Please remove "unsafe-inline" from "script-src", to resolve. Thanks for reading this! If you need help, be free to ask. Happy to help. Regards, @smit
Actions
View on HackerOne
Report Stats
  • Report ID: 273803
  • State: Closed
  • Substate: informative
  • Upvotes: 2
Share this report