Loading HuntDB...

CSP "script-src" includes "unsafe-inline" in weblate.org and demo.weblate.org

None
W
Weblate
Submitted None
Reported by mrnull1337

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
Weblate is using unsafe-inline in script-src csp headers which allows the use of inline resources, such as inline <script> elements, blocked: URLs, inline event handlers, and inline <style> elements. #POC: HTTP/1.1 200 OK Server: nginx Date: Tue, 23 May 2017 10:49:15 GMT Content-Type: text/html; charset=utf-8 Connection: close Vary: Accept-Encoding Vary: Accept-Encoding X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Content-Language: en Content-Security-Policy: default-src 'self'; style-src 'self' 'unsafe-inline' maxcdn.bootstrapcdn.com; img-src 'self' stats.cihar.com; script-src 'self' 'unsafe-inline' cdnjs.cloudflare.com stats.cihar.com maxcdn.bootstrapcdn.com code.jquery.com; connect-src api.rollbar.com; object-src 'none'; font-src maxcdn.bootstrapcdn.com; child-src 'none'; frame-ancestors 'none'; Strict-Transport-Security: max-age=31536000; includeSubdomains; preload X-Content-Type-Options: nosniff Content-Length: 20336 Above CSP headers containing "script-src: header which have "unsafe-src" attribute in it. This does not result in an immediate threat, but should be excluded, if possible, as a best practice. For further information, see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src Regards, Mr_R3boot.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Violation of Secure Design Principles