CSP "script-src" includes "unsafe-inline" in weblate.org and demo.weblate.org
None
W
Weblate
Submitted None
Actions:
Reported by
mrnull1337
Vulnerability Details
Technical details and impact analysis
Weblate is using unsafe-inline in script-src csp headers which allows the use of inline resources, such as inline <script> elements, blocked: URLs, inline event handlers, and inline <style> elements.
#POC:
HTTP/1.1 200 OK
Server: nginx
Date: Tue, 23 May 2017 10:49:15 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Content-Language: en
Content-Security-Policy: default-src 'self'; style-src 'self' 'unsafe-inline' maxcdn.bootstrapcdn.com; img-src 'self' stats.cihar.com; script-src 'self' 'unsafe-inline' cdnjs.cloudflare.com stats.cihar.com maxcdn.bootstrapcdn.com code.jquery.com; connect-src api.rollbar.com; object-src 'none'; font-src maxcdn.bootstrapcdn.com; child-src 'none'; frame-ancestors 'none';
Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
X-Content-Type-Options: nosniff
Content-Length: 20336
Above CSP headers containing "script-src: header which have "unsafe-src" attribute in it.
This does not result in an immediate threat, but should be excluded, if possible, as a best practice. For further information, see
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src
Regards,
Mr_R3boot.
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Violation of Secure Design Principles