Gratipay Website CSP "script-scr" includes "unsafe-inline"
Low
G
Gratipay
Submitted None
Actions:
Reported by
smziaurrashid
Vulnerability Details
Technical details and impact analysis
Summary:
========
The HTTP header of the gratipay.com website includes an unsafe CSP parameter for "script-src".
Description:
==========
has a Content-Security-Policy configured the "script-src" parameter is set to "unsafe-inline", which allows injection of user passed values, which in result can be misused for Cross-Site Scripting attacks.
Steps to Reproduce:
================
Go to the following link to check your gratipay.com website's http header response: https://hackertarget.com/http-header-check/
``` Content-Security-Policy-Report-Only: default-src self;script-src self assets.gratipay.com unsafe-inline;```
As can be seen, "unsafe-inline" is included in in the list of "script-src" parameters. For further information, see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src
Similar Report: #225833
------------------------
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
HTTP Request Smuggling