Loading HuntDB...

CSP : Inline scripts can be inserted

Medium
S
Semmle
Submitted None
Reported by darkdude

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Vulnerable URL:- https://lgtm-com.pentesting.semmle.net/ #Summery Content Security Policy (CSP) is a client-side security model which allows developers to specify where different types of resources should be loaded, executed and embedded from. With CSP you can instruct the browser only to load javascript resources from a specific domain as well as block inline javascript running on the website. This is very helpful against XSS since most attacks requires inline javascript. #Issue detail The configuration removes the XSS sandboxing feature of Content Security Policy. The 'unsafe-inline' directive allows scripts to be inserted inline in the HTML page. An attacker will be able to use script html tag (<script>...</script>) or event handlers (onload, onerror, ...) to load malicious scripts. #Weak configuration script-src: 'unsafe-inline' #Brup Responce HTTP/1.1 200 OK X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block; report=https://lgtm-com.pentesting.semmle.net/browser_report/ Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' blocked: https://www.gravatar.com https://img.shields.io; object-src 'none'; connect-src 'self' https://storage.googleapis.com; font-src 'self'; media-src 'self'; manifest-src 'self'; frame-src https://www.youtube.com; report-uri https://lgtm-com.pentesting.semmle.net/browser_report/; report-to https://lgtm-com.pentesting.semmle.net/browser_report/ Referrer-Policy: same-origin Strict-Transport-Security: max-age=31536000; includeSubDomains X-Deploy-Time: 1553109264000 Content-Type: text/html;charset=utf-8 X-UA-Compatible: IE=edge X-Cloud-Trace-Context: b1a4900e9ad24c8d5eca45b4c3acc726;o=1 Vary: Accept-Encoding Date: Thu, 21 Mar 2019 07:06:31 GMT Server: Google Frontend Cache-Control: private Connection: close Content-Length: 11525 #Refrences https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src http://www.html5rocks.com/en/tutorials/security/content-security-policy/ https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage https://speakerdeck.com/mikispag/making-csp-great-again-michele-spagnuolo-and-lukas-weichselbaum https://dubell.io/exploiting-weak-content-security-policy-csp-rules-for-fun-and-profit/ https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/content-security-policy-csp-not-implemented/ https://www.netsparker.com/blog/web-security/content-security-policy/ ## Impact There is no direct impact of not implementing CSP on your website. However, if your website is vulnerable to a Cross-site Scripting attack CSP can prevent successful exploitation of that vulnerability. By not implementing CSP you’ll be missing out this extra layer of security.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Cross-site Scripting (XSS) - Generic