Content-Security-Policy-Vulnerability/EN/Solution Tips
Version vom 3. April 2019, 16:04 Uhr von Siwebot (Diskussion | Beiträge)
If the Content Security Policy is not configured securely, your web application may load content from insecure sources.
Use the CSP with default-src 'none' or 'self' and without unsafe-eval or unsafe-inline directives. For more information about Content Security Policy, please refer to SELFHTML>>
--snip
Example for the header on the start page:
<meta http-equiv="Content-Security-Policy" content="default-src 'self'; script-src 'self'"> <meta http-equiv="X-Content-Security-Policy" content="default-src 'self'; script-src 'self'"> <meta http-equiv="X-WebKit-CSP" content="default-src 'self'; script-src 'self'">
Configuration of the web server
If you can configure your own web server, which is usually not possible in low-budget hosting packages, there is this option via changes to .htaccess:
# Download / Load content only from explicitly allowed sites # Example: Allow everything from own domain, nothing from external sources: Header set Content-Security-Policy "default-src 'none'; frame-src 'self'; font-src 'self';img-src 'self' siwecos.de; object-src 'self'; script-src 'self'; style-src 'self';"
--snap
Here is an example of an .htaccess file which will set the Header Scanner to green. (.htaccess example)